diff --git "a/STI_CEA/table1039.csv" "b/STI_CEA/table1039.csv" new file mode 100644--- /dev/null +++ "b/STI_CEA/table1039.csv" @@ -0,0 +1,124 @@ +Name,Status,Description,References,Phase,Votes,Comments +CVE-2006-5657,Candidate,Multiple off-by-one errors in src/text.c in Vilistextum before 2.6.9 have unknown impact and attack vectors.,BID:20813 | URL:http://www.securityfocus.com/bid/20813 | CONFIRM:http://sourceforge.net/forum/forum.php?forum_id=626024 | VUPEN:ADV-2006-4253 | URL:http://www.vupen.com/english/advisories/2006/4253,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5658,Candidate,"BlooMooWeb ActiveX control (AidemATL.dll) allows remote attackers to (1) download arbitrary files via a URL in the bstrUrl parameter to the BW_DownloadFile method, (2) execute arbitrary local files via a file path in the bstrParams parameter to the BW_LaunchGame method, and (3) delete arbitrary files via a file path in the filePath parameter to the BW_DeleteTempFile method.",BID:20827 | URL:http://www.securityfocus.com/bid/20827 | BUGTRAQ:20061031 ActiveX security leaks in the TV owned web game platform | URL:http://www.securityfocus.com/archive/1/450144/100/0/threaded | SECUNIA:22666 | URL:http://secunia.com/advisories/22666 | SREASON:1808 | URL:http://securityreason.com/securityalert/1808 | VUPEN:ADV-2006-4294 | URL:http://www.vupen.com/english/advisories/2006/4294 | XF:bloomooweb-activex-command-execution(29968) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29968 | XF:bloomooweb-bwdeletetempfile-dos(29997) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29997,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5659,Candidate,"PAM_extern before 0.2 sends a password as a command line argument, which allows local users to obtain the password by listing the command line arguments, such as ps. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.",VUPEN:ADV-2006-4235 | URL:http://www.vupen.com/english/advisories/2006/4235 | XF:pamextern-password-information-disclosure(29912) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29912,Assigned (20061102),None (candidate not yet proposed), +CV-2006-5660,Candidate,"Cisco Security Agent Management Center (CSAMC) 5.1 before 5.1.0.79 does not properly handle certain LDAP error messages, which allows remote attackers to bypass authentication requirements via an empty password when using an external LDAP server.",BID:20852 | URL:http://www.securityfocus.com/bid/20852 | CERT-VN:VU#778648 | URL:http://www.kb.cert.org/vuls/id/778648 | CISCO:20061101 Cisco Security Agent Management Center LDAP Administrator Authentication Bypass | URL:http://www.cisco.com/en/US/products/products_security_advisory09186a00807726f7.shtml | OSVDB:30169 | URL:http://www.osvdb.org/30169 | SECTRACK:1017148 | URL:http://securitytracker.com/id?1017148 | SECUNIA:22684 | URL:http://secunia.com/advisories/22684 | VUPEN:ADV-2006-4308 | URL:http://www.vupen.com/english/advisories/2006/4308 | XF:cisco-csamc-auth-bypass(29955) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29955,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5661,Candidate,Cross-site scripting (XSS) vulnerability in nquser.php in VIRtech Netquery allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header.,"BID:20837 | URL:http://www.securityfocus.com/bid/20837 | BUGTRAQ:20061101 Cross Site Scripting (XSS) Vulnerability in Netquery by ""VIRtech"" | URL:http://www.securityfocus.com/archive/1/450270/100/0/threaded | BUGTRAQ:20061111 Re: Cross Site Scripting (XSS) Vulnerability in Netquery by ""VIRtech"" | URL:http://www.securityfocus.com/archive/1/451350/100/100/threaded | CONFIRM:http://virtech.org/tools/ | FULLDISC:20061031 Cross Site Scripting (XSS) Vulnerability in Netquery by ""VIRtech"" | URL:http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050462.html | MISC:http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt | SECTRACK:1017147 | URL:http://securitytracker.com/id?1017147 | SECUNIA:22864 | URL:http://secunia.com/advisories/22864 | SREASON:1807 | URL:http://securityreason.com/securityalert/1807 | VUPEN:ADV-2006-4512 | URL:http://www.vupen.com/english/advisories/2006/4512 | XF:netquery-nquser-xss(29927) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29927",Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5662,,"SQL injection vulnerability in easy notesManager (eNM) 0.0.1 allows remote attackers to execute arbitrary SQL commands via (1) the username parameter in login.php and (2) a search on the ""search page.""",BID:20803 | URL:http://www.securityfocus.com/bid/20803 | BUGTRAQ:20061029 easy notes manager sql injection and authentication bypass | URL:http://www.securityfocus.com/archive/1/450045/100/0/threaded | SREASON:1819 | URL:http://securityreason.com/securityalert/1819 | XF:enm-search-sql-injection(29913) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29913 | XF:enm-username-sql-injection(29908) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29908,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5663,Candidate,"IBM Informix Dynamic Server 10.00, Informix Client Software Development Kit (CSDK) 2.90, and Informix I-Connect 2.90 use insecure permissions for installation scripts, which allows local users to gain privileges by modifying the scripts.",CONFIRM:http://www-1.ibm.com/support/docview.wss?uid=swg21247438 | SECTRACK:1017156 | URL:http://securitytracker.com/id?1017156 | SECUNIA:22609 | URL:http://secunia.com/advisories/22609 | VUPEN:ADV-2006-4280 | URL:http://www.vupen.com/english/advisories/2006/4280,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5664,Candidate,"The installation script in IBM Informix Dynamic Server 10.00, Informix Client Software Development Kit (CSDK) 2.90, and Informix I-Connect 2.90 allows local users to ""compromise security"" via a symlink attack on temporary files.",CONFIRM:http://www-1.ibm.com/support/docview.wss?uid=swg21247438 | SECTRACK:1017156 | URL:http://securitytracker.com/id?1017156 | SECUNIA:22609 | URL:http://secunia.com/advisories/22609 | VUPEN:ADV-2006-4280 | URL:http://www.vupen.com/english/advisories/2006/4280,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5665,Candidate,PHP remote file inclusion vulnerability in admin/modules_data.php in the phpBB module Spider Friendly 1.3.10 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.,BID:20844 | URL:http://www.securityfocus.com/bid/20844 | EXPLOIT-DB:2686 | URL:https://www.exploit-db.com/exploits/2686 | OSVDB:30160 | URL:http://www.osvdb.org/30160 | SECUNIA:22630 | URL:http://secunia.com/advisories/22630 | VUPEN:ADV-2006-4290 | URL:http://www.vupen.com/english/advisories/2006/4290 | XF:spider-modules-file-include(29899) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29899,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5666,Candidate,SQL injection vulnerability in includes/menu.inc.php in E-Annu 1.0 allows remote attackers to execute arbitrary SQL commands via the login parameter. NOTE: some of these details are obtained from third party information.,BID:20815 | URL:http://www.securityfocus.com/bid/20815 | EXPLOIT-DB:2687 | URL:https://www.exploit-db.com/exploits/2687 | SECUNIA:22631 | URL:http://secunia.com/advisories/22631 | VUPEN:ADV-2006-4279 | URL:http://www.vupen.com/english/advisories/2006/4279 | XF:eannu-login-sql-injection(29901) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29901,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5667,Candidate,Multiple PHP remote file inclusion vulnerabilities in P-Book 1.17 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the pb_lang parameter to (1) admin.php and (2) pbook.php.,BUGTRAQ:20061018 [ECHO_ADV_46$2006] P-Book <= 1.17 (pb_lang) Remote File Inclusion | URL:http://www.securityfocus.com/archive/1/449106/100/200/threaded | EXPLOIT-DB:2691 | URL:https://www.exploit-db.com/exploits/2691 | SECUNIA:22608 | URL:http://secunia.com/advisories/22608 | SREASON:1811 | URL:http://securityreason.com/securityalert/1811 | VUPEN:ADV-2006-4291 | URL:http://www.vupen.com/english/advisories/2006/4291 | XF:pbook-pblang-file-include(29651) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29651,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5668,Candidate,"Unspecified vulnerability in Ampache 3.3.2 and earlier, when register_globals is enabled, allows remote attackers to bypass security restrictions and gain guest access.",BID:20798 | URL:http://www.securityfocus.com/bid/20798 | CONFIRM:https://svn.ampache.org/branches/3.3.2/docs/CHANGELOG | SECUNIA:22842 | URL:http://secunia.com/advisories/22842 | VUPEN:ADV-2006-4236 | URL:http://www.vupen.com/english/advisories/2006/4236 | XF:ampache-session-security-bypass(29892) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29892,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5669,Candidate,"PHP remote file inclusion vulnerability in gestion/savebackup.php in Gepi 1.4.0 and earlier, and possibly other versions before 1.4.4, allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter.",BID:20830 | URL:http://www.securityfocus.com/bid/20830 | EXPLOIT-DB:2692 | URL:https://www.exploit-db.com/exploits/2692 | VIM:20061102 Source VERIFY and patch for gepi RFI | URL:http://www.attrition.org/pipermail/vim/2006-November/001104.html | XF:gepi-savebackup-file-include(29921) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29921,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5670,Candidate,PHP remote file inclusion vulnerability in forgot_pass.php in Free Image Hosting 1.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter.,BID:20782 | URL:http://www.securityfocus.com/bid/20782 | EXPLOIT-DB:2669 | URL:https://www.exploit-db.com/exploits/2669 | OSVDB:30127 | URL:http://www.osvdb.org/30127 | SECUNIA:22597 | URL:http://secunia.com/advisories/22597 | VUPEN:ADV-2006-4229 | URL:http://www.vupen.com/english/advisories/2006/4229 | XF:freeimage-forgot-file-include(29873) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29873,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5671,Candidate,PHP remote file inclusion vulnerability in contact.php in Free Image Hosting 1.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.,VUPEN:ADV-2006-4229 | URL:http://www.vupen.com/english/advisories/2006/4229,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5672,Candidate,PHP remote file inclusion vulnerability in web/init_mysource.php in MySource CMS 2.16.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the INCLUDE_PATH parameter.,BID:20817 | URL:http://www.securityfocus.com/bid/20817 | EXPLOIT-DB:2674 | URL:https://www.exploit-db.com/exploits/2674 | VUPEN:ADV-2006-4273 | URL:http://www.vupen.com/english/advisories/2006/4273 | XF:mysource-init-file-include(29865) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29865,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5673,Candidate,"PHP remote file inclusion vulnerability in bb_func_txt.php in miniBB 2.0.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the pathToFiles parameter.",BID:20757 | URL:http://www.securityfocus.com/bid/20757 | CONFIRM:http://www.minibb.net/forums/9_4274_0.html | EXPLOIT-DB:2655 | URL:https://www.exploit-db.com/exploits/2655 | OSVDB:29971 | URL:http://www.osvdb.org/29971 | SECUNIA:22596 | URL:http://secunia.com/advisories/22596 | VUPEN:ADV-2006-4222 | URL:http://www.vupen.com/english/advisories/2006/4222 | XF:minibb-bbfunctxt-file-include(29831) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29831,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5674,Candidate,"Multiple PHP remote file inclusion vulnerabilities in miniBB 2.0.2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the pathToFiles parameter to (1) bb_func_forums.php, (2) bb_functions.php, or (3) the RSS plugin.",CONFIRM:http://www.minibb.net/forums/9_4274_0.html | OSVDB:33963 | URL:http://osvdb.org/33963 | OSVDB:33964 | URL:http://osvdb.org/33964 | OSVDB:33965 | URL:http://osvdb.org/33965,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5675,Candidate,"Multiple unspecified vulnerabilities in Pentaho Business Intelligence (BI) Suite before 1.2 RC3 (1.2.0.470-RC3) have unknown impact and attack vectors, related to ""MySQL Scripts need changes for security,"" possibly SQL injection vulnerabilities associated with these scripts.",BID:20806 | URL:http://www.securityfocus.com/bid/20806 | CONFIRM:http://sourceforge.net/project/shownotes.php?group_id=140317&release_id=456313 | VUPEN:ADV-2006-4252 | URL:http://www.vupen.com/english/advisories/2006/4252 | XF:pentaho-bi-unspecified-sql-injection(39999) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/39999,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5676,Candidate,SQL injection vulnerability in consult/classement.php in Uni-Vert PhpLeague 0.82 and earlier allows remote attackers to execute arbitrary SQL commands via the champ parameter.,EXPLOIT-DB:2661 | URL:https://www.exploit-db.com/exploits/2661 | SECUNIA:21789 | URL:http://secunia.com/advisories/21789 | VUPEN:ADV-2006-4225 | URL:http://www.vupen.com/english/advisories/2006/4225 | XF:phpleague-classement-sql-injection(29867) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29867,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5677,Candidate,resmom/start_exec.c in pbs_mom in TORQUE Resource Manager 2.0.0p8 and earlier allows local users to create arbitrary files via a symlink attack on (1) a job output file in /usr/spool/PBS/spool and possibly (2) a job file in /usr/spool/PBS/mom_priv/jobs.,BID:20632 | URL:http://www.securityfocus.com/bid/20632 | BUGTRAQ:20061018 TORQUE Spool Job Race condition (torque <= 2.0.0p8) | URL:http://www.securityfocus.com/archive/1/449248/100/200/threaded | GENTOO:GLSA-200611-14 | URL:http://security.gentoo.org/glsa/glsa-200611-14.xml | MISC:http://csirt.fe.up.pt/docs/TORQUE-audit.pdf | SREASON:1820 | URL:http://securityreason.com/securityalert/1820 | VUPEN:ADV-2006-4651 | URL:http://www.vupen.com/english/advisories/2006/4651,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5678,,"** DISPUTED ** PHP remote file inclusion vulnerability in common/visiteurs/include/library.inc.php in J-Pierre DEZELUS Les Visiteurs 2.0.1, as used in phpMyConferences (phpMyConference) 8.0.2 and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the lvc_modules_dir parameter. NOTE: CVE disputes this vulnerability, because the inclusion occurs in a function that is not called during a direct request to library.inc.php.",BUGTRAQ:20061031 phpMyConferences <= 8.0.2 Remote File Inclusion | URL:http://www.securityfocus.com/archive/1/450140/100/0/threaded | BUGTRAQ:20061103 Re: phpMyConferences <= 8.0.2 Remote File Inclusion | URL:http://www.securityfocus.com/archive/1/450467/100/0/threaded | SREASON:1810 | URL:http://securityreason.com/securityalert/1810 | VIM:20061102 CVE dispute - phpMyConferences RFI | URL:http://www.attrition.org/pipermail/vim/2006-November/001105.html | XF:phpmyconferences-library-file-include(29919) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29919,Assigned (20061102),None (candidate not yet proposed), +CVE-2006-5679,Candidate,Integer overflow in the ffs_mountfs function in FreeBSD 6.1 allows local users to cause a denial of service (panic) and possibly execute arbitrary code via a crafted UFS filesystem that causes invalid or large size parameters to be provided to the kmem_alloc function. NOTE: a third party states that this issue does not cross privilege boundaries in FreeBSD because only root may mount a filesystem.,APPLE:APPLE-SA-2007-03-13 | URL:http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html | BID:20918 | URL:http://www.securityfocus.com/bid/20918 | CERT:TA07-072A | URL:http://www.us-cert.gov/cas/techalerts/TA07-072A.html | CERT-VN:VU#552136 | URL:http://www.kb.cert.org/vuls/id/552136 | CONFIRM:http://docs.info.apple.com/article.html?artnum=305214 | MISC:http://projects.info-pull.com/mokb/MOKB-03-11-2006.html | MLIST:[freebsd-security] 20070114 MOAB advisories | URL:http://lists.freebsd.org/pipermail/freebsd-security/2007-January/004218.html | SECTRACK:1017751 | URL:http://www.securitytracker.com/id?1017751 | SECUNIA:22736 | URL:http://secunia.com/advisories/22736 | SECUNIA:24479 | URL:http://secunia.com/advisories/24479 | VUPEN:ADV-2007-0930 | URL:http://www.vupen.com/english/advisories/2007/0930,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5680,Candidate,"The libarchive library in FreeBSD 6-STABLE after 2006-09-05 and before 2006-11-08 allows context-dependent attackers to cause a denial of service (CPU consumption) via a malformed archive that causes libarchive to skip a region past the actual end of the archive, which triggers an infinite loop that attempts to read more data.",BID:20961 | URL:http://www.securityfocus.com/bid/20961 | FREEBSD:FreeBSD-SA-06:24 | URL:http://security.freebsd.org/advisories/FreeBSD-SA-06:24.libarchive.asc | SECTRACK:1017199 | URL:http://securitytracker.com/id?1017199 | SECUNIA:22723 | URL:http://secunia.com/advisories/22723 | SECUNIA:22801 | URL:http://secunia.com/advisories/22801 | XF:freebsd-libarchive-file-dos(30137) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30137,Assigned (20061103),None (candidate not yet proposed), +?VE-2006-5681,Candidate,"QuickTime for Java on Mac OS X 10.4 through 10.4.8, when used with Quartz Composer, allows remote attackers to obtain sensitive information (screen images) via a Java applet that accesses images that are being rendered by other embedded QuickTime objects.",APPLE:APPLE-SA-2006-12-19 | URL:http://lists.apple.com/archives/Security-announce/2006/Dec/msg00000.html | BID:21672 | URL:http://www.securityfocus.com/bid/21672 | MISC:http://docs.info.apple.com/article.html?artnum=304916 | OSVDB:32380 | URL:http://www.osvdb.org/32380 | SECTRACK:1017402 | URL:http://securitytracker.com/id?1017402 | SECUNIA:23438 | URL:http://secunia.com/advisories/23438 | VUPEN:ADV-2006-5072 | URL:http://www.vupen.com/english/advisories/2006/5072,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5682,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5683,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5684,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5685,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +,Cadidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5688,,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5689,,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5690,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5691,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5692,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +,,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5694,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5695,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5696,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5697,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-568,,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5699,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5700,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2006. Notes: none.,,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5701,Candidate,"Double free vulnerability in squashfs module in the Linux kernel 2.6.x, as used in Fedora Core 5 and possibly other distributions, allows local users to cause a denial of service by mounting a crafted squashfs filesystem.",BID:20870 | URL:http://www.securityfocus.com/bid/20870 | MANDRIVA:MDKSA-2007:047 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:047 | MISC:http://projects.info-pull.com/mokb/MOKB-02-11-2006.html | SECUNIA:22655 | URL:http://secunia.com/advisories/22655 | SECUNIA:23361 | URL:http://secunia.com/advisories/23361 | SECUNIA:23384 | URL:http://secunia.com/advisories/23384 | SECUNIA:24259 | URL:http://secunia.com/advisories/24259 | UBUNTU:USN-395-1 | URL:http://www.ubuntu.com/usn/usn-395-1 | XF:linux-squashfs-doublefree-dos(29967) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29967,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5702,Candidate,"Tikiwiki 1.9.5 allows remote attackers to obtain sensitive information (MySQL username and password) via an empty sort_mode parameter in (1) tiki-listpages.php, (2) tiki-lastchanges.php, (3) messu-archive.php, (4) messu-mailbox.php, (5) messu-sent.php, (6) tiki-directory_add_site.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-forums.php, (10) tiki-view_forum.php, (11) tiki-friends.php, (12) tiki-list_blogs.php, (13) tiki-list_faqs.php, (14) tiki-list_trackers.php, (15) tiki-list_users.php, (16) tiki-my_tiki.php, (17) tiki-notepad_list.php, (18) tiki-orphan_pages.php, (19) tiki-shoutbox.php, (20) tiki-usermenu.php, and (21) tiki-webmail_contacts.php, which reveal the information in certain database error messages.",BID:20858 | URL:http://www.securityfocus.com/bid/20858 | BUGTRAQ:20061101 tikiwiki 1.9.5 mysql password disclosure & xss | URL:http://www.securityfocus.com/archive/1/450268/100/0/threaded | GENTOO:GLSA-200611-11 | URL:http://security.gentoo.org/glsa/glsa-200611-11.xml | SECUNIA:22678 | URL:http://secunia.com/advisories/22678 | SECUNIA:23039 | URL:http://secunia.com/advisories/23039 | SREASON:1816 | URL:http://securityreason.com/securityalert/1816 | VUPEN:ADV-2006-4316 | URL:http://www.vupen.com/english/advisories/2006/4316 | XF:tikiwiki-password-info-disclosure(29960) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29960,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5703,,"Cross-site scripting (XSS) vulnerability in tiki-featured_link.php in Tikiwiki 1.9.5 allows remote attackers to inject arbitrary web script or HTML via a url parameter that evades filtering, as demonstrated by a parameter value containing malformed, nested SCRIPT elements.",BID:20858 | URL:http://www.securityfocus.com/bid/20858 | BUGTRAQ:20061101 tikiwiki 1.9.5 mysql password disclosure & xss | URL:http://www.securityfocus.com/archive/1/450268/100/0/threaded | GENTOO:GLSA-200611-11 | URL:http://security.gentoo.org/glsa/glsa-200611-11.xml | SECUNIA:22678 | URL:http://secunia.com/advisories/22678 | SECUNIA:23039 | URL:http://secunia.com/advisories/23039 | SREASON:1816 | URL:http://securityreason.com/securityalert/1816 | VUPEN:ADV-2006-4316 | URL:http://www.vupen.com/english/advisories/2006/4316 | XF:tikiwiki-tikifeatured-xss(29958) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29958,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5704,,"HP NonStop Server G06.29, when running Standard Security T6533G06 before T6533G06^ABK, does not properly evaluate access permissions to OSS directories when no optional ACL entry exists, which allows local users to read arbitrary files.",BID:20824 | URL:http://www.securityfocus.com/bid/20824 | CIAC:R-027 | URL:http://www.ciac.org/ciac/bulletins/r-027.shtml | HP:HPSBNS02166 | URL:http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00795238 | HP:SSRT061255 | URL:http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00795238 | SECTRACK:1017135 | URL:http://securitytracker.com/id?1017135 | VUPEN:ADV-2006-4301 | URL:http://www.vupen.com/english/advisories/2006/4301 | XF:hp-nonstop-unauth-access(29951) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29951,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5705,Canddate,Multiple directory traversal vulnerabilities in plugins/wp-db-backup.php in WordPress before 2.0.5 allow remote authenticated users to read or overwrite arbitrary files via directory traversal sequences in the (1) backup and (2) fragment parameters in a GET request.,BID:20869 | URL:http://www.securityfocus.com/bid/20869 | CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=153303 | CONFIRM:http://markjaquith.wordpress.com/2006/10/17/changes-in-wordpress-205/ | CONFIRM:http://trac.wordpress.org/changeset/4226 | CONFIRM:http://wordpress.org/development/2006/10/205-ronan/ | GENTOO:GLSA-200611-10 | URL:http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml | OPENPKG:OpenPKG-SA-2006.027 | URL:http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.027-wordpress.html | SECUNIA:22683 | URL:http://secunia.com/advisories/22683 | SECUNIA:22942 | URL:http://secunia.com/advisories/22942 | VUPEN:ADV-2006-4307 | URL:http://www.vupen.com/english/advisories/2006/4307,Assigned (20061103),None (candidate not yet proposed), +,Candidate,"Unspecified vulnerabilities in PHP, probably before 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions. NOTE: the tempnam vector might overlap CVE-2006-1494.",MISC:http://www.php.net/releases/5_2_0.php | UBUNTU:USN-375-1 | URL:http://www.ubuntu.com/usn/usn-375-1,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5707,Candidate,SQL injection vulnerability in index.php in PHPEasyData Pro 1.4.1 and 2.2.1 allows remote attackers to execute arbitrary SQL commands via the cat parameter.,BID:20790 | URL:http://www.securityfocus.com/bid/20790 | BUGTRAQ:20061029 PHPEasyData Pro 1.4.1 (index.php) Remote SQL Injection Vulnerability | URL:http://www.securityfocus.com/archive/1/450052/100/0/threaded | BUGTRAQ:20061029 PHPEasyData Pro 2.2.1 (index.php) Remote SQL Injection Vulnerability | URL:http://www.securityfocus.com/archive/1/450054/100/0/threaded | EXPLOIT-DB:2675 | URL:https://www.exploit-db.com/exploits/2675 | SECTRACK:1017137 | URL:http://securitytracker.com/id?1017137 | SECUNIA:22616 | URL:http://secunia.com/advisories/22616 | SREASON:1814 | URL:http://securityreason.com/securityalert/1814 | VUPEN:ADV-2006-4263 | URL:http://www.vupen.com/english/advisories/2006/4263 | XF:phpeasydata-index-sql-injection(29866) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29866,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5708,Candidate,Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.,CONFIRM:http://files.altn.com/MDaemon/Release/RelNotes_en.txt,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5709,Candidate,"Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a ""JavaScript exploit.""",CONFIRM:http://files.altn.com/MDaemon/Release/RelNotes_en.txt | SECUNIA:22507 | URL:http://secunia.com/advisories/22507 | VUPEN:ADV-2006-4251 | URL:http://www.vupen.com/english/advisories/2006/4251,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5710,Candidate,"The Airport driver for certain Orinoco based Airport cards in Darwin kernel 8.8.0 in Apple Mac OS X 10.4.8, and possibly other versions, allows remote attackers to execute arbitrary code via an 802.11 probe response frame without any valid information element (IE) fields after the header, which triggers a heap-based buffer overflow.",APPLE:APPLE-SA-2006-11-28 | URL:http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html | BID:20862 | URL:http://www.securityfocus.com/bid/20862 | CERT:TA06-333A | URL:http://www.us-cert.gov/cas/techalerts/TA06-333A.html | CERT-VN:VU#191336 | URL:http://www.kb.cert.org/vuls/id/191336 | CONFIRM:http://docs.info.apple.com/article.html?artnum=304829 | MISC:http://projects.info-pull.com/mokb/MOKB-01-11-2006.html | OSVDB:30180 | URL:http://www.osvdb.org/30180 | SECTRACK:1017151 | URL:http://securitytracker.com/id?1017151 | SECUNIA:22679 | URL:http://secunia.com/advisories/22679 | SECUNIA:23155 | URL:http://secunia.com/advisories/23155 | VUPEN:ADV-2006-4313 | URL:http://www.vupen.com/english/advisories/2006/4313 | VUPEN:ADV-2006-4750 | URL:http://www.vupen.com/english/advisories/2006/4750 | XF:airport-driver-code-execution(29965) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29965,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5711,Canidate,"ECI Telecom B-FOCuS Wireless 802.11b/g ADSL2+ Router allows remote attackers to read arbitrary files via a certain HTTP request, as demonstrated by a request for a router configuration file, related to the /html/defs/ URI.","BID:20834 | URL:http://www.securityfocus.com/bid/20834 | BUGTRAQ:20061031 Directory listing on B-FOCuS Wireless 802.11b/g ADSL2+ Router by ""ECI Telecom LTD"" | URL:http://www.securityfocus.com/archive/1/450187/100/0/threaded | FULLDISC:20061031 Directory listing on B-FOCuS Wireless 802.11b/g ADSL2+ Router by ""ECI Telecom LTD"" | URL:http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050459.html | SECTRACK:1017145 | URL:http://securitytracker.com/id?1017145 | SECUNIA:22667 | URL:http://secunia.com/advisories/22667 | SREASON:1817 | URL:http://securityreason.com/securityalert/1817 | VUPEN:ADV-2006-4331 | URL:http://www.vupen.com/english/advisories/2006/4331 | XF:eci-bfocus-url-information-disclosure(29931) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29931",Assigned (20061103),None (candidate not yet proposed), +CVE-2006-712,Candidate,"Cross-site scripting (XSS) vulnerability in Mirapoint WebMail allows remote attackers to inject arbitrary web script via the expression Cascading Style Sheets (CSS) function, as demonstrated using the width style for an IMG element.","BID:20840 | URL:http://www.securityfocus.com/bid/20840 | FULLDISC:20061031 Cross Site Scripting (XSS) Vulnerability in Web Mail platform by ""Mirapoint"" | URL:http://marc.info/?l=full-disclosure&m=116232831525086&w=2 | OSVDB:33820 | URL:http://osvdb.org/33820 | SECTRACK:1017146 | URL:http://securitytracker.com/id?1017146 | XF:webmail-expression-xss(29928) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29928",Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5713,Candidate,"Cross-site scripting (XSS) vulnerability in Easy File Sharing (EFS) Web Server 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) author, (2) content, or (3) title parameters when posting a forum thread. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.",BID:20823 | URL:http://www.securityfocus.com/bid/20823 | SECUNIA:22602 | URL:http://secunia.com/advisories/22602 | XF:easyfilesharing-forum-thread-xss(29923) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29923,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5714,Candidate,"Easy File Sharing (EFS) Web Server 4.0, when running on an NTFS file system, allows remote attackers to read arbitrary files under the web root by appending ""::$DATA"" to the end of a HTTP GET request, which accesses the alternate data stream.",BID:20823 | URL:http://www.securityfocus.com/bid/20823 | EXPLOIT-DB:2690 | URL:https://www.exploit-db.com/exploits/2690 | SECUNIA:22602 | URL:http://secunia.com/advisories/22602 | XF:easyfilesharing-ntfs-info-disclosure(29925) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29925,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5715,Candidate,"Easy File Sharing (EFS) Easy Address Book 1.2, when run on an NTFS file system, allows remote attackers to read arbitrary files under the web root by appending ""::$DATA"" to the end of an HTTP GET request, which accesses the alternate data stream.",BID:20861 | URL:http://www.securityfocus.com/bid/20861 | EXPLOIT-DB:2699 | URL:https://www.exploit-db.com/exploits/2699 | SECUNIA:22681 | URL:http://secunia.com/advisories/22681 | VUPEN:ADV-2006-4312 | URL:http://www.vupen.com/english/advisories/2006/4312 | XF:easyaddressbook-ntfs-info-disclosure(29976) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29976,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5716,Candidate,"Directory traversal vulnerability in aff_news.php in FreeNews 2.1 allows remote attackers to include local files via a .. (dot dot) sequence in the chemin parameter, when the aff_news parameter is not set to ""1.""",BID:20795 | URL:http://www.securityfocus.com/bid/20795 | BUGTRAQ:20061028 freenews---> fileinclude | URL:http://www.securityfocus.com/archive/1/450012/100/0/threaded | BUGTRAQ:20061030 Re: freenews---> fileinclude | URL:http://www.securityfocus.com/archive/1/450081/100/0/threaded | BUGTRAQ:20061031 Re: freenews---> fileinclude | URL:http://www.securityfocus.com/archive/1/450157/100/0/threaded | SREASON:1822 | URL:http://securityreason.com/securityalert/1822 | XF:freenews-affnews-file-include(29896) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29896,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5717,Candidate,"Multiple cross-site scripting (XSS) vulnerabilities in Zend Google Data Client Library (ZendGData) Preview 0.2.0 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters in (1) basedemo.php and (2) calenderdemo.php in samples/, and other unspecified files.",BID:20851 | URL:http://www.securityfocus.com/bid/20851 | BUGTRAQ:20061101 Multiple XSS Vulnerabilities in Zend Google Data Client Library Preview 0.2.0 | URL:http://www.securityfocus.com/archive/1/450245/100/0/threaded | MISC:http://www.armorize.com/resources/vulnerability.php?Keyword=Armorize-ADV-2006-0008 | SREASON:1815 | URL:http://securityreason.com/securityalert/1815,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5718,Candidate,"Cross-site scripting (XSS) vulnerability in error.php in phpMyAdmin 2.6.4 through 2.9.0.2 allows remote attackers to inject arbitrary web script or HTML via UTF-7 or US-ASCII encoded characters, which are injected into an error message, as demonstrated by a request with a utf7 charset parameter accompanied by UTF-7 data.",BID:20856 | URL:http://www.securityfocus.com/bid/20856 | BUGTRAQ:20061102 Advisory 12/2006: phpMyAdmin - error.php XSS Vulnerability | URL:http://www.securityfocus.com/archive/1/450397/100/0/threaded | CONFIRM:http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-6 | MISC:http://www.hardened-php.net/advisory_122006.137.html | SECUNIA:22599 | URL:http://secunia.com/advisories/22599 | SECUNIA:23086 | URL:http://secunia.com/advisories/23086 | SUSE:SUSE-SA:2006:071 | URL:http://lists.suse.com/archive/suse-security-announce/2006-Nov/0010.html | VUPEN:ADV-2006-4298 | URL:http://www.vupen.com/english/advisories/2006/4298 | XF:phpmyadmin-utf7-xss(29957) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29957,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5719,Candidate,"SQL injection vulnerability in libs/sessions.lib.php in BytesFall Explorer (bfExplorer) 0.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified parameters, a different issue than CVE-2006-5606.",BID:20828 | URL:http://www.securityfocus.com/bid/20828 | BUGTRAQ:20061031 SQL Injection Vulnerability in bfExplorer 0.0.6 | URL:http://www.securityfocus.com/archive/1/450152/100/0/threaded | MISC:http://www.armorize.com/resources/vulnerability.php?Keyword=Armorize-ADV-2006-0007 | SREASON:1813 | URL:http://securityreason.com/securityalert/1813 | XF:bfexplorer-lib-slq-injection(29932) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29932,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5720,Candidate,SQL injection vulnerability in modules/journal/search.php in the Journal module in Francisco Burzi PHP-Nuke 7.9 and earlier allows remote attackers to execute arbitrary SQL commands via the forwhat parameter.,"BID:20829 | URL:http://www.securityfocus.com/bid/20829 | BUGTRAQ:20061031 PHP-Nuke <= 7.9 Journal module (search.php) ""forwhat"" SQL Injection vulnerability | URL:http://www.securityfocus.com/archive/1/450183/100/0/threaded | MISC:http://www.neosecurityteam.net/index.php?action=advisories&id=29 | SECUNIA:22617 | URL:http://secunia.com/advisories/22617 | SREASON:1812 | URL:http://securityreason.com/securityalert/1812 | VUPEN:ADV-2006-4295 | URL:http://www.vupen.com/english/advisories/2006/4295 | XF:journal-search-sql-injection(29940) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29940",Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5721,Candidate,The \Device\SandBox driver in Outpost Firewall PRO 4.0 (964.582.059) allows local users to cause a denial of service (system crash) via an invalid argument to the DeviceIoControl function that triggers an invalid memory operation.,BID:20860 | URL:http://www.securityfocus.com/bid/20860 | BUGTRAQ:20061101 Outpost Insufficient validation of 'SandBox' driver input buffer | URL:http://www.securityfocus.com/archive/1/450293/100/0/threaded | MISC:http://www.matousec.com/info/advisories/Outpost-Insufficient-validation-of-SandBox-driver-input-buffer.php | SECTRACK:1017150 | URL:http://securitytracker.com/id?1017150 | SECUNIA:22673 | URL:http://secunia.com/advisories/22673 | SREASON:1821 | URL:http://securityreason.com/securityalert/1821 | VUPEN:ADV-2006-4309 | URL:http://www.vupen.com/english/advisories/2006/4309 | XF:outpostfirewall-sandbox-dos(29969) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29969,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5722,Candidate,"Multiple PHP remote file inclusion vulnerabilities in Segue CMS 1.5.9 and earlier, when magic_quotes_gpc is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the theme parameter to (1) themesettings.php or (2) index.php, a different vector than CVE-2006-5497. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.",SECUNIA:22582 | URL:http://secunia.com/advisories/22582 | VUPEN:ADV-2006-4215 | URL:http://www.vupen.com/english/advisories/2006/4215,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5723,Candidate,SQL injection vulnerability in DataparkSearch Engine 4.42 and earlier allows remote attackers to execute arbitrary SQL commands via a malformed hostname in a URL.,BID:20872 | URL:http://www.securityfocus.com/bid/20872 | CONFIRM:http://www.dataparksearch.org/ChangeLog | VUPEN:ADV-2006-4311 | URL:http://www.vupen.com/english/advisories/2006/4311 | XF:datapark-hostname-sql-injection(29979) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29979,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5724,Candidate,"Heap-based buffer overflow the ""Answering Service"" function in ICQ 2003b Build 3916 allows local users to cause a denial of service (application crash) via a long string in the ""AwayMsg Presets"" value in the ICQ\ICQPro\DefaultPrefs\Presets registry key.","FULLDISC:20061031 Local Heap OverFlow Vulnerability in ""Answering Service"" of Icq | URL:http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050461.html | SREASON:1818 | URL:http://securityreason.com/securityalert/1818 | XF:icq-answering-service-bo(29933) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29933",Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5725,Candidate,"The SSL server in AEP Smartgate 4.3b allows remote attackers to determine existence of directories via a direct request for a directory URI, which returns different HTTP status codes for existing and non-existing directories.",EXPLOIT-DB:2637 | URL:https://www.exploit-db.com/exploits/2637 | MISC:https://prdelka.blackart.org.uk/exploitz/prdelka-vs-AEP-smartgate.c | SECUNIA:22550 | URL:http://secunia.com/advisories/22550 | VUPEN:ADV-2006-4224 | URL:http://www.vupen.com/english/advisories/2006/4224 | XF:smartgate-header-information-disclosure(29802) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29802,Assigned (20061103),None (candidate not yet proposed), +CVE-2006-5726,Candidate,alloccgblk in the UFS filesystem in Solaris 10 allows local users to cause a denial of service (memory corruption) by mounting crafted UFS filesystems with malformed data structures.,BID:20919 | URL:http://www.securityfocus.com/bid/20919 | MISC:http://projects.info-pull.com/mokb/MOKB-04-11-2006.html | SECUNIA:22714 | URL:http://secunia.com/advisories/22714 | VUPEN:ADV-2006-4357 | URL:http://www.vupen.com/english/advisories/2006/4357,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5727,Candidate,PHP remote file inclusion vulnerability in admin/controls/cart.php in sazcart 1.5 allows remote attackers to execute arbitrary PHP code via the (1) _saz[settings][shippingfolder] and (2) _saz[settings][taxfolder] parameters.,BID:20922 | URL:http://www.securityfocus.com/bid/20922 | BUGTRAQ:20070109 sazcart v1.5 (cart.php) Remote File include | URL:http://www.securityfocus.com/archive/1/456542/100/0/threaded | EXPLOIT-DB:2718 | URL:https://www.exploit-db.com/exploits/2718 | OSVDB:30194 | URL:http://www.osvdb.org/30194 | SECUNIA:22708 | URL:http://secunia.com/advisories/22708 | VIM:20070110 Vulnerable: sazcart v1.5 (cart.php) Remote File include | URL:http://www.attrition.org/pipermail/vim/2007-January/001232.html | VUPEN:ADV-2006-4343 | URL:http://www.vupen.com/english/advisories/2006/4343 | XF:sazcart-cart-file-include(30013) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30013,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5728,Candidate,"XM Easy Personal FTP Server 5.2.1 and earlier allows remote authenticated users to cause a denial of service via a long argument to the NLST command, possibly involving the -al flags.",EXPLOIT-DB:2715 | URL:https://www.exploit-db.com/exploits/2715 | SECUNIA:22717 | URL:http://secunia.com/advisories/22717 | VUPEN:ADV-2006-4365 | URL:http://www.vupen.com/english/advisories/2006/4365 | XF:xm-ftp-nlst-dos(30041) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30041,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5729,Candidate,"Yazd Discussion Forum before 3.0 beta does not properly manage forum permissions, which allows remote authenticated users to (1) reply to a message in an arbitrary forum, if authorized to create a message in any forum; and (2) perform certain unauthorized forum actions, related to an ""error in how the permissions were assembled"" that assigns extra permissions to users.",BID:20889 | URL:http://www.securityfocus.com/bid/20889 | CONFIRM:http://sourceforge.net/project/shownotes.php?group_id=39239&release_id=460547 | SECUNIA:22690 | URL:http://secunia.com/advisories/22690 | XF:yazd-messages-security-bypass(29996) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29996 | XF:yazd-unspecified-security-bypass(29994) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29994,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5730,Candidate,PHP remote file inclusion vulnerability in manager/media/browser/mcpuk/connectors/php/Commands/Thumbnail.php in Modx CMS 0.9.2.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the base_path parameter. NOTE: it is possible that this is a vulnerability in FCKeditor.,BID:20898 | URL:http://www.securityfocus.com/bid/20898 | EXPLOIT-DB:2706 | URL:https://www.exploit-db.com/exploits/2706 | OSVDB:30186 | URL:http://www.osvdb.org/30186 | SECUNIA:22675 | URL:http://secunia.com/advisories/22675 | VUPEN:ADV-2006-4346 | URL:http://www.vupen.com/english/advisories/2006/4346 | XF:modx-thumbnail-file-include(29989) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29989,Assigned (20061106),None (candidate not yet proposed), +,Candidate,"Directory traversal vulnerability in classes/index.php in Lithium CMS 4.04c and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the siteconf[curl] parameter, as demonstrated by a POST to news/comment.php containing PHP code, which is stored under db/comments/news/ and included by classes/index.php.",BID:20871 | URL:http://www.securityfocus.com/bid/20871 | EXPLOIT-DB:2702 | URL:https://www.exploit-db.com/exploits/2702 | SECUNIA:22593 | URL:http://secunia.com/advisories/22593 | VUPEN:ADV-2006-4361 | URL:http://www.vupen.com/english/advisories/2006/4361 | XF:lithiumcms-index-file-include(29966) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29966,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5732,Canidate,SQL injection vulnerability in logout.php in T.G.S. CMS 0.1.7 and earlier allows remote attackers to execute arbitrary SQL commands via the myauthorid cookie.,BID:20850 | URL:http://www.securityfocus.com/bid/20850 | CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=464660&group_id=173946 | EXPLOIT-DB:2694 | URL:https://www.exploit-db.com/exploits/2694 | VUPEN:ADV-2006-4667 | URL:http://www.vupen.com/english/advisories/2006/4667 | XF:tgscms-logout-sql-injection(29941) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29941,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5733,Candidate,"Directory traversal vulnerability in error.php in PostNuke 0.763 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.",BID:20897 | URL:http://www.securityfocus.com/bid/20897 | BID:21218 | URL:http://www.securityfocus.com/bid/21218 | CONFIRM:http://community.postnuke.com/Article2787.htm | EXPLOIT-DB:2707 | URL:https://www.exploit-db.com/exploits/2707 | SECUNIA:22983 | URL:http://secunia.com/advisories/22983 | XF:postnuke-pnapi-file-include(29992) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29992,Assigned (20061106),None (candidate not yet proposed), +,,"Multiple PHP remote file inclusion vulnerabilities in ATutor 1.5.3.2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) section parameter in (a) documentation/common/frame_toc.php and (b) documentation/common/search.php, the (2) req_lang parameter in documentation/common/search.php and (c) documentation/common/vitals.inc.php, the (3) row[dir_name] parameter in (d) include/classes/module/module.class.php, and the (4) lang_path parameter in (e) include/classes/phpmailer/class.phpmailer.php. NOTE: the print.php vector is already covered by CVE-2005-3404.",BID:20634 | URL:http://www.securityfocus.com/bid/20634 | BUGTRAQ:20061019 ATutor 1.5.3.2=> Remote File Include Vulnerability | URL:http://www.securityfocus.com/archive/1/449233/100/200/threaded | SREASON:1823 | URL:http://securityreason.com/securityalert/1823 | XF:atutor-section-file-include(29693) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29693,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5735,Candidate,"Directory traversal vulnerability in include/common.php in PunBB before 1.2.14 allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the language parameter, related to register.php storing a language value in the users table.",BUGTRAQ:20061030 Punbb <= 1.2.13 Multiple Vulnerabilities | URL:http://www.securityfocus.com/archive/1/450055/100/0/threaded | CONFIRM:http://www.punbb.org/changelogs/1.2.13_to_1.2.14.txt | MISC:http://www.wargan.org/index.php/2006/10/29/4-punbb-1213-multiple-vulnerabilities | OSVDB:30132 | URL:http://www.osvdb.org/30132 | SECTRACK:1017131 | URL:http://securitytracker.com/id?1017131 | SECUNIA:22622 | URL:http://secunia.com/advisories/22622 | SREASON:1824 | URL:http://securityreason.com/securityalert/1824 | VUPEN:ADV-2006-4256 | URL:http://www.vupen.com/english/advisories/2006/4256,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5736,Can*ida|e,"SQL injection vulnerability in search.php in PunBB before 1.2.14, when the PHP installation is vulnerable to CVE-2006-3017, allows remote attackers to execute arbitrary SQL commands via the result_list array parameter, which is not initialized.",BUGTRAQ:20061030 Punbb <= 1.2.13 Multiple Vulnerabilities | URL:http://www.securityfocus.com/archive/1/450055/100/0/threaded | CONFIRM:http://www.punbb.org/changelogs/1.2.13_to_1.2.14.txt | MISC:http://www.wargan.org/index.php/2006/10/29/4-punbb-1213-multiple-vulnerabilities | OSVDB:30133 | URL:http://www.osvdb.org/30133 | SECTRACK:1017131 | URL:http://securitytracker.com/id?1017131 | SREASON:1824 | URL:http://securityreason.com/securityalert/1824 | VUPEN:ADV-2006-4256 | URL:http://www.vupen.com/english/advisories/2006/4256,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5737,Candidate,"PunBB uses a predictable cookie_seed value that can be derived from the time of registration of the superadmin account (installation time), which might allow local users to perform unauthorized actions.",BUGTRAQ:20061030 Punbb <= 1.2.13 Multiple Vulnerabilities | URL:http://www.securityfocus.com/archive/1/450055/100/0/threaded | MISC:http://www.wargan.org/index.php/2006/10/29/4-punbb-1213-multiple-vulnerabilities | OSVDB:30134 | URL:http://www.osvdb.org/30134 | SECTRACK:1017131 | URL:http://securitytracker.com/id?1017131,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5738,,Multiple SQL injection vulnerabilities in PunBB before 1.2.14 allow remote authenticated administrators to execute arbitrary SQL commands via unspecified vectors.,CONFIRM:http://forums.punbb.org/viewtopic.php?id=13496 | CONFIRM:http://www.punbb.org/changelogs/1.2.13_to_1.2.14.txt,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5739,Candidate,"PHP remote file inclusion vulnerability in cpadmin/cpa_index.php in Leicestershire communityPortals 1.0_2005-10-18_12-31-18 allows remote attackers to execute arbitrary PHP code via a URL in the cp_root_path parameter, a different vector than CVE-2006-5280.",SECTRACK:1017047 | URL:http://securitytracker.com/id?1017047 | XF:community-portals-importarchive-file-include(29487) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29487,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5740,Candidate,Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet.,BID:20762 | URL:http://www.securityfocus.com/bid/20762 | BUGTRAQ:20061101 rPSA-2006-0202-1 tshark wireshark | URL:http://www.securityfocus.com/archive/1/450307/100/0/threaded | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm | CONFIRM:http://www.wireshark.org/security/wnpa-sec-2006-03.html | CONFIRM:https://issues.rpath.com/browse/RPL-746 | MANDRIVA:MDKSA-2006:195 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:195 | OVAL:oval:org.mitre.oval:def:14679 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14679 | OVAL:oval:org.mitre.oval:def:9482 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9482 | REDHAT:RHSA-2006:0726 | URL:http://www.redhat.com/support/errata/RHSA-2006-0726.html | SECTRACK:1017129 | URL:http://securitytracker.com/alerts/2006/Oct/1017129.html | SECUNIA:22590 | URL:http://secunia.com/advisories/22590 | SECUNIA:22672 | URL:http://secunia.com/advisories/22672 | SECUNIA:22692 | URL:http://secunia.com/advisories/22692 | SECUNIA:22797 | URL:http://secunia.com/advisories/22797 | SECUNIA:22841 | URL:http://secunia.com/advisories/22841 | SECUNIA:22929 | URL:http://secunia.com/advisories/22929 | SECUNIA:23096 | URL:http://secunia.com/advisories/23096 | SGI:20061101-01-P | URL:ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P | SUSE:SUSE-SA:2006:065 | URL:http://www.novell.com/linux/security/advisories/2006_65_ethereal.html | VUPEN:ADV-2006-4220 | URL:http://www.vupen.com/english/advisories/2006/4220 | XF:wireshark-ldap-dos(29841) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29841,Assigned (20061027),None (candidate not yet proposed), +CVE-006-5741,Candidate,"Multiple cross-site scripting (XSS) vulnerabilities in AirMagnet Enterprise before 7.5 build 6307 allow remote attackers to inject arbitrary web script or HTML via (1) the 404 error page of the Smart Sensor Edge Sensor; (2) the user name for a failed logon, when displayed in the audit journals reviewing interface (/AirMagnetSensor/AMSensor.dll/XH) by the Smart Sensor Edge Sensor log viewer; and (3) an SSID of an AP, when displayed on an ACL page (/Amom/Amom.dll/BD) of the Enterprise Server Status Overview in the Enterprise Server Web interface.",BID:20602 | URL:http://www.securityfocus.com/bid/20602 | BUGTRAQ:20061018 Airmagnet management interfaces multiple vulnerabilities | URL:http://www.securityfocus.com/archive/1/449119/100/200/threaded | BUGTRAQ:20061025 Web-style Wireless IDS attacks | URL:http://www.securityfocus.com/archive/1/449739/100/100/threaded | BUGTRAQ:20061117 Re: Airmagnet management interfaces multiple vulnerabilities | URL:http://www.securityfocus.com/archive/1/451978/100/100/threaded | OSVDB:29918 | URL:http://www.osvdb.org/29918 | OSVDB:29919 | URL:http://www.osvdb.org/29919 | OSVDB:29920 | URL:http://www.osvdb.org/29920 | SECUNIA:22475 | URL:http://secunia.com/advisories/22475,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5742,Candidate,"The