sentence_idx int64 0 17.5k | words list | POS list | tag list |
|---|---|---|---|
700 | [
"The",
"image",
"decoder",
"in",
"WebKit",
"before",
"r52833",
"as",
"used",
"in",
"Google",
"Chrome",
"before",
"4.0.249.78",
"does",
"not",
"properly",
"handle",
"a",
"failure",
"of",
"memory",
"allocation",
"which",
"allows",
"remote",
"attackers",
"to",
"e... | [
9,
17,
17,
12,
18,
12,
17,
12,
33,
12,
18,
18,
12,
8,
35,
25,
25,
30,
9,
17,
12,
17,
17,
36,
35,
17,
20,
29,
30,
13,
17,
12,
9,
18,
17,
12,
9,
13,
18,
17,
36,
35,
9,
13,
17,
5
] | [
23,
23,
23,
23,
0,
14,
22,
23,
23,
23,
13,
0,
14,
22,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
11,
11,
19,
23,
11,
19,
19,
23,
23,
0,
14,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
701 | [
"Google",
"Chrome",
"before",
"4.0.249.78",
"sends",
"an",
"https",
"URL",
"in",
"the",
"Referer",
"header",
"of",
"an",
"http",
"request",
"in",
"certain",
"circumstances",
"involving",
"https",
"to",
"http",
"redirection",
"which",
"allows",
"remote",
"HTTP",
... | [
18,
18,
12,
8,
20,
9,
17,
18,
12,
9,
18,
17,
12,
9,
17,
17,
12,
13,
20,
32,
17,
29,
30,
17,
36,
35,
34,
18,
20,
29,
30,
25,
13,
17,
12,
13,
18,
17,
5
] | [
13,
0,
14,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
11,
23,
23,
23,
11,
11,
19,
11,
23,
23,
23,
23,
23
] |
702 | [
"WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp",
"in",
"WebKit",
"before",
"r52401",
"as",
"used",
"in",
"Google",
"Chrome",
"before",
"4.0.249.78",
"allows",
"remote",
"attackers",
"to",
"bypass",
"the",
"Same",
"Origin",
"Policy",
"via",
"vectors",
"involving",
"... | [
18,
12,
18,
12,
17,
12,
33,
12,
18,
18,
12,
8,
35,
34,
20,
29,
30,
9,
18,
18,
18,
12,
20,
32,
9,
13,
17,
5
] | [
3,
23,
0,
14,
22,
23,
23,
23,
13,
0,
14,
22,
11,
11,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
703 | [
"The",
"ParamTraits<SkBitmap>::Read",
"function",
"in",
"common/common_param_traits.cc",
"in",
"Google",
"Chrome",
"before",
"4.0.249.78",
"does",
"not",
"use",
"the",
"correct",
"variables",
"in",
"calculations",
"designed",
"to",
"prevent",
"integer",
"overflows",
"wh... | [
9,
19,
17,
12,
17,
12,
18,
18,
12,
8,
35,
25,
30,
9,
13,
20,
12,
20,
33,
29,
30,
17,
20,
36,
35,
20,
29,
30,
14,
17,
29,
30,
9,
17,
12,
17,
7,
25,
34,
33,
13,
17,
12,
17,
20,
33,
29,
17,
5
] | [
23,
4,
23,
23,
3,
23,
13,
0,
14,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
12,
11,
11,
23,
11,
11,
23,
23,
23,
11,
23,
23,
23,
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
704 | [
"The",
"ParamTraits<SkBitmap>::Read",
"function",
"in",
"common/common_param_traits.cc",
"in",
"Google",
"Chrome",
"before",
"4.0.249.78",
"does",
"not",
"initialize",
"the",
"memory",
"locations",
"that",
"will",
"hold",
"bitmap",
"data",
"which",
"might",
"allow",
"... | [
9,
19,
17,
12,
17,
12,
18,
18,
12,
8,
35,
25,
30,
9,
17,
20,
36,
16,
30,
17,
20,
36,
16,
30,
13,
20,
29,
30,
25,
13,
17,
12,
17,
17,
12,
32,
13,
20,
33,
29,
30,
12,
9,
3,
8,
4,
17,
17,
7,
3,
8,
4,
18,
17,
5
] | [
23,
4,
23,
23,
3,
23,
13,
0,
14,
22,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
19,
23,
11,
11,
19,
11,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
2... |
705 | [
"Stack",
"consumption",
"vulnerability",
"in",
"the",
"ChildProcessSecurityPolicy::CanRequestURL",
"function",
"in",
"browser/child_process_security_policy.cc",
"in",
"Google",
"Chrome",
"before",
"4.0.249.78",
"allows",
"remote",
"attackers",
"to",
"cause",
"a",
"denial",
... | [
18,
17,
17,
12,
9,
18,
17,
12,
17,
12,
18,
18,
12,
8,
20,
34,
20,
29,
30,
9,
17,
12,
17,
3,
13,
17,
7,
17,
17,
4,
12,
9,
18,
36,
35,
13,
20,
12,
33,
12,
9,
18,
36,
35,
12,
13,
20,
12,
9,
17,
6,
17,
5
] | [
23,
23,
23,
23,
23,
4,
23,
23,
3,
23,
13,
0,
14,
22,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
11,
23,
23,
11,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
706 | [
"JAG",
"(",
"Just",
"Another",
"Guestbook",
")",
"1.14",
"stores",
"sensitive",
"information",
"under",
"the",
"web",
"root",
"with",
"insufficient",
"access",
"control",
"which",
"allows",
"remote",
"attackers",
"to",
"obtain",
"sensitive",
"information",
"via",
... | [
18,
3,
18,
9,
18,
4,
8,
20,
13,
17,
12,
9,
13,
17,
12,
13,
17,
17,
36,
35,
17,
20,
29,
30,
13,
17,
12,
9,
13,
17,
12,
17,
5
] | [
0,
23,
23,
23,
23,
23,
14,
23,
11,
19,
23,
23,
23,
23,
23,
23,
11,
19,
23,
11,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23,
23,
3,
23
] |
707 | [
"Unspecified",
"vulnerability",
"in",
"eMBox",
"in",
"Novell",
"eDirectory",
"8.8",
"SP5",
"Patch",
"2",
"and",
"earlier",
"allows",
"remote",
"attackers",
"to",
"cause",
"a",
"denial",
"of",
"service",
"(",
"crash",
")",
"via",
"unknown",
"a",
"crafted",
"S... | [
13,
17,
12,
17,
12,
18,
17,
8,
18,
18,
8,
7,
14,
20,
34,
20,
29,
30,
9,
17,
12,
17,
3,
17,
4,
12,
12,
9,
13,
18,
17,
9,
13,
17,
12,
18,
5
] | [
23,
23,
23,
23,
23,
13,
0,
14,
12,
23,
14,
22,
22,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
1,
23
] |
708 | [
"MoinMoin",
"1.9",
"before",
"1.9.1",
"does",
"not",
"perform",
"the",
"expected",
"clearing",
"of",
"the",
"sys.argv",
"array",
"in",
"situations",
"where",
"the",
"GATEWAY_INTERFACE",
"environment",
"variable",
"is",
"set",
"which",
"allows",
"remote",
"attacker... | [
18,
8,
12,
8,
35,
25,
30,
9,
13,
17,
12,
9,
13,
17,
12,
20,
39,
9,
18,
17,
17,
35,
33,
36,
35,
17,
20,
29,
30,
13,
17,
12,
13,
20,
5
] | [
0,
14,
22,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23
] |
709 | [
"Unspecified",
"vulnerability",
"in",
"MoinMoin",
"1.5.x",
"through",
"1.7.x",
"1.8.x",
"before",
"1.8.7",
"and",
"1.9.x",
"before",
"1.9.2",
"has",
"unknown",
"impact",
"and",
"attack",
"vectors",
"related",
"to",
"configurations",
"that",
"have",
"a",
"non-empty... | [
13,
17,
12,
18,
8,
12,
8,
8,
12,
8,
7,
8,
12,
8,
35,
33,
17,
7,
17,
20,
33,
29,
20,
36,
34,
9,
13,
17,
17,
9,
13,
17,
31,
9,
18,
17,
31,
7,
18,
31,
5
] | [
23,
23,
23,
0,
14,
22,
22,
14,
22,
22,
23,
14,
22,
22,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
14,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
710 | [
"MoinMoin",
"before",
"1.8.7",
"and",
"1.9.x",
"before",
"1.9.2",
"does",
"not",
"properly",
"sanitize",
"user",
"profiles",
"which",
"has",
"unspecified",
"impact",
"and",
"attack",
"vectors",
"."
] | [
18,
12,
8,
7,
8,
12,
8,
35,
25,
25,
30,
17,
20,
36,
35,
33,
17,
7,
17,
20,
5
] | [
0,
14,
22,
23,
14,
22,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23
] |
711 | [
"Unspecified",
"vulnerability",
"in",
"the",
"IP-Tech",
"JQuarks",
"(",
"com_jquarks",
")",
"Component",
"before",
"0.2.4",
"for",
"Joomla!",
"allows",
"attackers",
"to",
"obtain",
"the",
"installation",
"path",
"for",
"Joomla!",
"via",
"unknown",
"vectors",
"."
] | [
13,
17,
12,
9,
13,
18,
3,
20,
4,
18,
12,
8,
12,
18,
35,
20,
29,
30,
9,
17,
17,
12,
18,
12,
13,
20,
5
] | [
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
14,
22,
23,
23,
11,
11,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
712 | [
"SQL",
"injection",
"vulnerability",
"in",
"index.php",
"in",
"KR",
"MEDIA",
"Pogodny",
"CMS",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"id",
"parameter",
"in",
"a",
"niusy",
"action",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
18,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
12,
9,
13,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
15,
15,
15,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
713 | [
"SQL",
"injection",
"vulnerability",
"in",
"index.php",
"in",
"WSN",
"Guest",
"1.02",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"orderlinks",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
8,
20,
34,
20,
29,
30,
13,
18,
35,
12,
9,
20,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
15,
14,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
714 | [
"SQL",
"injection",
"vulnerability",
"in",
"cplphoto.php",
"in",
"the",
"Copperleaf",
"Photolog",
"plugin",
"0.16",
"and",
"possibly",
"earlier",
"for",
"WordPress",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"p... | [
18,
17,
17,
12,
17,
12,
9,
18,
18,
17,
8,
7,
25,
26,
12,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
9,
17,
17,
5
] | [
11,
19,
19,
23,
23,
23,
23,
13,
0,
23,
14,
23,
23,
23,
23,
23,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
715 | [
"StatCounteX",
"3.1",
"stores",
"sensitive",
"information",
"under",
"the",
"web",
"root",
"with",
"insufficient",
"access",
"control",
"which",
"allows",
"remote",
"attackers",
"to",
"download",
"a",
"database",
"via",
"a",
"direct",
"request",
"for",
"path/stats... | [
18,
8,
20,
13,
17,
12,
9,
13,
17,
12,
13,
17,
17,
36,
35,
17,
20,
29,
30,
9,
17,
12,
9,
13,
17,
12,
17,
5
] | [
0,
14,
23,
11,
19,
23,
23,
23,
23,
23,
23,
11,
19,
23,
11,
11,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
3,
23
] |
716 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"index.php",
"in",
"BGSvetionik",
"BGS",
"CMS",
"2.2.1",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web",
"script",
"or",
"HTML",
"via",
"the",
"search",
"parameter",
"in",
... | [
13,
17,
3,
18,
4,
17,
12,
17,
12,
18,
18,
18,
8,
20,
34,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
17,
17,
12,
9,
17,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
23,
13,
0,
15,
14,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
717 | [
"NOTE",
":",
"some",
"of",
"these",
"details",
"are",
"obtained",
"from",
"third",
"party",
"information",
"."
] | [
17,
6,
9,
12,
9,
20,
34,
33,
12,
13,
17,
17,
5
] | [
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
11,
23
] |
718 | [
"Directory",
"traversal",
"vulnerability",
"in",
"index.php",
"in",
"the",
"RWCards",
"(",
"com_rwcards",
")",
"component",
"3.0.18",
"for",
"Joomla!",
"allows",
"remote",
"attackers",
"to",
"read",
"arbitrary",
"files",
"via",
"a",
"."
] | [
17,
13,
17,
12,
17,
12,
9,
18,
3,
20,
4,
34,
8,
12,
18,
35,
13,
20,
29,
30,
13,
20,
12,
9,
5
] | [
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
14,
23,
23,
11,
11,
19,
23,
23,
11,
19,
23,
23,
11
] |
719 | [
"."
] | [
5
] | [
19
] |
720 | [
"(",
"dot",
"dot",
")",
"in",
"the",
"controller",
"parameter",
"."
] | [
3,
13,
17,
4,
12,
9,
17,
17,
5
] | [
23,
11,
19,
23,
23,
23,
23,
23,
23
] |
721 | [
"SQL",
"injection",
"vulnerability",
"in",
"index.php",
"in",
"Katalog",
"Stron",
"Hurricane",
"1.3.5",
"and",
"possibly",
"earlier",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"get",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
18,
8,
7,
25,
26,
35,
34,
20,
29,
30,
13,
18,
35,
12,
9,
17,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
15,
15,
14,
23,
23,
23,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
722 | [
"PHP",
"remote",
"file",
"inclusion",
"vulnerability",
"in",
"includes/moderation.php",
"in",
"Katalog",
"Stron",
"Hurricane",
"1.3.5",
"and",
"possibly",
"earlier",
"when",
"register_globals",
"is",
"enabled",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitr... | [
18,
34,
13,
17,
17,
12,
17,
12,
18,
18,
18,
8,
7,
25,
26,
39,
20,
35,
33,
35,
34,
20,
29,
30,
13,
18,
17,
12,
9,
18,
12,
9,
17,
17,
5
] | [
23,
11,
23,
23,
23,
23,
3,
23,
0,
15,
15,
14,
23,
23,
23,
23,
23,
23,
23,
11,
11,
19,
23,
11,
11,
19,
19,
23,
23,
23,
23,
23,
9,
23,
23
] |
723 | [
"Multiple",
"stack-based",
"buffer",
"overflows",
"in",
"the",
"HyleosChemView.HLChemView",
"ActiveX",
"control",
"(",
"HyleosChemView.ocx",
")",
"in",
"Hyleos",
"ChemView",
"1.9.5.1",
"allow",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"code",
"via",
"a",
... | [
13,
13,
17,
35,
12,
9,
18,
18,
17,
3,
18,
4,
12,
18,
18,
8,
13,
17,
20,
29,
30,
13,
17,
12,
9,
13,
17,
12,
13,
17,
20,
12,
9,
17,
17,
29,
9,
3,
8,
4,
17,
7,
3,
8,
4,
18,
20,
5
] | [
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
13,
0,
14,
23,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
7,
23,
23
] |
724 | [
"Directory",
"traversal",
"vulnerability",
"in",
"index.php",
"in",
"ZeusCMS",
"0.2",
"allows",
"remote",
"attackers",
"to",
"include",
"and",
"execute",
"arbitrary",
"local",
"files",
"via",
"directory",
"traversal",
"sequences",
"in",
"the",
"page",
"parameter",
... | [
18,
13,
17,
12,
17,
12,
18,
8,
20,
34,
20,
29,
30,
7,
30,
13,
13,
20,
12,
17,
17,
20,
12,
9,
17,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
14,
11,
11,
19,
23,
23,
23,
11,
11,
11,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
725 | [
"ZeusCMS",
"0.2",
"stores",
"sensitive",
"information",
"under",
"the",
"web",
"root",
"with",
"insufficient",
"access",
"control",
"which",
"allows",
"remote",
"attackers",
"to",
"obtain",
"sensitive",
"information",
"via",
"a",
"direct",
"request",
"for",
"admin... | [
18,
8,
20,
13,
17,
12,
9,
13,
17,
12,
13,
17,
17,
36,
35,
17,
20,
29,
30,
13,
17,
12,
9,
13,
17,
12,
17,
5
] | [
0,
14,
23,
11,
19,
23,
23,
23,
23,
23,
23,
11,
19,
23,
11,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23,
23,
3,
23
] |
726 | [
"WordPress",
"2.9",
"before",
"2.9.2",
"allows",
"remote",
"authenticated",
"users",
"to",
"read",
"trash",
"posts",
"from",
"other",
"authors",
"via",
"a",
"direct",
"request",
"with",
"a",
"modified",
"p",
"parameter",
"."