AirMagnet Enterprise console and Remote Sensor console (Laptop) in AirMagnet Enterprise before 7.5 build 6307 allows remote attackers to inject arbitrary web script or HTML from a certain embedded Internet Explorer object into an SSID template value, aka ""Cross-Application Scripting (XAS)"".",BID:20602 | URL:http://www.securityfocus.com/bid/20602 | BUGTRAQ:20061018 Airmagnet management interfaces multiple vulnerabilities | URL:http://www.securityfocus.com/archive/1/449119/100/200/threaded | BUGTRAQ:20061025 Web-style Wireless IDS attacks | URL:http://www.securityfocus.com/archive/1/449739/100/100/threaded | BUGTRAQ:20061117 Re: Airmagnet management interfaces multiple vulnerabilities | URL:http://www.securityfocus.com/archive/1/451978/100/100/threaded | SECUNIA:22475 | URL:http://secunia.com/advisories/22475,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5743,Candidate,"Multiple cross-site scripting (XSS) vulnerabilities in Highwall Enterprise and Highwall Endpoint 4.0.2.11045 management interface allow remote attackers to inject arbitrary web script or HTML via (1) an Access Point with a crafted SSID, (2) the name of the sensor WIDS, (3) the name of the Highwall EndPoint workstation, or other unspecified vectors.",BID:20605 | URL:http://www.securityfocus.com/bid/20605 | BUGTRAQ:20061018 Multiple vulnerabilities in Highwall Enterprise and Highwall Endpoint management interface | URL:http://www.securityfocus.com/archive/1/449118/100/200/threaded | BUGTRAQ:20061025 Web-style Wireless IDS attacks | URL:http://www.securityfocus.com/archive/1/449739/100/100/threaded | OSVDB:29916 | URL:http://www.osvdb.org/29916,Assigned (20061106),None (candidate not yet proposed), +,Candidate,"Multiple SQL injection vulnerabilities in Highwall Enterprise and Highwall Endpoint 4.0.2.11045 management interface allow remote attackers to execute arbitrary SQL commands via an Access Point with a crafted SSID, and via unspecified vectors related to a malicious system operator.",BID:20605 | URL:http://www.securityfocus.com/bid/20605 | BUGTRAQ:20061018 Multiple vulnerabilities in Highwall Enterprise and Highwall Endpoint management interface | URL:http://www.securityfocus.com/archive/1/449118/100/200/threaded | BUGTRAQ:20061025 Web-style Wireless IDS attacks | URL:http://www.securityfocus.com/archive/1/449739/100/100/threaded | OSVDB:29916 | URL:http://www.osvdb.org/29916,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5745,Candidate,"Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information.",BID:20915 | URL:http://www.securityfocus.com/bid/20915 | CERT:TA06-318A | URL:http://www.us-cert.gov/cas/techalerts/TA06-318A.html | CERT-VN:VU#585137 | URL:http://www.kb.cert.org/vuls/id/585137 | CONFIRM:http://www.microsoft.com/technet/security/advisory/927892.mspx | EXPLOIT-DB:2743 | URL:https://www.exploit-db.com/exploits/2743 | ISS:20061104 Vulnerability in Microsoft XML HTTP Request Handling | URL:http://www.iss.net/threats/239.html | MISC:http://blogs.securiteam.com/?p=717 | MISC:http://xforce.iss.net/xforce/alerts/id/239 | MS:MS06-071 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-071 | OVAL:oval:org.mitre.oval:def:104 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A104 | SECTRACK:1017157 | URL:http://securitytracker.com/id?1017157 | SECUNIA:22687 | URL:http://secunia.com/advisories/22687 | VUPEN:ADV-2006-4334 | URL:http://www.vupen.com/english/advisories/2006/4334 | XF:ie-xml-http-request-handling(30004) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30004,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5746,Candidate,"The console in AirMagnet Enterprise before 7.5 build 6307 does not properly validate the Enterprise Server certificate, which allows remote attackers to read network traffic via a man-in-the-middle (MITM) attack, possibly related to the use of self-signed certificates.",BID:20602 | URL:http://www.securityfocus.com/bid/20602 | BUGTRAQ:20061018 Airmagnet management interfaces multiple vulnerabilities | URL:http://www.securityfocus.com/archive/1/449119/100/200/threaded | BUGTRAQ:20061025 Web-style Wireless IDS attacks | URL:http://www.securityfocus.com/archive/1/449739/100/100/threaded | BUGTRAQ:20061117 Re: Airmagnet management interfaces multiple vulnerabilities | URL:http://www.securityfocus.com/archive/1/451978/100/100/threaded | OSVDB:29921 | URL:http://www.osvdb.org/29921 | SECUNIA:22475 | URL:http://secunia.com/advisories/22475,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-547,Candidate,"Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function.",MISC:1017177 | URL:http://securitytracker.com/id?1017177 | MISC:1017178 | URL:http://securitytracker.com/id?1017178 | MISC:1017179 | URL:http://securitytracker.com/id?1017179 | MISC:20061101-01-P | URL:ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P | MISC:20061109 rPSA-2006-0206-1 firefox thunderbird | URL:http://www.securityfocus.com/archive/1/451099/100/0/threaded | MISC:20957 | URL:http://www.securityfocus.com/bid/20957 | MISC:22066 | URL:http://secunia.com/advisories/22066 | MISC:22722 | URL:http://secunia.com/advisories/22722 | MISC:22727 | URL:http://secunia.com/advisories/22727 | MISC:22737 | URL:http://secunia.com/advisories/22737 | MISC:22763 | URL:http://secunia.com/advisories/22763 | MISC:22770 | URL:http://secunia.com/advisories/22770 | MISC:22774 | URL:http://secunia.com/advisories/22774 | MISC:22815 | URL:http://secunia.com/advisories/22815 | MISC:22817 | URL:http://secunia.com/advisories/22817 | MISC:22929 | URL:http://secunia.com/advisories/22929 | MISC:22965 | URL:http://secunia.com/advisories/22965 | MISC:22980 | URL:http://secunia.com/advisories/22980 | MISC:23009 | URL:http://secunia.com/advisories/23009 | MISC:23013 | URL:http://secunia.com/advisories/23013 | MISC:23263 | URL:http://secunia.com/advisories/23263 | MISC:23287 | URL:http://secunia.com/advisories/23287 | MISC:23297 | URL:http://secunia.com/advisories/23297 | MISC:24711 | URL:http://secunia.com/advisories/24711 | MISC:ADV-2006-3748 | URL:http://www.vupen.com/english/advisories/2006/3748 | MISC:ADV-2006-4387 | URL:http://www.vupen.com/english/advisories/2006/4387 | MISC:ADV-2007-1198 | URL:http://www.vupen.com/english/advisories/2007/1198 | MISC:ADV-2008-0083 | URL:http://www.vupen.com/english/advisories/2008/0083 | MISC:GLSA-200612-06 | URL:http://security.gentoo.org/glsa/glsa-200612-06.xml | MISC:GLSA-200612-07 | URL:http://security.gentoo.org/glsa/glsa-200612-07.xml | MISC:GLSA-200612-08 | URL:http://security.gentoo.org/glsa/glsa-200612-08.xml | MISC:HPSBUX02153 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742 | MISC:MDKSA-2006:205 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:205 | MISC:MDKSA-2006:206 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:206 | MISC:RHSA-2006:0733 | URL:http://rhn.redhat.com/errata/RHSA-2006-0733.html | MISC:RHSA-2006:0734 | URL:http://rhn.redhat.com/errata/RHSA-2006-0734.html | MISC:RHSA-2006:0735 | URL:http://rhn.redhat.com/errata/RHSA-2006-0735.html | MISC:SSRT061181 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742 | MISC:SUSE-SA:2006:068 | URL:http://www.novell.com/linux/security/advisories/2006_68_mozilla.html | MISC:TA06-312A | URL:http://www.us-cert.gov/cas/techalerts/TA06-312A.html | MISC:USN-381-1 | URL:http://www.ubuntu.com/usn/usn-381-1 | MISC:USN-382-1 | URL:http://www.ubuntu.com/usn/usn-382-1 | MISC:VU#815432 | URL:http://www.kb.cert.org/vuls/id/815432 | MISC:http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm | URL:http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm | MISC:http://www.mozilla.org/security/announce/2006/mfsa2006-65.html | URL:http://www.mozilla.org/security/announce/2006/mfsa2006-65.html | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=355569 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=355569 | MISC:https://issues.rpath.com/browse/RPL-765 | URL:https://issues.rpath.com/browse/RPL-765 | MISC:mozilla-xmlprototypehasownproperty-dos(30093) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30093 | MISC:oval:org.mitre.oval:def:11496 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11496,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5748,Candidate,"Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.",BID:20957 | URL:http://www.securityfocus.com/bid/20957 | BUGTRAQ:20061109 rPSA-2006-0206-1 firefox thunderbird | URL:http://www.securityfocus.com/archive/1/451099/100/0/threaded | CERT:TA06-312A | URL:http://www.us-cert.gov/cas/techalerts/TA06-312A.html | CERT-VN:VU#390480 | URL:http://www.kb.cert.org/vuls/id/390480 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm | CONFIRM:http://www.mozilla.org/security/announce/2006/mfsa2006-65.html | CONFIRM:https://issues.rpath.com/browse/RPL-765 | DEBIAN:DSA-1224 | URL:http://www.debian.org/security/2006/dsa-1224 | DEBIAN:DSA-1225 | URL:http://www.debian.org/security/2006/dsa-1225 | DEBIAN:DSA-1227 | URL:http://www.debian.org/security/2006/dsa-1227 | GENTOO:GLSA-200612-06 | URL:http://security.gentoo.org/glsa/glsa-200612-06.xml | GENTOO:GLSA-200612-07 | URL:http://security.gentoo.org/glsa/glsa-200612-07.xml | GENTOO:GLSA-200612-08 | URL:http://security.gentoo.org/glsa/glsa-200612-08.xml | HP:HPSBUX02153 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742 | HP:SSRT061181 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742 | MANDRIVA:MDKSA-2006:205 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:205 | MANDRIVA:MDKSA-2006:206 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:206 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=349527 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=350238 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=351116 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=351973 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=352271 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=352606 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=353165 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=354145 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=354151 | OVAL:oval:org.mitre.oval:def:11408 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11408 | REDHAT:RHSA-2006:0733 | URL:http://rhn.redhat.com/errata/RHSA-2006-0733.html | REDHAT:RHSA-2006:0734 | URL:http://rhn.redhat.com/errata/RHSA-2006-0734.html | REDHAT:RHSA-2006:0735 | URL:http://rhn.redhat.com/errata/RHSA-2006-0735.html | SECTRACK:1017177 | URL:http://securitytracker.com/id?1017177 | SECTRACK:1017178 | URL:http://securitytracker.com/id?1017178 | SECTRACK:1017179 | URL:http://securitytracker.com/id?1017179 | SECUNIA:22066 | URL:http://secunia.com/advisories/22066 | SECUNIA:22722 | URL:http://secunia.com/advisories/22722 | SECUNIA:22727 | URL:http://secunia.com/advisories/22727 | SECUNIA:22737 | URL:http://secunia.com/advisories/22737 | SECUNIA:22763 | URL:http://secunia.com/advisories/22763 | SECUNIA:22770 | URL:http://secunia.com/advisories/22770 | SECUNIA:22774 | URL:http://secunia.com/advisories/22774 | SECUNIA:22815 | URL:http://secunia.com/advisories/22815 | SECUNIA:22817 | URL:http://secunia.com/advisories/22817 | SECUNIA:22929 | URL:http://secunia.com/advisories/22929 | SECUNIA:22965 | URL:http://secunia.com/advisories/22965 | SECUNIA:22980 | URL:http://secunia.com/advisories/22980 | SECUNIA:23009 | URL:http://secunia.com/advisories/23009 | SECUNIA:23013 | URL:http://secunia.com/advisories/23013 | SECUNIA:23197 | URL:http://secunia.com/advisories/23197 | SECUNIA:23202 | URL:http://secunia.com/advisories/23202 | SECUNIA:23235 | URL:http://secunia.com/advisories/23235 | SECUNIA:23263 | URL:http://secunia.com/advisories/23263 | SECUNIA:23287 | URL:http://secunia.com/advisories/23287 | SECUNIA:23297 | URL:http://secunia.com/advisories/23297 | SECUNIA:24711 | URL:http://secunia.com/advisories/24711 | SECUNIA:27603 | URL:http://secunia.com/advisories/27603 | SGI:20061101-01-P | URL:ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P | SUNALERT:103139 | URL:http://sunsolve.sun.com/search/document.do?assetkey=1-26-103139-1 | SUNALERT:201335 | URL:http://sunsolve.sun.com/search/document.do?assetkey=1-66-201335-1 | SUSE:SUSE-SA:2006:068 | URL:http://www.novell.com/linux/security/advisories/2006_68_mozilla.html | UBUNTU:USN-381-1 | URL:http://www.ubuntu.com/usn/usn-381-1 | UBUNTU:USN-382-1 | URL:http://www.ubuntu.com/usn/usn-382-1 | VUPEN:ADV-2006-3748 | URL:http://www.vupen.com/english/advisories/2006/3748 | VUPEN:ADV-2006-4387 | URL:http://www.vupen.com/english/advisories/2006/4387 | VUPEN:ADV-2007-1198 | URL:http://www.vupen.com/english/advisories/2007/1198 | VUPEN:ADV-2007-3821 | URL:http://www.vupen.com/english/advisories/2007/3821 | VUPEN:ADV-2008-0083 | URL:http://www.vupen.com/english/advisories/2008/0083 | XF:mozilla-javascript-engine-code-execution(30096) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30096,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5749,Candidate,"The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash.",MISC:2007-0002 | URL:http://www.trustix.org/errata/2007/0002/ | MISC:20070615 rPSA-2007-0124-1 kernel xen | URL:http://www.securityfocus.com/archive/1/471457 | MISC:21835 | URL:http://www.securityfocus.com/bid/21835 | MISC:21883 | URL:http://www.securityfocus.com/bid/21883 | MISC:23529 | URL:http://secunia.com/advisories/23529 | MISC:23609 | URL:http://secunia.com/advisories/23609 | MISC:23752 | URL:http://secunia.com/advisories/23752 | MISC:24098 | URL:http://secunia.com/advisories/24098 | MISC:24100 | URL:http://secunia.com/advisories/24100 | MISC:24547 | URL:http://secunia.com/advisories/24547 | MISC:25226 | URL:http://secunia.com/advisories/25226 | MISC:25683 | URL:http://secunia.com/advisories/25683 | MISC:25691 | URL:http://secunia.com/advisories/25691 | MISC:MDKSA-2007:012 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 | MISC:MDKSA-2007:025 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 | MISC:MDKSA-2007:040 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:040 | MISC:SUSE-SA:2007:018 | URL:http://www.novell.com/linux/security/advisories/2007_18_kernel.html | MISC:SUSE-SA:2007:021 | URL:http://www.novell.com/linux/security/advisories/2007_21_kernel.html | MISC:SUSE-SA:2007:030 | URL:http://www.novell.com/linux/security/advisories/2007_30_kernel.html | MISC:SUSE-SA:2007:035 | URL:http://www.novell.com/linux/security/advisories/2007_35_kernel.html | MISC:USN-416-1 | URL:http://www.ubuntu.com/usn/usn-416-1 | MISC:http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34 | URL:http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34 | MISC:http://www.kernel.org/git/?p=linux/kernel/git/wtarreau/linux-2.4.git%3Ba=commitdiff%3Bh=05dca9b77f99d80cf615075624666106d5b61727 | URL:http://www.kernel.org/git/?p=linux/kernel/git/wtarreau/linux-2.4.git%3Ba=commitdiff%3Bh=05dca9b77f99d80cf615075624666106d5b61727,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5750,Candidate,"Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager.",MISC:1017289 | URL:http://securitytracker.com/id?1017289 | MISC:20061127 SYMSA-2006-011: JBoss Java Class DeploymentFileRepository Directory Traversal | URL:http://www.securityfocus.com/archive/1/452830/100/0/threaded | MISC:20061128 Re: SYMSA-2006-011: JBoss Java Class DeploymentFileRepository Directory Traversal | URL:http://www.securityfocus.com/archive/1/452862/100/100/threaded | MISC:21219 | URL:http://www.securityfocus.com/bid/21219 | MISC:23095 | URL:http://secunia.com/advisories/23095 | MISC:23984 | URL:http://secunia.com/advisories/23984 | MISC:24104 | URL:http://secunia.com/advisories/24104 | MISC:29726 | URL:http://secunia.com/advisories/29726 | MISC:30767 | URL:http://www.osvdb.org/30767 | MISC:ADV-2006-4724 | URL:http://www.vupen.com/english/advisories/2006/4724 | MISC:ADV-2006-4726 | URL:http://www.vupen.com/english/advisories/2006/4726 | MISC:ADV-2007-0554 | URL:http://www.vupen.com/english/advisories/2007/0554 | MISC:ADV-2008-1155 | URL:http://www.vupen.com/english/advisories/2008/1155/references | MISC:HPSBST02318 | URL:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402 | MISC:RHSA-2006:0743 | URL:http://www.redhat.com/support/errata/RHSA-2006-0743.html | MISC:SSRT080018 | URL:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402 | MISC:SUSE-SR:2007:002 | URL:http://www.novell.com/linux/security/advisories/2007_02_sr.html | MISC:http://jira.jboss.com/jira/browse/ASPATCH-126 | URL:http://jira.jboss.com/jira/browse/ASPATCH-126 | MISC:http://jira.jboss.com/jira/browse/JBAS-3861 | URL:http://jira.jboss.com/jira/browse/JBAS-3861 | MISC:https://secure-support.novell.com/KanisaPlatform/Publishing/719/3024921_f.SAL_Public.html | URL:https://secure-support.novell.com/KanisaPlatform/Publishing/719/3024921_f.SAL_Public.html,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5751,Candidate,Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel before 2.6.18.4 allows local users to execute arbitrary code via a large maxnum value in an ioctl request.,BID:21353 | URL:http://www.securityfocus.com/bid/21353 | BUGTRAQ:20061206 rPSA-2006-0226-1 kernel | URL:http://www.securityfocus.com/archive/1/453681/100/0/threaded | CONFIRM:http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.18.4 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm | CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ba8379b220509e9448c00a77cf6c15ac2a559cc7 | CONFIRM:https://issues.rpath.com/browse/RPL-803 | CONFIRM:https://issues.rpath.com/browse/RPL-837 | DEBIAN:DSA-1233 | URL:http://www.us.debian.org/security/2006/dsa-1233 | MANDRIVA:MDKSA-2007:002 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:002 | MANDRIVA:MDKSA-2007:012 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 | MISC:http://projects.info-pull.com/mokb/MOKB-29-11-2006.html | MISC:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=4c61a7e0a86e1ae9e16867f9f8e4b0412b8edbaf;hp=4e4119a1213925568b8a1acdef9bf52b98b19da3;hb=ba8379b220509e9448c00a77cf6c15ac2a559cc7;f=net/bridge/br_ioctl.c | OVAL:oval:org.mitre.oval:def:10151 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10151 | REDHAT:RHSA-2007:0014 | URL:http://rhn.redhat.com/errata/RHSA-2007-0014.html | SECUNIA:23073 | URL:http://secunia.com/advisories/23073 | SECUNIA:23252 | URL:http://secunia.com/advisories/23252 | SECUNIA:23370 | URL:http://secunia.com/advisories/23370 | SECUNIA:23384 | URL:http://secunia.com/advisories/23384 | SECUNIA:23474 | URL:http://secunia.com/advisories/23474 | SECUNIA:23593 | URL:http://secunia.com/advisories/23593 | SECUNIA:23752 | URL:http://secunia.com/advisories/23752 | SECUNIA:23997 | URL:http://secunia.com/advisories/23997 | SECUNIA:24206 | URL:http://secunia.com/advisories/24206 | SECUNIA:24547 | URL:http://secunia.com/advisories/24547 | SUSE:SUSE-SA:2006:079 | URL:http://www.novell.com/linux/security/advisories/2006_79_kernel.html | SUSE:SUSE-SA:2007:021 | URL:http://www.novell.com/linux/security/advisories/2007_21_kernel.html | UBUNTU:USN-395-1 | URL:http://www.ubuntu.com/usn/usn-395-1 | VUPEN:ADV-2006-4781 | URL:http://www.vupen.com/english/advisories/2006/4781 | XF:linux-getfdbentries-integer-overflow(30588) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30588,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5752,Candidate,"Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform ""charset detection"" when the content-type is not specified.",AIXAPAR:PK49295 | URL:http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=only | AIXAPAR:PK52702 | URL:http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702 | BID:24645 | URL:http://www.securityfocus.com/bid/24645 | BUGTRAQ:20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server | URL:http://www.securityfocus.com/archive/1/505990/100/0/threaded | CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=186219 | CONFIRM:http://httpd.apache.org/security/vulnerabilities_13.html | CONFIRM:http://httpd.apache.org/security/vulnerabilities_20.html | CONFIRM:http://httpd.apache.org/security/vulnerabilities_22.html | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm | CONFIRM:http://svn.apache.org/viewvc?view=rev&revision=549159 | CONFIRM:http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html | CONFIRM:http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html | CONFIRM:https://issues.rpath.com/browse/RPL-1500 | FEDORA:FEDORA-2007-2214 | URL:http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html | GENTOO:GLSA-200711-06 | URL:http://security.gentoo.org/glsa/glsa-200711-06.xml | HP:HPSBUX02262 | URL:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 | HP:SSRT071447 | URL:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 | MANDRIVA:MDKSA-2007:140 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:140 | MANDRIVA:MDKSA-2007:141 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:141 | MANDRIVA:MDKSA-2007:142 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:142 | MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112 | MLIST:[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ | URL:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ | URL:https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/ | URL:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ | URL:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ | URL:https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/ | URL:https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210606 svn commit: r1075470 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210606 svn commit: r1075470 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E | MLIST:[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html | URL:https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E | MLIST:[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server | URL:http://lists.vmware.com/pipermail/security-announce/2009/000062.html | OSVDB:37052 | URL:http://osvdb.org/37052 | OVAL:oval:org.mitre.oval:def:10154 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10154 | REDHAT:RHSA-2007:0532 | URL:http://www.redhat.com/support/errata/RHSA-2007-0532.html | REDHAT:RHSA-2007:0533 | URL:https://rhn.redhat.com/errata/RHSA-2007-0533.html | REDHAT:RHSA-2007:0534 | URL:http://rhn.redhat.com/errata/RHSA-2007-0534.html | REDHAT:RHSA-2007:0556 | URL:http://rhn.redhat.com/errata/RHSA-2007-0556.html | REDHAT:RHSA-2007:0557 | URL:http://www.redhat.com/support/errata/RHSA-2007-0557.html | REDHAT:RHSA-2008:0261 | URL:http://www.redhat.com/support/errata/RHSA-2008-0261.html | SECTRACK:1018302 | URL:http://www.securitytracker.com/id?1018302 | SECUNIA:25827 | URL:http://secunia.com/advisories/25827 | SECUNIA:25830 | URL:http://secunia.com/advisories/25830 | SECUNIA:25873 | URL:http://secunia.com/advisories/25873 | SECUNIA:25920 | URL:http://secunia.com/advisories/25920 | SECUNIA:26273 | URL:http://secunia.com/advisories/26273 | SECUNIA:26443 | URL:http://secunia.com/advisories/26443 | SECUNIA:26458 | URL:http://secunia.com/advisories/26458 | SECUNIA:26508 | URL:http://secunia.com/advisories/26508 | SECUNIA:26822 | URL:http://secunia.com/advisories/26822 | SECUNIA:26842 | URL:http://secunia.com/advisories/26842 | SECUNIA:26993 | URL:http://secunia.com/advisories/26993 | SECUNIA:27037 | URL:http://secunia.com/advisories/27037 | SECUNIA:27563 | URL:http://secunia.com/advisories/27563 | SECUNIA:27732 | URL:http://secunia.com/advisories/27732 | SECUNIA:28212 | URL:http://secunia.com/advisories/28212 | SECUNIA:28224 | URL:http://secunia.com/advisories/28224 | SECUNIA:28606 | URL:http://secunia.com/advisories/28606 | SUNALERT:103179 | URL:http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1 | SUNALERT:200032 | URL:http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1 | SUSE:SUSE-SA:2007:061 | URL:http://www.novell.com/linux/security/advisories/2007_61_apache2.html | TRUSTIX:2007-0026 | URL:http://www.trustix.org/errata/2007/0026/ | UBUNTU:USN-499-1 | URL:http://www.ubuntu.com/usn/usn-499-1 | VUPEN:ADV-2007-2727 | URL:http://www.vupen.com/english/advisories/2007/2727 | VUPEN:ADV-2007-3283 | URL:http://www.vupen.com/english/advisories/2007/3283 | VUPEN:ADV-2007-3386 | URL:http://www.vupen.com/english/advisories/2007/3386 | VUPEN:ADV-2007-4305 | URL:http://www.vupen.com/english/advisories/2007/4305 | VUPEN:ADV-2008-0233 | URL:http://www.vupen.com/english/advisories/2008/0233 | XF:apache-modstatus-xss(35097) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/35097,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5753,Candidate,"Unspecified vulnerability in the listxattr system call in Linux kernel, when a ""bad inode"" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.",MISC:20070615 rPSA-2007-0124-1 kernel xen | URL:http://www.securityfocus.com/archive/1/471457 | MISC:22316 | URL:http://www.securityfocus.com/bid/22316 | MISC:23955 | URL:http://secunia.com/advisories/23955 | MISC:23997 | URL:http://secunia.com/advisories/23997 | MISC:24098 | URL:http://secunia.com/advisories/24098 | MISC:24100 | URL:http://secunia.com/advisories/24100 | MISC:24206 | URL:http://secunia.com/advisories/24206 | MISC:24400 | URL:http://secunia.com/advisories/24400 | MISC:24429 | URL:http://secunia.com/advisories/24429 | MISC:24482 | URL:http://secunia.com/advisories/24482 | MISC:24547 | URL:http://secunia.com/advisories/24547 | MISC:25226 | URL:http://secunia.com/advisories/25226 | MISC:25683 | URL:http://secunia.com/advisories/25683 | MISC:25691 | URL:http://secunia.com/advisories/25691 | MISC:25714 | URL:http://secunia.com/advisories/25714 | MISC:29058 | URL:http://secunia.com/advisories/29058 | MISC:33020 | URL:http://osvdb.org/33020 | MISC:DSA-1304 | URL:http://www.debian.org/security/2007/dsa-1304 | MISC:DSA-1503 | URL:http://www.debian.org/security/2008/dsa-1503 | MISC:FEDORA-2007-277 | URL:http://fedoranews.org/cms/node/2739 | MISC:FEDORA-2007-291 | URL:http://fedoranews.org/cms/node/2740 | MISC:MDKSA-2007:040 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:040 | MISC:MDKSA-2007:060 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:060 | MISC:RHSA-2007:0014 | URL:http://www.redhat.com/support/errata/RHSA-2007-0014.html | MISC:SUSE-SA:2007:018 | URL:http://www.novell.com/linux/security/advisories/2007_18_kernel.html | MISC:SUSE-SA:2007:021 | URL:http://www.novell.com/linux/security/advisories/2007_21_kernel.html | MISC:SUSE-SA:2007:030 | URL:http://www.novell.com/linux/security/advisories/2007_30_kernel.html | MISC:SUSE-SA:2007:035 | URL:http://www.novell.com/linux/security/advisories/2007_35_kernel.html | MISC:USN-416-1 | URL:http://www.ubuntu.com/usn/usn-416-1 | MISC:http://lkml.org/lkml/2007/1/3/150 | URL:http://lkml.org/lkml/2007/1/3/150 | MISC:http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm | URL:http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm | MISC:https://issues.rpath.com/browse/RPL-1106 | URL:https://issues.rpath.com/browse/RPL-1106 | MISC:oval:org.mitre.oval:def:9371 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5754,Candidate,"The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a denial of service (crash) via an unspecified error path that causes an incorrect free operation.",MISC:22193 | URL:http://www.securityfocus.com/bid/22193 | MISC:23997 | URL:http://secunia.com/advisories/23997 | MISC:24206 | URL:http://secunia.com/advisories/24206 | MISC:25683 | URL:http://secunia.com/advisories/25683 | MISC:25714 | URL:http://secunia.com/advisories/25714 | MISC:DSA-1304 | URL:http://www.debian.org/security/2007/dsa-1304 | MISC:MDKSA-2007:025 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 | MISC:RHSA-2007:0014 | URL:http://rhn.redhat.com/errata/RHSA-2007-0014.html | MISC:SUSE-SA:2007:035 | URL:http://www.novell.com/linux/security/advisories/2007_35_kernel.html | MISC:http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm | URL:http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm | MISC:oval:org.mitre.oval:def:11234 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11234,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5755,Candidate,"Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.",MISC:20070615 rPSA-2007-0124-1 kernel xen | URL:http://www.securityfocus.com/archive/1/471457 | MISC:24098 | URL:http://secunia.com/advisories/24098 | MISC:25691 | URL:http://secunia.com/advisories/25691 | MISC:26060 | URL:http://www.securityfocus.com/bid/26060 | MISC:26620 | URL:http://secunia.com/advisories/26620 | MISC:26994 | URL:http://secunia.com/advisories/26994 | MISC:32485 | URL:http://secunia.com/advisories/32485 | MISC:DSA-1381 | URL:http://www.debian.org/security/2007/dsa-1381 | MISC:MDKSA-2007:171 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:171 | MISC:RHSA-2008:0957 | URL:http://www.redhat.com/support/errata/RHSA-2008-0957.html | MISC:USN-416-1 | URL:http://www.ubuntu.com/usn/usn-416-1 | MISC:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9 | URL:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9 | MISC:http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9 | URL:http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9 | MISC:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.18 | URL:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.18 | MISC:http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.18-git13.log | URL:http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.18-git13.log | MISC:oval:org.mitre.oval:def:9554 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9554,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5756,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2006. Notes: none.,,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5757,Candidate,Race condition in the __find_get_block_slow function in the ISO9660 filesystem in Linux 2.6.18 and possibly other versions allows local users to cause a denial of service (infinite loop) by mounting a crafted ISO9660 filesystem containing malformed data structures.,BID:20920 | URL:http://www.securityfocus.com/bid/20920 | BUGTRAQ:20070615 rPSA-2007-0124-1 kernel xen | URL:http://www.securityfocus.com/archive/1/471457 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm | DEBIAN:DSA-1304 | URL:http://www.debian.org/security/2007/dsa-1304 | MANDRIVA:MDKSA-2007:002 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:002 | MANDRIVA:MDKSA-2007:012 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 | MISC:http://projects.info-pull.com/mokb/MOKB-05-11-2006.html | OVAL:oval:org.mitre.oval:def:10111 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10111 | REDHAT:RHSA-2007:0014 | URL:http://rhn.redhat.com/errata/RHSA-2007-0014.html | SECUNIA:22702 | URL:http://secunia.com/advisories/22702 | SECUNIA:22746 | URL:http://secunia.com/advisories/22746 | SECUNIA:23474 | URL:http://secunia.com/advisories/23474 | SECUNIA:23593 | URL:http://secunia.com/advisories/23593 | SECUNIA:23752 | URL:http://secunia.com/advisories/23752 | SECUNIA:23997 | URL:http://secunia.com/advisories/23997 | SECUNIA:24098 | URL:http://secunia.com/advisories/24098 | SECUNIA:24206 | URL:http://secunia.com/advisories/24206 | SECUNIA:25691 | URL:http://secunia.com/advisories/25691 | SECUNIA:25714 | URL:http://secunia.com/advisories/25714 | SUSE:SUSE-SA:2006:079 | URL:http://www.novell.com/linux/security/advisories/2006_79_kernel.html | UBUNTU:USN-416-1 | URL:http://www.ubuntu.com/usn/usn-416-1 | VUPEN:ADV-2006-4359 | URL:http://www.vupen.com/english/advisories/2006/4359 | XF:kernel-iso9660-dos(30029) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30029,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5758,,"The Graphics Rendering Engine in Microsoft Windows 2000 through 2000 SP4 and Windows XP through SP2 maps GDI Kernel structures on a global shared memory section that is mapped with read-only permissions, but can be remapped by other processes as read-write, which allows local users to cause a denial of service (memory corruption and crash) and gain privileges by modifying the kernel structures.",BID:20940 | URL:http://www.securityfocus.com/bid/20940 | HP:HPSBST02206 | URL:http://www.securityfocus.com/archive/1/466186/100/200/threaded | HP:SSRT071354 | URL:http://www.securityfocus.com/archive/1/466186/100/200/threaded | MISC:http://kernelwars.blogspot.com/2007/01/alive.html | MISC:http://projects.info-pull.com/mokb/MOKB-06-11-2006.html | MISC:http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson | MS:MS07-017 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017 | OVAL:oval:org.mitre.oval:def:2056 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2056 | SECTRACK:1017168 | URL:http://securitytracker.com/id?1017168 | SECUNIA:22668 | URL:http://secunia.com/advisories/22668 | VUPEN:ADV-2006-4358 | URL:http://www.vupen.com/english/advisories/2006/4358 | VUPEN:ADV-2007-1215 | URL:http://www.vupen.com/english/advisories/2007/1215 | XF:windows-gdi-kernel-privilege-escalation(30042) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30042,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5759,Candidate,"index.php in Rhadrix If-CMS, possibly 1.01 and 2.07, allows remote attackers to obtain the full path of the web server via empty (1) rns[] or (2) pag[] arguments, which reveals the path in an error message.",BUGTRAQ:20061104 IF-CMS multiples XSS vunerabilities | URL:http://www.securityfocus.com/archive/1/450566/100/0/threaded | MISC:http://s-a-p.ca/index.php?page=OurAdvisories&id=5 | SREASON:1825 | URL:http://securityreason.com/securityalert/1825 | XF:ifcms-index-path-disclosure(30012) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30012,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5760,Candidate,"Multiple PHP remote file inclusion vulnerabilities in phpDynaSite 3.2.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the racine parameter to (1) function_log.php, (2) function_balise_url.php, or (3) connection.php.",BID:20921 | URL:http://www.securityfocus.com/bid/20921 | EXPLOIT-DB:2717 | URL:https://www.exploit-db.com/exploits/2717 | OSVDB:30183 | URL:http://www.osvdb.org/30183 | OSVDB:30184 | URL:http://www.osvdb.org/30184 | OSVDB:30185 | URL:http://www.osvdb.org/30185 | SECUNIA:22710 | URL:http://secunia.com/advisories/22710 | VUPEN:ADV-2006-4344 | URL:http://www.vupen.com/english/advisories/2006/4344 | XF:phpdynasite-racine-file-include(30016) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30016,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5761,Candidate,Cross-site scripting (XSS) vulnerability in index.php in Rhadrix If-CMS 1.01 and 2.07 allows remote attackers to inject arbitrary web script or HTML via the rns parameter.,BID:20909 | URL:http://www.securityfocus.com/bid/20909 | BUGTRAQ:20061104 IF-CMS multiples XSS vunerabilities | URL:http://www.securityfocus.com/archive/1/450566/100/0/threaded | MISC:http://s-a-p.ca/index.php?page=OurAdvisories&id=5 | SECTRACK:1017161 | URL:http://securitytracker.com/id?1017161 | SECUNIA:22715 | URL:http://secunia.com/advisories/22715 | SREASON:1825 | URL:http://securityreason.com/securityalert/1825 | VUPEN:ADV-2006-4367 | URL:http://www.vupen.com/english/advisories/2006/4367 | XF:ifcms-index-xss(30010) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30010,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5762,Candidate,"PHP remote file inclusion vulnerability in forgot_pass.php in Free File Hosting 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: this issue was later reported for the ""File Upload System"" which is a component of Free File Hosting. This also affects Free Image Hosting 2.0, which contains the same code.","BID:20781 | URL:http://www.securityfocus.com/bid/20781 | BID:23118 | URL:http://www.securityfocus.com/bid/23118 | BUGTRAQ:20070324 File Upload System V1.0 (AD_BODY_TEMP) multiple file include | URL:http://www.securityfocus.com/archive/1/463707/100/0/threaded | EXPLOIT-DB:2670 | URL:https://www.exploit-db.com/exploits/2670 | EXPLOIT-DB:3568 | URL:https://www.exploit-db.com/exploits/3568 | MISC:http://www.rahim.webd.pl/exploity/Exploits/111.txt | OSVDB:30143 | URL:http://www.osvdb.org/30143 | SECUNIA:22594 | URL:http://secunia.com/advisories/22594 | VIM:20070327 ""File Upload"" seems to be ""Free File Hosting"" | URL:http://www.attrition.org/pipermail/vim/2007-March/001473.html | VUPEN:ADV-2006-4228 | URL:http://www.vupen.com/english/advisories/2006/4228 | XF:freefile-forgot-file-include(29874) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29874 | XF:freeimagehosting-adbodytemp-file-include(33196) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/33196",Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5763,Candidate,"Multiple PHP remote file inclusion vulnerabilities in Free File Hosting 1.1, and possibly earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter to (1) login.php, (2) register.php, or (3) send.php. NOTE: the original provenance of this information is unknown; the details are obtained solely from third party information. NOTE: this issue was later reported for the ""File Upload System"" which is a component of Free File Hosting. Vector 1 also affects Free Image Hosting 2.0, which contains the same code.","BID:23118 | URL:http://www.securityfocus.com/bid/23118 | BUGTRAQ:20070324 File Upload System V1.0 (AD_BODY_TEMP) multiple file include | URL:http://www.securityfocus.com/archive/1/463707/100/0/threaded | EXPLOIT-DB:3568 | URL:https://www.exploit-db.com/exploits/3568 | OSVDB:30144 | URL:http://www.osvdb.org/30144 | OSVDB:30145 | URL:http://www.osvdb.org/30145 | OSVDB:30146 | URL:http://www.osvdb.org/30146 | SECUNIA:22594 | URL:http://secunia.com/advisories/22594 | VIM:20070327 ""File Upload"" seems to be ""Free File Hosting"" | URL:http://www.attrition.org/pipermail/vim/2007-March/001473.html | XF:freefile-forgot-file-include(29874) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29874 | XF:freeimagehosting-adbodytemp-file-include(33196) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/33196",Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5764,Candidate,"PHP remote file inclusion vulnerability in contact.php in Free File Hosting 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: this issue was later reported for the ""File Upload System"" which is a component of Free File Hosting.","BID:23118 | URL:http://www.securityfocus.com/bid/23118 | BUGTRAQ:20070324 File Upload System V1.0 (AD_BODY_TEMP) multiple file include | URL:http://www.securityfocus.com/archive/1/463707/100/0/threaded | VIM:20070327 ""File Upload"" seems to be ""Free File Hosting"" | URL:http://www.attrition.org/pipermail/vim/2007-March/001473.html | VUPEN:ADV-2006-4228 | URL:http://www.vupen.com/english/advisories/2006/4228 | XF:freefile-forgot-file-include(29874) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29874",Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5765,*andidat|,SQL injection vulnerability in rss.php in Article Script 1.6.3 and earlier allows remote attackers to execute arbitrary SQL commands via the category parameter.,BID:20929 | URL:http://www.securityfocus.com/bid/20929 | BUGTRAQ:20061106 Article Script v1.