] | [
7,
8,
12,
8,
20,
34,
33,
20,
29,
30,
13,
20,
12,
13,
20,
12,
9,
13,
17,
12,
9,
13,
17,
17,
5
] | [
0,
14,
22,
22,
11,
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
727 | [
"Unspecified",
"vulnerability",
"in",
"TIBRepoServer5.jar",
"in",
"TIBCO",
"Administrator",
"5.4.0",
"through",
"5.6.0",
"when",
"JMS",
"transport",
"is",
"used",
"allows",
"remote",
"authenticated",
"users",
"to",
"execute",
"arbitrary",
"code",
"on",
"all",
"domai... | [
13,
17,
12,
18,
12,
18,
18,
8,
12,
8,
39,
18,
17,
35,
33,
35,
34,
33,
20,
29,
30,
13,
17,
12,
9,
17,
20,
12,
20,
33,
29,
32,
13,
20,
5
] | [
23,
23,
23,
23,
23,
13,
0,
14,
22,
22,
23,
23,
23,
23,
23,
11,
11,
19,
19,
23,
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23
] |
728 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"createDestination.action",
"in",
"Apache",
"ActiveMQ",
"before",
"5.3.1",
"allows",
"remote",
"authenticated",
"users",
"to",
"inject",
"arbitrary",
"web",
"script",
"or",
"HTML",
"via",
"the",
"J... | [
13,
17,
3,
18,
4,
17,
12,
17,
12,
18,
18,
12,
8,
20,
34,
33,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
18,
17,
12,
9,
13,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
23,
13,
0,
14,
22,
11,
11,
19,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
729 | [
"The",
"design",
"of",
"the",
"dialplan",
"functionality",
"in",
"Asterisk",
"Open",
"Source",
"1.2.x",
"1.4.x",
"and",
"1.6.x",
";",
"and",
"Asterisk",
"Business",
"Edition",
"B.x.x",
"and",
"C.x.x",
"when",
"using",
"the",
"${EXTEN}",
"channel",
"variable",
... | [
9,
17,
12,
9,
17,
17,
12,
18,
18,
18,
8,
8,
7,
8,
6,
7,
18,
18,
18,
18,
7,
18,
39,
32,
9,
13,
17,
17,
7,
17,
17,
20,
35,
13,
20,
29,
30,
20,
12,
9,
17,
32,
20,
36,
34,
33,
39,
9,
17,
35,
33,
12,
33,
32,
9,
... | [
23,
23,
23,
23,
23,
23,
23,
0,
23,
23,
14,
14,
23,
14,
23,
23,
0,
2,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
11,
23,
11,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
2... |
730 | [
"NOTE",
":",
"it",
"could",
"be",
"argued",
"that",
"this",
"is",
"not",
"a",
"vulnerability",
"in",
"Asterisk",
"but",
"a",
"class",
"of",
"vulnerabilities",
"that",
"can",
"occur",
"in",
"any",
"program",
"that",
"uses",
"this",
"feature",
"without",
"th... | [
17,
6,
23,
16,
30,
33,
12,
9,
35,
25,
9,
17,
12,
18,
7,
9,
17,
12,
20,
36,
16,
30,
12,
9,
17,
36,
35,
9,
17,
12,
9,
13,
17,
17,
36,
35,
25,
13,
5
] | [
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
0,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
731 | [
"WebAccess",
"in",
"VMware",
"VirtualCenter",
"2.0.2",
"and",
"2.5",
"VMware",
"Server",
"2.0",
"and",
"VMware",
"ESX",
"3.0.3",
"and",
"3.5",
"allows",
"remote",
"attackers",
"to",
"leverage",
"proxy-server",
"functionality",
"to",
"spoof",
"the",
"origin",
"of... | [
18,
12,
18,
18,
8,
7,
8,
18,
18,
8,
7,
18,
18,
8,
7,
8,
20,
34,
20,
29,
30,
13,
17,
29,
30,
9,
17,
12,
20,
12,
13,
20,
33,
29,
9,
18,
17,
17,
5
] | [
23,
23,
13,
0,
14,
23,
14,
13,
0,
14,
23,
13,
23,
14,
23,
14,
11,
11,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
732 | [
"Stack-based",
"buffer",
"overflow",
"in",
"Orbital",
"Viewer",
"1.04",
"allows",
"user-assisted",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"code",
"via",
"a",
"crafted",
"(",
"1",
")",
"."
] | [
13,
17,
17,
12,
18,
18,
8,
35,
13,
17,
20,
29,
30,
13,
17,
12,
9,
33,
3,
8,
4,
5
] | [
23,
11,
19,
23,
0,
15,
14,
11,
23,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23,
23,
23,
23
] |
733 | [
"orb",
"or",
"(",
"2",
")",
"."
] | [
17,
7,
3,
8,
4,
5
] | [
23,
23,
23,
23,
23,
23
] |
734 | [
"ov",
"file",
"."
] | [
13,
17,
5
] | [
23,
23,
23
] |
735 | [
"The",
"ExecuteExe",
"method",
"in",
"the",
"DVBSExeCall",
"Control",
"ActiveX",
"control",
"1.0.0.1",
"in",
"DVBSExeCall.ocx",
"in",
"DATEV",
"Base",
"System",
"(",
"aka",
"Grundpaket",
"Basis",
")",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
... | [
9,
18,
17,
12,
9,
18,
18,
18,
17,
8,
12,
18,
12,
18,
18,
18,
3,
34,
18,
18,
4,
35,
13,
20,
29,
30,
13,
20,
12,
13,
20,
5
] | [
23,
7,
23,
23,
23,
23,
23,
23,
23,
14,
23,
23,
23,
13,
0,
15,
23,
23,
23,
23,
23,
11,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23
] |
736 | [
"SQL",
"injection",
"vulnerability",
"in",
"index.php",
"in",
"CommodityRentals",
"Video",
"Games",
"Rentals",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"pfid",
"parameter",
"in",
"a",
"catalog",
"action",
"."
... | [
18,
17,
17,
12,
17,
12,
18,
18,
18,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
9,
17,
17,
12,
9,
17,
17,
5
] | [
11,
19,
19,
23,
23,
23,
13,
0,
15,
15,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
737 | [
"SQL",
"injection",
"vulnerability",
"in",
"druckansicht.php",
"in",
"JTL-Shop",
"2",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"s",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
8,
20,
34,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
14,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
738 | [
"SQL",
"injection",
"vulnerability",
"in",
"the",
"IP-Tech",
"JQuarks",
"(",
"com_jquarks",
")",
"Component",
"0.2.3",
"and",
"possibly",
"earlier",
"for",
"Joomla!",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
... | [
18,
17,
17,
12,
9,
13,
18,
3,
20,
4,
18,
8,
7,
25,
26,
12,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
29,
30,
5
] | [
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
23,
14,
23,
23,
23,
23,
23,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23,
23,
23
] |
739 | [
"NOTE",
":",
"some",
"of",
"these",
"details",
"are",
"obtained",
"from",
"third",
"party",
"information",
"."
] | [
17,
6,
9,
12,
9,
20,
34,
33,
12,
13,
17,
17,
5
] | [
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
11,
23
] |
740 | [
"SQL",
"injection",
"vulnerability",
"in",
"products.php",
"in",
"CommodityRentals",
"Trade",
"Manager",
"Script",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"cid",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
18,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
9,
17,
17,
5
] | [
11,
19,
19,
23,
23,
23,
13,
0,
15,
15,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
741 | [
"SQL",
"injection",
"vulnerability",
"in",
"the",
"PerchaGallery",
"(",
"com_perchagallery",
")",
"component",
"before",
"1.5b",
"for",
"Joomla!",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"id",
"parameter",
"i... | [
18,
17,
17,
12,
9,
18,
3,
17,
4,
17,
12,
8,
12,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
12,
9,
13,
17,
29,
30,
5
] | [
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
14,
22,
23,
23,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
742 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"pages/index.php",
"in",
"BASIC-CMS",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web",
"script",
"or",
"HTML",
"via",
"the",
"nav_id",
"parameter",
"."
] | [
13,
17,
3,
18,
4,
17,
12,
17,
12,
18,
20,
34,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
13,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
3,
23,
0,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
9,
23,
23
] |
743 | [
"Directory",
"traversal",
"vulnerability",
"in",
"includes/download.php",
"in",
"the",
"JoomlaWorks",
"AllVideos",
"(",
"Jw_allVideos",
")",
"plugin",
"3.0",
"through",
"3.2",
"for",
"Joomla!",
"allows",
"remote",
"attackers",
"to",
"read",
"arbitrary",
"files",
"vi... | [
18,
13,
17,
12,
17,
12,
9,
18,
18,
3,
18,
4,
31,
8,
12,
8,
12,
18,
35,
13,
20,
29,
30,
13,
20,
12,
9,
18,
3,
33,
25,
17,
4,
12,
9,
17,
17,
5
] | [
11,
19,
19,
23,
3,
23,
23,
13,
23,
23,
23,
23,
23,
14,
22,
22,
23,
23,
11,
11,
19,
23,
23,
11,
19,
23,
23,
23,
23,
23,
11,
19,
23,
23,
23,
23,
23,
23
] |
744 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"the",
"iTweak",
"Upload",
"module",
"6.x-1.x",
"before",
"6.x-1.2",
"and",
"6.x-2.x",
"before",
"6.x-2.3",
"for",
"Drupal",
"allows",
"remote",
"authenticated",
"users",
"with",
"create",
"content... | [
13,
17,
3,
18,
4,
17,
12,
9,
17,
18,
17,
13,
12,
13,
7,
13,
12,
13,
12,
18,
35,
30,
13,
20,
12,
17,
17,
7,
13,
17,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
17,
17,
12,
9,
13,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
0,
15,
23,
14,
22,
22,
23,
14,
22,
22,
23,
23,
11,
11,
19,
19,
23,
23,
23,
23,
23,
23,
11,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
745 | [
"SQL",
"injection",
"vulnerability",
"in",
"backoffice/login.asp",
"in",
"Dynamicsoft",
"WSC",
"CMS",
"2.2",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"Password",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
18,
8,
20,
34,
20,
29,
30,
13,
18,
35,
12,
9,
18,
17,
5
] | [
11,
19,
19,
23,
3,
23,
13,
0,
15,
14,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
11,
23,
23
] |
746 | [
"NOTE",
":",
"some",
"of",
"these",
"details",
"are",
"obtained",
"from",
"third",
"party",
"information",
"."
] | [
17,
6,
9,
12,
9,
20,
34,
33,
12,
13,
17,
17,
5
] | [
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
11,
23
] |
747 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"index.php",
"in",
"VideoSearchScript",
"Pro",
"3.5",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web",
"script",
"or",
"HTML",
"via",
"the",
"q",
"parameter",
"."
] | [
13,
17,
3,
18,
4,
17,
12,
17,
12,
18,
18,
8,
20,
34,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
13,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
23,
0,
15,
14,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23
] |
748 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"index.php",
"in",
"WampServer",
"2.0i",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web",
"script",
"or",
"HTML",
"via",
"the",
"lang",
"parameter",
"."
] | [
13,
17,
3,
18,
4,
17,
12,
17,
12,
18,
8,
20,
34,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
17,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
23,
0,
14,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23
] |
749 | [
"SQL",
"injection",
"vulnerability",
"in",
"ForceChangePassword.jsp",
"in",
"Newgen",
"Software",
"OmniDocs",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"unspecified",
"vectors",
"."
] | [
18,
17,
17,
12,
18,
12,
18,
18,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
13,
20,
5
] | [
11,
19,
19,
23,
23,
23,
23,
23,
0,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23
] |
750 | [
"SQL",
"injection",
"vulnerability",
"in",
"cisco/services/PhonecDirectory.php",
"in",
"Fonality",
"Trixbox",
"2.2.4",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"ID",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
8,
20,
34,
20,
29,
30,
13,
18,
35,
12,
9,
18,
17,
5
] | [
11,
19,
19,
23,
3,
23,
13,
0,
14,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
751 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"wa/auth",
"in",
"PortWise",
"SSL",
"VPN",
"4.6",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web",
"script",
"or",
"HTML",
"via",
"the",
"reloadFrame",
"parameter",
"."
] | [
13,
17,
3,
18,
4,
17,
12,
17,
12,
18,
18,
18,
8,
20,
34,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
17,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
23,
13,
0,
15,
14,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
9,
23,
23
] |
752 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"the",
"Portlet",
"Palette",
"in",
"IBM",
"WebSphere",
"Portal",
"6.0.1.5",
"wp6015_008_01",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web",
"script",
"or",
"HTML",
"via",
"t... | [
13,
17,
3,
18,
4,
17,
12,
9,
18,
18,
12,
18,
18,
18,
8,
17,
20,
34,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
17,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
13,
0,
15,
14,
23,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23
] |
753 | [
"Aavmker4.sys",
"in",
"avast",
"!",
"4.8",
"through",
"4.8.1368.0",
"and",
"5.0",
"before",
"5.0.418.0",
"running",
"on",
"Windows",
"2000",
"and",
"XP",
"does",
"not",
"properly",
"validate",
"input",
"to",
"IOCTL",
"0xb2d60030",
"which",
"allows",
"local",
"... | [
18,
12,
17,
5,
8,
12,
8,
7,
8,
12,
8,
32,
12,
18,
8,
7,
18,
35,
25,
25,
13,
17,
29,
18,
8,
36,
35,
13,
20,
29,
30,
9,
17,
12,
17,
3,
17,
17,
4,
7,
13,
13,
17,
29,
30,
20,
12,
18,
20,
32,
13,
17,
35,
12,
14,
... | [
23,
23,
13,
23,
14,
22,
22,
23,
14,
22,
22,
23,
23,
8,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
14,
23,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
23,
11,
23,
23,
11,
19,
19,
23,
11,
19,
23,
23,
11,
23,
23,
11,
23,
... |
754 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"the",
"login/prompt",
"component",
"in",
"Subex",
"Nikira",
"Fraud",
"Management",
"System",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web",
"script",
"or",
"HTML",
"via",
"... | [
13,
17,
3,
18,
4,
17,
12,
9,
13,
17,
12,
18,
18,
18,
18,
18,
35,
30,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
17,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
0,
15,
15,
15,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23
] |
755 | [
"Cross-site",
"request",
"forgery",
"(",
"CSRF",
")",
"vulnerability",
"in",
"add_user.php",
"in",
"Employee",
"Timeclock",
"Software",
"0.99",
"allows",
"remote",
"attackers",
"to",
"hijack",
"the",
"authentication",
"of",
"an",
"administrator",
"for",
"requests",
... | [
13,
17,
17,
3,
18,
4,
17,
12,
17,
12,
18,
18,
18,
8,
20,
34,
20,
29,
30,
9,
17,
12,
9,
17,
12,
20,
36,
34,
13,
13,
20,
5
] | [
11,
19,
19,
23,
11,
23,
23,
23,
23,
23,
0,
15,
15,
14,
11,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23
] |
756 | [
"NOTE",
":",
"some",
"of",
"these",
"details",
"are",
"obtained",
"from",
"third",
"party",
"information",
"."