*and v1.6.3 Sql injection | URL:http://www.securityfocus.com/archive/1/450678 | MISC:http://www.blogcu.com/Liz0ziM/1312100 | SECUNIA:22698 | URL:http://secunia.com/advisories/22698 | SREASON:1826 | URL:http://securityreason.com/securityalert/1826 | VUPEN:ADV-2006-4352 | URL:http://www.vupen.com/english/advisories/2006/4352 | XF:articlescript-rss-sql-injection(30038) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30038,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5766,,PHP remote file inclusion vulnerability in volume.php in Article System 0.6 allows remote attackers to execute arbitrary PHP code via a URL in the config[public_dir] parameter.,BID:20892 | URL:http://www.securityfocus.com/bid/20892 | EXPLOIT-DB:2703 | URL:https://www.exploit-db.com/exploits/2703 | XF:articlesystem-volume-file-include(29988) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29988,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5767,Candidate,PHP remote file inclusion vulnerability in includes/xhtml.php in Drake CMS 0.2.2 alpha rev.846 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the d_root parameter.,BID:20914 | URL:http://www.securityfocus.com/bid/20914 | CONFIRM:http://sourceforge.net/forum/forum.php?forum_id=636860 | EXPLOIT-DB:2713 | URL:https://www.exploit-db.com/exploits/2713 | VIM:20061226 Vendor ACK (basically) for Drake CMS RFI (CVE-2006-5767) | URL:http://www.attrition.org/pipermail/vim/2006-December/001202.html | VUPEN:ADV-2006-4345 | URL:http://www.vupen.com/english/advisories/2006/4345 | XF:drake-xhtml-file-include(30021) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30021,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5768,Candidate,"Multiple PHP remote file inclusion vulnerabilities in Cyberfolio 2.0 RC1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the av parameter to (1) msg/view.php, (2) msg/inc_message.php, (3) msg/inc_envoi.php, and (4) admin/incl_voir_compet.php.",BID:20928 | URL:http://www.securityfocus.com/bid/20928 | BUGTRAQ:20061106 [ECHO_ADV_58_2006]Cyberfolio <=2.0 RC1 $av Remote File Inclusion | URL:http://marc.info/?l=bugtraq&m=116283724113571&w=2 | EXPLOIT-DB:2725 | URL:https://www.exploit-db.com/exploits/2725 | MISC:http://advisories.echo.or.id/adv/adv58-theday-2006.txt | MISC:http://translate.google.com/translate?hl=en&sl=fr&u=http://www.cyberfolio.org/ | OSVDB:30211 | URL:http://www.osvdb.org/displayvuln.php?osvdb_id=30211 | OSVDB:30212 | URL:http://www.osvdb.org/30212 | SECTRACK:1017175 | URL:http://securitytracker.com/id?1017175 | SECUNIA:22721 | URL:http://secunia.com/advisories/22721 | VUPEN:ADV-2006-4360 | URL:http://www.vupen.com/english/advisories/2006/4360 | XF:cyberfolio-av-file-include(30033) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30033,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5769,Candidate,Multiple cross-site scripting (XSS) vulnerabilities in admin.tool CMS 3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) fSid or (2) fSrcBegriffe parameters in unspecified vectors.,BID:20905 | URL:http://www.securityfocus.com/bid/20905 | BUGTRAQ:20061104 admin.tool 3 CMS - Multiple Cross Site Scripting Issues | URL:http://marc.info/?l=bugtraq&m=116266802117129&w=2 | MISC:http://www.majorsecurity.de/index_2.php?major_rls=major_rls30 | XF:admintoolcms-fsid-xss(30014) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30014,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-570,Candidate,"Multiple cross-site scripting (XSS) vulnerabilities in ac4p Mobile allow remote attackers to inject arbitrary web script or HTML via (1) Bloks, (2) Newnews, (3) lBlok, and (4) foooot parameter in (a) index.php; Newnews, (5) newmsgs, and Bloks parameter in (b) MobileNews.php; Newnews parameter in (c) polls.php; (6) cats parameter in (d) send.php; (7) footer parameter in (e) up.php; and (8) pagenav parameter in (f) cp/index.php.",BID:20895 | URL:http://www.securityfocus.com/bid/20895 | BUGTRAQ:20061103 XSS in script Mobile | URL:http://www.securityfocus.com/archive/1/450496/100/0/threaded | OSVDB:32046 | URL:http://www.osvdb.org/32046 | OSVDB:32047 | URL:http://www.osvdb.org/32047 | OSVDB:32048 | URL:http://www.osvdb.org/32048 | OSVDB:32049 | URL:http://www.osvdb.org/32049 | OSVDB:32050 | URL:http://www.osvdb.org/32050 | OSVDB:32051 | URL:http://www.osvdb.org/32051 | XF:mobile-index-xss(30007) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30007,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5771,Candidate,Cross-site scripting (XSS) vulnerability in Arkoon SSL360 1.0 and 2.0 before 2.0/2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.,BID:20890 | URL:http://www.securityfocus.com/bid/20890 | CONFIRM:http://www.arkoon.fr/upload/alertes/42AK-2006-05-FR-1.1_SSL360_XSS.pdf | SECUNIA:22833 | URL:http://secunia.com/advisories/22833 | VUPEN:ADV-2006-4330 | URL:http://www.vupen.com/english/advisories/2006/4330 | XF:arkoon-portal-xss(29993) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29993,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5772,Candidate,Multiple SQL injection vulnerabilities in index.php in FreeWebshop 2.2.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) password and (2) prod parameter.,CONFIRM:http://www.freewebshop.org/index.php?id=27 | EXPLOIT-DB:2704 | URL:https://www.exploit-db.com/exploits/2704 | SECUNIA:22664 | URL:http://secunia.com/advisories/22664 | VUPEN:ADV-2006-4332 | URL:http://www.vupen.com/english/advisories/2006/4332 | XF:freewebshop-logging-sql-injection(29990) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29990,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5773,Candidate,Directory traversal vulnerability in index.php in FreeWebshop 2.2.1 and earlier allows remote attackers to read arbitrary files and disclose the installation path via a .. (dot dot) in the action parameter.,BID:20888 | URL:http://www.securityfocus.com/bid/20888 | CONFIRM:http://www.freewebshop.org/index.php?id=27 | EXPLOIT-DB:2704 | URL:https://www.exploit-db.com/exploits/2704 | SECUNIA:22664 | URL:http://secunia.com/advisories/22664 | VUPEN:ADV-2006-4332 | URL:http://www.vupen.com/english/advisories/2006/4332 | XF:freewebshop-index-directory-traversal(29991) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/29991,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5774,Candidate,Cross-site scripting (XSS) vulnerability in Hyper NIKKI System before 2.19.9 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.,BID:20949 | URL:http://www.securityfocus.com/bid/20949 | JVN:JVN#88325166 | URL:http://jvn.jp/jp/JVN%2388325166/index.html | MISC:http://www.h14m.org/dist/ | SECUNIA:22697 | URL:http://secunia.com/advisories/22697 | VUPEN:ADV-2006-4363 | URL:http://www.vupen.com/english/advisories/2006/4363 | XF:hns-unspecified-xss(30040) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30040,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5775,Candidate,"Cross-site scripting (XSS) vulnerability in profile.php in FunkBoard 0.71 before 4 November 2006 at 18:16 GMT allows remote attackers to inject arbitrary web script or HTML, possibly via the name parameter.",BID:20946 | URL:http://www.securityfocus.com/bid/20946 | CONFIRM:http://www.funkboard.co.uk/forum/thread.php?id=312 | SECUNIA:22720 | URL:http://secunia.com/advisories/22720 | VUPEN:ADV-2006-4364 | URL:http://www.vupen.com/english/advisories/2006/4364 | XF:funkboard-profile-xss(30044) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30044,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5776,Candidate,"** DISPUTED ** Multiple PHP remote file inclusions in Ariadne 2.4.1 allows remote attackers to execute arbitrary PHP code via the ariadne parameter in (1) ftp/loader.php and (2) lib/includes/loader.cmd.php. NOTE: this issue is disputed by CVE, since installation instructions recommend that the files be placed outside of the web document root and require the administrator to modify $ariadne in an include file.",BID:20916 | URL:http://www.securityfocus.com/bid/20916 | BUGTRAQ:20061106 Ariadne <= 2.4.1 Multiple Remote File Include Vulnerabilities(New) | URL:http://www.securityfocus.com/archive/1/450709/100/0/threaded | SREASON:1827 | URL:http://securityreason.com/securityalert/1827 | VIM:20061106 DISPUTE: PHP file inclusion in Ariadne 2.4.1 | URL:http://attrition.org/pipermail/vim/2006-November/001108.html | VIM:20061106 RE: DISPUTE: PHP file inclusion in Ariadne 2.4.1 | URL:http://attrition.org/pipermail/vim/2006-November/001109.html | XF:ariadne-storeconfig-file-include(30018) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30018,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5777,Candidate,"Creasito E-Commerce Content Manager 1.3.08 allows remote attackers to bypass authentication and perform privileged functions via a non-empty finame parameter to (1) addnewcont.php, (2) adminpassw.php, (3) amministrazione.php, (4) artins.php, (5) bgcolor.php, (6) cancartcat.php, (7) canccat.php, (8) cancelart.php, (9) cancontsit.php, (10) chanpassamm.php, (11) dele.php, (12) delecat.php, (13) delecont.php, (14) emailall.php, (15) gestflashtempl.php, (16) gestmagart.php, (17) gestmagaz.php, (18) gestpre.php, (19) input.php, (20) input3.php, (21) insnucat.php, (22) instempflash.php, (23) mailfc.php, (24) modfdati.php, (25) rescont4.php, (26) ricordo1.php, (27) ricordo4.php, (28) tabcatalg.php, (29) tabcont.php, (30) tabcont3.php, (31) tabstile.php, (32) tabstile3.php, (33) testimmg.php, and (34) update.php in admin/. NOTE: some of these details are obtained from third party information.",EXPLOIT-DB:2709 | URL:https://www.exploit-db.com/exploits/2709 | SECUNIA:22729 | URL:http://secunia.com/advisories/22729 | XF:creasito-admin-authentication-bypass(30011) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30011,Assigned (20061106),None (candidate not yet proposed), +CVE-2006-5778,Candidate,"ftpd in linux-ftpd 0.17, and possibly other versions, performs a chdir before setting the UID, which allows local users to bypass intended access restrictions by redirecting their home directory to a restricted directory.",BID:21000 | URL:http://www.securityfocus.com/bid/21000 | CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384454 | DEBIAN:DSA-1217 | URL:http://www.debian.org/security/2006/dsa-1217 | FULLDISC:20060825 ftpd chdir() while root | URL:http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/049014.html | GENTOO:GLSA-200611-05 | URL:http://security.gentoo.org/glsa/glsa-200611-05.xml | SECUNIA:22997 | URL:http://secunia.com/advisories/22997,Assigned (20061107),None (candidate not yet proposed), +CVE-2006-5779,Canddate,"OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.",BID:20939 | URL:http://www.securityfocus.com/bid/20939 | BUGTRAQ:20061106 VulnDisco Pack for Metasploit | URL:http://www.securityfocus.com/archive/1/450728/100/0/threaded | CONFIRM:http://www.openldap.org/its/index.cgi/Software%20Bugs?id=4740 | CONFIRM:https://issues.rpath.com/browse/RPL-820 | GENTOO:GLSA-200611-25 | URL:http://security.gentoo.org/glsa/glsa-200611-25.xml | MANDRIVA:MDKSA-2006:208 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:208 | MISC:http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz | MISC:http://gleg.net/vulndisco_meta.shtml | OPENPKG:OpenPKG-SA-2006.033 | URL:http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.033-openldap.html | SECTRACK:1017166 | URL:http://securitytracker.com/id?1017166 | SECUNIA:22750 | URL:http://secunia.com/advisories/22750 | SECUNIA:22953 | URL:http://secunia.com/advisories/22953 | SECUNIA:22996 | URL:http://secunia.com/advisories/22996 | SECUNIA:23125 | URL:http://secunia.com/advisories/23125 | SECUNIA:23133 | URL:http://secunia.com/advisories/23133 | SECUNIA:23152 | URL:http://secunia.com/advisories/23152 | SECUNIA:23170 | URL:http://secunia.com/advisories/23170 | SREASON:1831 | URL:http://securityreason.com/securityalert/1831 | SUSE:SUSE-SA:2006:072 | URL:http://www.novell.com/linux/security/advisories/2006_72_openldap2.html | TRUSTIX:2006-0066 | URL:http://www.trustix.org/errata/2006/0066/ | UBUNTU:USN-384-1 | URL:http://www.ubuntu.com/usn/usn-384-1 | VUPEN:ADV-2006-4379 | URL:http://www.vupen.com/english/advisories/2006/4379 | XF:openldap-bind-dos(30076) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/30076,Assigned (20061107),None (candidate not yet proposed),