] | [
17,
6,
9,
12,
9,
20,
34,
33,
12,
13,
17,
17,
5
] | [
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
11,
23
] |
757 | [
"Multiple",
"unspecified",
"vulnerabilities",
"in",
"(",
"1",
")",
"ns-slapd",
"and",
"(",
"2",
")",
"slapd.exe",
"in",
"Sun",
"Directory",
"Server",
"Enterprise",
"Edition",
"7.0",
"Sun",
"Java",
"System",
"Directory",
"Server",
"5.2",
"and",
"Sun",
"Java",
... | [
18,
13,
20,
12,
3,
8,
4,
17,
7,
3,
8,
4,
17,
12,
18,
18,
18,
18,
18,
8,
18,
18,
18,
18,
18,
8,
7,
18,
18,
18,
18,
18,
18,
18,
8,
12,
8,
13,
17,
20,
29,
30,
9,
17,
12,
17,
3,
13,
17,
4,
12,
9,
13,
18,
17,
17... | [
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
13,
23,
23,
2,
23,
14,
13,
0,
15,
15,
15,
14,
23,
13,
0,
15,
15,
15,
2,
23,
14,
22,
22,
23,
11,
19,
23,
23,
23,
11,
19,
19,
23,
23,
11,
23,
23,
23,
23,
23... |
758 | [
"Multiple",
"cross-site",
"request",
"forgery",
"(",
"CSRF",
")",
"vulnerabilities",
"in",
"Limny",
"2.0",
"allow",
"remote",
"attackers",
"to",
"(",
"1",
")",
"hijack",
"the",
"authentication",
"of",
"users",
"or",
"administrators",
"for",
"requests",
"that",
... | [
13,
13,
17,
17,
3,
18,
4,
20,
12,
18,
8,
13,
17,
20,
29,
3,
8,
4,
17,
9,
17,
12,
20,
7,
20,
12,
20,
36,
34,
9,
17,
17,
7,
17,
12,
9,
13,
17,
29,
30,
7,
3,
8,
4,
17,
9,
17,
12,
9,
17,
12,
20,
36,
34,
9,
13,
... | [
11,
19,
19,
11,
23,
11,
23,
23,
23,
0,
14,
23,
11,
19,
23,
23,
23,
23,
11,
19,
19,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
19,
19,
23,
23,
23,
23,
11,
23,
... |
759 | [
"SQL",
"injection",
"vulnerability",
"in",
"default.asp",
"in",
"ASPCode",
"CMS",
"1.5.8",
"2.0.0",
"Build",
"103",
"and",
"possibly",
"other",
"versions",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"newsid",
... | [
18,
17,
17,
12,
17,
12,
18,
18,
8,
8,
18,
8,
7,
25,
13,
20,
35,
34,
20,
29,
30,
13,
18,
35,
12,
9,
17,
17,
39,
9,
17,
17,
35,
8,
5
] | [
11,
19,
19,
23,
23,
23,
0,
15,
14,
14,
23,
23,
23,
23,
23,
23,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
760 | [
"NOTE",
":",
"the",
"provenance",
"of",
"this",
"information",
"is",
"unknown",
";",
"the",
"details",
"are",
"obtained",
"solely",
"from",
"third",
"party",
"information",
"."
] | [
17,
6,
9,
17,
12,
9,
17,
35,
13,
6,
9,
20,
34,
33,
25,
12,
13,
17,
17,
5
] | [
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
11,
23
] |
761 | [
"Cross-site",
"request",
"forgery",
"(",
"CSRF",
")",
"vulnerability",
"in",
"default.asp",
"in",
"ASPCode",
"CMS",
"1.5.8",
"2.0.0",
"Build",
"103",
"and",
"possibly",
"other",
"versions",
"allows",
"remote",
"attackers",
"to",
"hijack",
"the",
"authentication",
... | [
13,
17,
17,
3,
18,
4,
17,
12,
17,
12,
18,
18,
8,
8,
18,
8,
7,
25,
13,
20,
35,
34,
20,
29,
30,
9,
17,
12,
9,
17,
12,
20,
36,
3,
8,
4,
17,
20,
12,
9,
13,
17,
12,
9,
17,
17,
7,
3,
8,
4,
17,
20,
12,
9,
13,
17,
... | [
11,
19,
19,
23,
11,
23,
23,
23,
23,
23,
0,
15,
14,
14,
23,
23,
23,
23,
23,
23,
11,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
... |
762 | [
"Multiple",
"SQL",
"injection",
"vulnerabilities",
"in",
"zport/dmd/Events/getJSONEventsInfo",
"in",
"Zenoss",
"2.3.3",
"and",
"other",
"versions",
"before",
"2.5",
"allow",
"remote",
"authenticated",
"users",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"t... | [
18,
18,
17,
20,
12,
17,
12,
18,
8,
7,
13,
20,
12,
8,
13,
17,
31,
20,
29,
30,
13,
18,
35,
12,
9,
3,
8,
4,
17,
3,
8,
4,
17,
3,
8,
4,
17,
3,
8,
4,
17,
7,
3,
8,
4,
17,
20,
5
] | [
23,
11,
19,
19,
23,
23,
23,
0,
14,
23,
23,
23,
14,
22,
23,
11,
19,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
763 | [
"Multiple",
"cross-site",
"request",
"forgery",
"(",
"CSRF",
")",
"vulnerabilities",
"in",
"Zenoss",
"2.3.3",
"and",
"other",
"versions",
"before",
"2.5",
"allow",
"remote",
"attackers",
"to",
"hijack",
"the",
"authentication",
"of",
"an",
"administrator",
"for",
... | [
13,
13,
17,
17,
3,
18,
4,
20,
12,
18,
8,
7,
13,
20,
12,
8,
13,
17,
20,
29,
30,
9,
17,
12,
9,
17,
12,
3,
8,
4,
20,
36,
34,
13,
20,
12,
17,
7,
3,
8,
4,
20,
12,
34,
13,
20,
36,
35,
12,
13,
17,
12,
17,
20,
12,
... | [
11,
19,
19,
11,
23,
11,
23,
23,
23,
0,
14,
23,
23,
23,
14,
22,
23,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
11,
23,
11,
23,
11,
23,
23,
23,
... |
764 | [
"Open",
"redirect",
"vulnerability",
"in",
"login.jsp",
"in",
"IBM",
"WebSphere",
"Portal",
"IBM",
"Lotus",
"Web",
"Content",
"Management",
"(",
"WCM)",
"and",
"IBM",
"Lotus",
"Workplace",
"Web",
"Content",
"Management",
"5.1.0.0",
"through",
"5.1.0.5",
"6.0.0.0",... | [
13,
13,
17,
12,
17,
12,
18,
18,
18,
18,
18,
18,
18,
18,
3,
18,
7,
18,
18,
18,
18,
18,
18,
8,
12,
8,
8,
12,
8,
8,
12,
8,
8,
12,
8,
7,
8,
6,
7,
18,
18,
18,
20,
8,
8,
8,
8,
7,
8,
12,
18,
18,
6,
35,
34,
20,
2... | [
23,
23,
23,
23,
23,
23,
13,
0,
15,
13,
0,
15,
15,
15,
23,
23,
23,
13,
0,
15,
15,
15,
15,
14,
22,
22,
14,
22,
22,
14,
22,
22,
14,
22,
22,
23,
14,
23,
23,
13,
0,
15,
23,
14,
14,
14,
14,
23,
14,
23,
0,
15,
23,
11,... |
765 | [
"_layouts/Upload.aspx",
"in",
"the",
"Documents",
"module",
"in",
"Microsoft",
"SharePoint",
"before",
"2010",
"uses",
"URLs",
"with",
"the",
"same",
"hostname",
"and",
"port",
"number",
"for",
"a",
"web",
"site's",
"primary",
"files",
"and",
"individual",
"user... | [
17,
12,
9,
18,
17,
12,
18,
18,
12,
8,
20,
18,
12,
9,
13,
17,
7,
17,
17,
12,
9,
17,
17,
13,
20,
7,
13,
20,
22,
13,
20,
3,
12,
17,
36,
35,
17,
31,
20,
29,
30,
13,
20,
7,
17,
13,
17,
3,
18,
4,
20,
12,
32,
18,
20... | [
3,
23,
23,
23,
23,
23,
13,
23,
14,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
11,
11,
19,
19,
23,
23,
23,
23,
23,
23,
11,
19,
23,
11,
23,
23,
23,
23,
... |
766 | [
"NOTE",
":",
"the",
"vendor",
"disputes",
"the",
"significance",
"of",
"this",
"issue",
"because",
"cross-domain",
"isolation",
"can",
"be",
"implemented",
"when",
"needed",
"."
] | [
17,
6,
9,
17,
35,
9,
17,
12,
9,
17,
12,
13,
17,
16,
30,
33,
39,
33,
5
] | [
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
767 | [
"The",
"default",
"configuration",
"of",
"cfg.packagepages_actions_excluded",
"in",
"MoinMoin",
"before",
"1.8.7",
"does",
"not",
"prevent",
"unsafe",
"package",
"actions",
"which",
"has",
"unspecified",
"impact",
"and",
"attack",
"vectors",
"."
] | [
9,
17,
17,
12,
33,
12,
18,
12,
8,
35,
25,
30,
13,
17,
20,
36,
35,
33,
17,
7,
17,
20,
5
] | [
23,
23,
11,
23,
23,
23,
0,
14,
22,
23,
23,
12,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23
] |
768 | [
"Buffer",
"overflow",
"in",
"Microsoft",
"Windows",
"Media",
"Player",
"9",
"and",
"11.0.5721.5145",
"allows",
"remote",
"attackers",
"to",
"cause",
"a",
"denial",
"of",
"service",
"(",
"divide-by-zero",
"error",
"and",
"application",
"crash",
")",
"via",
"a",
... | [
18,
12,
12,
18,
18,
18,
18,
8,
7,
8,
20,
34,
20,
29,
30,
9,
17,
12,
17,
3,
13,
17,
7,
17,
17,
4,
12,
9,
33,
5
] | [
11,
19,
23,
13,
8,
15,
15,
14,
23,
14,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
23,
23,
23,
11,
19,
23,
23,
23,
23,
23
] |
769 | [
"mpg",
"file",
"."
] | [
17,
17,
5
] | [
23,
23,
23
] |
770 | [
"An",
"unspecified",
"API",
"in",
"Microsoft",
"Windows",
"2000",
"Windows",
"XP",
"Windows",
"Server",
"2003",
"Windows",
"Vista",
"Windows",
"Server",
"2008",
"and",
"Windows",
"7",
"does",
"not",
"validate",
"arguments",
"which",
"allows",
"local",
"users",
... | [
9,
13,
18,
12,
18,
18,
8,
18,
18,
18,
18,
8,
18,
18,
18,
18,
8,
7,
35,
8,
35,
25,
30,
20,
36,
35,
13,
20,
29,
30,
9,
17,
12,
17,
3,
17,
17,
4,
12,
9,
13,
17,
5
] | [
23,
23,
23,
23,
13,
8,
18,
8,
18,
8,
23,
23,
8,
18,
8,
18,
18,
23,
8,
18,
23,
23,
23,
23,
23,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
23,
11,
23,
23,
23,
23,
11,
23
] |
771 | [
"SQL",
"injection",
"vulnerability",
"in",
"news.php",
"in",
"Erotik",
"Auktionshaus",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"id",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
15,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
772 | [
"SQL",
"injection",
"vulnerability",
"in",
"news.php",
"in",
"Auktionshaus",
"Gelb",
"3.0",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"id",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
8,
20,
34,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
15,
14,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
773 | [
"SQL",
"injection",
"vulnerability",
"in",
"news.php",
"in",
"Php",
"Auktion",
"Pro",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"id",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
15,
15,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
774 | [
"SQL",
"injection",
"vulnerability",
"in",
"news.php",
"in",
"Ero",
"Auktion",
"2.0",
"and",
"2010",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"id",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
8,
7,
8,
20,
34,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
15,
14,
23,
14,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
775 | [
"SQL",
"injection",
"vulnerability",
"in",
"showimg.php",
"in",
"Arab",
"Cart",
"1.0.2.0",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"id",
"parameter",
"."
] | [
18,
17,
17,
12,
17,
12,
18,
18,
8,
20,
34,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
5
] | [
11,
19,
19,
23,
23,
23,
0,
15,
14,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
23,
23,
23
] |
776 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"showimg.php",
"in",
"Arab",
"Cart",
"1.0.2.0",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web",
"script",
"or",
"HTML",
"via",
"the",
"id",
"parameter",
"."
] | [
13,
17,
3,
18,
4,
17,
12,
17,
12,
18,
18,
8,
20,
34,
20,
29,
30,
13,
13,
17,
7,
18,
12,
9,
13,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
23,
0,
15,
14,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23
] |
777 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"the",
"tb-send.rb",
"(",
"TrackBack",
"transmission",
")",
"plugin",
"in",
"tDiary",
"2.2.2",
"and",
"earlier",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web",
"script",
"or... | [
13,
17,
3,
18,
4,
17,
12,
9,
17,
3,
18,
17,
4,
17,
12,
13,
8,
7,
14,
20,
34,
20,
29,
30,
13,
13,
17,
7,
18,
12,
13,
20,
25,
33,
29,
9,
3,
8,
4,
17,
7,
3,
8,
4,
17,
20,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
0,
14,
22,
22,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
9,
23,
23
] |
778 | [
"The",
"gfs2_lock",
"function",
"in",
"the",
"Linux",
"kernel",
"before",
"2.6.34-rc1-next-20100312",
"and",
"the",
"gfs_lock",
"function",
"in",
"the",
"Linux",
"kernel",
"on",
"Red",
"Hat",
"Enterprise",
"Linux",
"(",
"RHEL",
")",
"5",
"and",
"6",
"does",
... | [
9,
17,
17,
12,
9,
18,
17,
12,
13,
7,
9,
17,
17,
12,
9,
18,
17,
12,
18,
18,
18,
18,
3,
18,
4,
8,
7,
8,
35,
25,
25,
30,
18,
20,
12,
20,
36,
34,
13,
12,
13,
17,
36,
35,
13,
20,
29,
30,
9,
17,
12,
17,
3,
18,
7,
... | [
23,
4,
23,
23,
23,
8,
18,
14,
22,
23,
23,
4,
23,
23,
23,
8,
18,
23,
23,
23,
8,
13,
23,
23,
23,
14,
23,
14,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
23,... |
779 | [
"smbd",
"in",
"Samba",
"3.3.11",
"3.4.6",
"and",
"3.5.0",
"when",
"libcap",
"support",
"is",
"enabled",
"runs",
"with",
"the",
"CAP_DAC_OVERRIDE",
"capability",
"which",
"allows",
"remote",
"authenticated",
"users",
"to",
"bypass",
"intended",
"file",
"permissions... | [
17,
12,
18,
8,
8,
7,
8,
39,
13,
17,
35,
33,
35,
12,
9,
18,
17,
36,
35,
17,
31,
20,
29,
30,
33,
13,
20,
12,
13,
17,
20,
12,
9,
17,
5
] | [
23,
23,
0,
14,
14,
23,
14,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
11,
19,
19,
23,
11,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23
] |
780 | [
"A",
"certain",
"Red",
"Hat",
"patch",
"for",
"the",
"Linux",
"kernel",
"in",
"Red",
"Hat",
"Enterprise",
"Linux",
"(",
"RHEL",
")",
"4",
"on",
"the",
"ia64",
"platform",
"allows",
"local",
"users",
"to",
"use",
"ptrace",
"on",
"an",
"arbitrary",
"proces... | [
9,
13,
18,
18,
17,
12,
9,
18,
17,
12,
18,
18,
18,
18,
3,
18,
4,
8,
12,
9,
17,
17,
35,
13,
20,
29,
30,
17,
12,
9,
13,
17,
7,
25,
17,
20,
12,
20,
33,
29,
9,
32,
17,
17,
5
] | [
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
8,
18,
23,
23,
23,
14,
23,
23,
23,
23,
11,
11,
19,
23,
23,
23,
23,
23,
11,
23,
23,
23,
11,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
781 | [
"The",
"MMIO",
"instruction",
"decoder",
"in",
"the",
"Xen",
"hypervisor",
"in",
"the",
"Linux",
"kernel",
"2.6.18",
"in",
"Red",
"Hat",
"Enterprise",
"Linux",
"(",
"RHEL",
")",
"5",
"allows",
"guest",
"OS",
"users",
"to",
"cause",
"a",
"denial",
"of",
"... | [
9,
18,
17,
17,
12,
9,
18,
17,
12,
9,
18,
31,
8,
12,
18,
18,
18,
18,
3,
18,
4,
8,
35,
15,
17,
20,
29,
30,
9,
17,
12,
17,
3,
13,
17,
18,
17,
4,
12,
20,
36,
34,
9,
13,
17,
17,
5
] | [
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
14,
23,
23,
23,
8,
18,
23,
23,
23,
14,
11,
23,
23,
23,
23,
23,
23,
11,
19,
19,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
782 | [
"The",
"gnutls_x509_crt_get_serial",
"function",
"in",
"the",
"GnuTLS",
"library",
"before",
"1.2.1",
"when",
"running",
"on",
"big-endian",
"64-bit",
"platforms",
"calls",
"the",
"asn1_read_value",
"with",
"a",
"pointer",
"to",
"the",
"wrong",
"data",
"type",
"an... | [
9,
13,
17,
12,
9,
18,
17,
12,
8,
39,
32,
12,
13,
13,
20,
35,
9,
17,
12,
9,
17,
29,
9,
13,
20,
17,
7,
9,
13,
17,
17,
36,
35,
17,
20,
29,
30,
9,
17,
17,
17,
3,
18,
4,
17,
7,
30,
9,
13,
17,
12,
12,
9,
13,
17,
... | [
23,
4,
23,
23,
23,
0,
23,
14,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
11,
11,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
19,
23,
23,
... |
783 | [
"gdk/gdkwindow.c",
"in",
"GTK+",
"before",
"2.18.5",
"as",
"used",
"in",
"gnome-screensaver",
"before",
"2.28.1",
"performs",
"implicit",
"paints",
"on",
"windows",
"of",
"type",
"GDK_WINDOW_FOREIGN",
"which",
"triggers",
"an",
"X",
"error",
"in",
"certain",
"circ... | [
17,
12,
18,
12,
8,
12,
33,
12,
17,
12,
8,
20,
34,
20,
12,
20,
12,
17,
18,
36,
35,
9,
13,
17,
12,
13,
20,
7,
25,
35,
25,
13,
20,
29,
30,
17,
32,
7,
17,
9,
13,
17,
12,
32,
9,
18,
31,
13,
20,
5
] | [
3,
23,
23,
14,
22,
23,
23,
23,
23,
14,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
11,
23,
11,
23,
23,
23,
11,
23,
23,
23,
23,
12,
23,
23,
23,
23,
23,
23
] |
784 | [
"Integer",
"overflow",
"in",
"src/backend/executor/nodeHash.c",
"in",
"PostgreSQL",
"8.4.1",
"and",
"earlier",
"and",
"8.5",
"through",
"8.5alpha2",
"allows",
"remote",
"authenticated",
"users",
"to",
"cause",
"a",
"denial",
"of",
"service",
"(",
"daemon",
"crash",
... | [
18,
12,
12,
17,
12,
18,
8,
7,
14,
7,
8,
12,
8,
35,
34,
33,
20,
29,
30,
9,
17,
12,
17,
3,
13,
17,
4,
12,
9,
18,
17,
12,
13,
18,
18,
20,
33,
29,
13,
13,
17,
20,
5
] | [
11,
19,
23,
3,
23,
0,
14,
22,
22,
23,
14,
22,
22,
11,
11,
19,
19,
23,
23,
23,
11,
19,
19,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
785 | [
"content_encoding.c",
"in",
"libcurl",
"7.10.5",
"through",
"7.19.7",
"when",
"zlib",
"is",
"enabled",
"does",
"not",
"properly",
"restrict",
"the",
"amount",
"of",
"callback",
"data",
"sent",
"to",
"an",
"application",
"that",
"requests",
"automatic",
"decompress... | [
17,
12,
17,
8,
12,
8,
39,
17,
35,
33,
35,
25,
25,
30,
9,
17,
12,
17,
20,
31,
29,
9,
17,
36,
35,
13,
17,
36,
16,
30,
13,
20,
29,
30,
9,
17,
12,
17,
3,
17,
17,
4,
7,
34,
33,
13,
17,
12,
32,
33,
13,
20,
29,
9,
1... | [
23,
23,
0,
14,
22,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
23,
11,
23,
23,
23,
23,
23,
11,
19,
23,
23,
23,
11,
19,
19,
23,
11,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
... |
786 | [
"Cross-site",
"scripting",
"(",
"XSS",
")",
"vulnerability",
"in",
"the",
"view_queryform",
"function",
"in",
"lib/viewvc.py",
"in",
"ViewVC",
"before",
"1.0.10",
"and",
"1.1.x",
"before",
"1.1.4",
"allows",
"remote",
"attackers",
"to",
"inject",
"arbitrary",
"web... | [
13,
17,
3,
18,
4,
17,
12,
9,
17,
17,
12,
17,
12,
18,
12,
8,
7,
8,
12,
8,
35,
34,
20,
29,
30,
13,
13,
17,
7,
18,
12,
13,
17,
5
] | [
11,
19,
23,
11,
23,
23,
23,
23,
4,
23,
23,
3,
23,
0,
14,
22,
23,
14,
22,
22,
11,
11,
19,
23,
11,
11,
19,
19,
23,
11,
23,
23,
23,
23
] |
787 | [
"The",
"JMX-Console",
"web",
"application",
"in",
"JBossAs",
"in",
"Red",
"Hat",
"JBoss",
"Enterprise",
"Application",
"Platform",
"(",
"aka",
"JBoss",
"EAP",
"or",
"JBEAP",
")",
"4.2",
"before",
"4.2.0.CP09",
"and",
"4.3",
"before",
"4.3.0.CP08",
"performs",
... | [
9,
18,
17,
17,
12,
18,
12,
18,
18,
18,
18,
18,
18,
3,
13,
18,
18,
7,
18,
4,
8,
12,
8,
7,
8,
12,
8,
20,
17,
17,
25,
12,
9,
18,
7,
18,
20,
36,
35,
17,
20,
29,
30,
20,
29,
9,
17,
18,
17,
12,
32,
9,
13,
17,
5
] | [
23,
23,
23,
11,
23,
23,
23,
23,
23,
0,
15,
15,
15,
23,
23,
23,
23,
23,
23,
23,
14,
22,
22,
23,
14,
22,
22,
23,
11,
19,
23,
23,
23,
23,
23,
23,
23,
23,
11,
11,
19,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
... |
788 | [
"Integer",
"overflow",
"in",
"the",
"predospecial",
"function",
"in",
"dospecial.c",
"in",
"dvips",
"in",
"(",
"1",
")",
"TeX",
"Live",
"and",
"(",
"2",
")",
"teTeX",
"might",
"allow",
"user-assisted",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"co... | [
18,
12,
12,
9,
13,
17,
12,
17,
12,
20,
12,
3,
8,
4,
18,
18,
7,
3,
8,
4,
17,
16,
30,
13,
17,
20,
29,
30,
13,
17,
12,
9,
13,
18,
17,
36,
35,
9,
13,
17,
17,
5
] | [
11,
19,
23,
23,
12,
23,
23,
3,
23,
23,
23,
23,
23,
23,
0,
15,
23,
23,
23,
23,
0,
23,
23,
23,
11,
19,
23,
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
19,
23
] |
789 | [
"NOTE",
":",
"some",
"of",
"these",
"details",
"are",
"obtained",
"from",
"third",
"party",
"information",
"."
] | [
17,
6,
9,
12,
9,
20,
34,
33,
12,
13,
17,
17,
5
] | [
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
11,
23
] |
790 | [
"The",
"ssl3_get_record",
"function",
"in",
"ssl/s3_pkt.c",
"in",
"OpenSSL",
"0.9.8f",
"through",
"0.9.8m",
"allows",
"remote",
"attackers",
"to",
"cause",
"a",
"denial",
"of",
"service",
"(",
"crash",
")",
"via",
"a",
"malformed",
"record",
"in",
"a",
"TLS",
... | [
9,
17,
17,
12,
17,
12,
18,
8,
12,
8,
20,
34,
20,
29,
30,
9,
17,
12,
17,
3,
17,
4,
12,
9,
13,
17,
12,
9,
18,
17,
12,
35,
9,
18,
17,
17,
33,
29,
9,
13,
17,
17,
5
] | [
23,
4,
23,
23,
3,
23,
0,
14,
22,
22,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
791 | [
"NOTE",
":",
"some",
"of",
"these",
"details",
"are",
"obtained",
"from",
"third",
"party",
"information",
"."
] | [
17,
6,
9,
12,
9,
20,
34,
33,
12,
13,
17,
17,
5
] | [
23,
23,
23,
23,
23,
23,
23,
11,
23,
23,
23,
11,
23
] |
792 | [
"The",
"virtio_net_bad_features",
"function",
"in",
"hw/virtio-net.c",
"in",
"the",
"virtio-net",
"driver",
"in",
"the",
"Linux",
"kernel",
"before",
"2.6.26",
"when",
"used",
"on",
"a",
"guest",
"OS",
"in",
"conjunction",
"with",
"qemu-kvm",
"0.11.0",
"or",
"KV... | [
9,
20,
34,
12,
17,
12,
9,
13,
17,
12,
9,
18,
17,
12,
8,
39,
33,
12,
9,
17,
17,
12,
17,
12,
13,
8,
7,
18,
8,
35,
34,
20,
29,
30,
9,
17,
12,
17,
3,
15,
18,
17,
7,
9,
13,
13,
17,
17,
4,
12,
32,
9,
13,
17,
12,
... | [
23,
4,
23,
23,
3,
23,
23,
23,
23,
23,
23,
8,
18,
14,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
14,
23,
23,
23,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
2... |
793 | [
"Multiple",
"format",
"string",
"vulnerabilities",
"in",
"isns.c",
"in",
"(",
"1",
")",
"Linux",
"SCSI",
"target",
"framework",
"(",
"aka",
"tgt",
"or",
"scsi-target-utils",
")",
"1.0.3",
"0.9.5",
"and",
"earlier",
"and",
"(",
"2",
")",
"iSCSI",
"Enterprise"... | [
13,
13,
17,
20,
12,
17,
12,
3,
8,
4,
18,
18,
17,
17,
3,
13,
17,
7,
20,
4,
8,
8,
7,
14,
7,
3,
8,
4,
17,
18,
18,
3,
13,
17,
4,
8,
13,
17,
20,
29,
30,
9,
17,
12,
17,
3,
13,
17,
17,
4,
7,
25,
34,
33,
13,
17,
... | [
23,
11,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
0,
23,
23,
23,
14,
14,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
0,
23,
14,
23,
11,
19,
23,
23,
23,
11,
19,
19,
23,
23,
23,
11,
23,
23,
23,
23,
... |
794 | [
"aMSN",
"(",
"aka",
"Alvaro's",
"Messenger",
")",
"0.98.3",
"and",
"earlier",
"when",
"SSL",
"is",
"used",
"does",
"not",
"verify",
"that",
"the",
"server",
"hostname",
"matches",
"a",
"domain",
"name",
"in",
"the",
"subject's",
"Common",
"Name",
"(",
"CN"... | [
17,
3,
13,
18,
18,
4,
8,
7,
14,
39,
18,
35,
33,
35,
25,
30,
12,
9,
17,
17,
35,
9,
17,
17,
12,
9,
13,
18,
18,
3,
18,
4,
17,
7,
9,
13,
18,
18,
17,
12,
9,
18,
17,
36,
35,
13,
20,
29,
30,
9,
18,
17,
12,
9,
13,
... | [
23,
23,
23,
23,
23,
23,
14,
22,
22,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
11,
11,
11,
23,
23,
23,
23,
23,
23,
... |
795 | [
"Unspecified",
"vulnerability",
"in",
"Dovecot",
"1.2.x",
"before",
"1.2.11",
"allows",
"remote",
"attackers",
"to",
"cause",
"a",
"denial",
"of",
"service",
"(",
"CPU",
"consumption",
")",
"via",
"long",
"headers",
"in",
"an",
"e-mail",
"message",
"."
] | [
13,
17,
12,
18,
8,
12,
8,
20,
34,
20,
29,
30,
9,
17,
12,
17,
3,
18,
17,
4,
12,
13,
20,
12,
9,
13,
17,
5
] | [
23,
23,
23,
0,
14,
22,
22,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
796 | [
"pkexec.c",
"in",
"pkexec",
"in",
"libpolkit",
"in",
"PolicyKit",
"0.96",
"allows",
"local",
"users",
"to",
"determine",
"the",
"existence",
"of",
"arbitrary",
"files",
"via",
"the",
"argument",
"."
] | [
17,
12,
17,
12,
17,
12,
18,
8,
35,
13,
20,
29,
30,
9,
17,
12,
13,
20,
12,
9,
17,
5
] | [
23,
23,
23,
23,
23,
23,
0,
14,
11,
11,
19,
23,
23,
23,
23,
23,
11,
19,
23,
23,
23,
23
] |
797 | [
"The",
"ip_evictor",
"function",
"in",
"ip_fragment.c",
"in",
"libnids",
"1.24",
"as",
"used",
"in",
"dsniff",
"and",
"possibly",
"other",
"products",
"allows",
"remote",
"attackers",
"to",
"cause",
"a",
"denial",
"of",
"service",
"(",
null,
"pointer",
"derefe... | [
9,
17,
17,
12,
17,
12,
20,
8,
12,
33,
12,
17,
7,
25,
13,
20,
35,
34,
20,
29,
30,
9,
17,
12,
17,
3,
18,
17,
17,
7,
17,
4,
12,
33,
13,
20,
5
] | [
23,
4,
23,
23,
3,
23,
0,
14,
23,
23,
23,
23,
23,
23,
23,
23,
11,
11,
19,
23,
23,
23,
11,
19,
19,
23,
23,
23,
23,
23,
11,
23,
23,
23,
23,
23,
23
] |
798 | [
"The",
"week_post_page",
"function",
"in",
"the",
"Weekly",
"Archive",
"by",
"Node",
"Type",
"module",
"6.x",
"before",
"6.x-2.7",
"for",
"Drupal",
"does",
"not",
"properly",
"implement",
"node",
"access",
"restrictions",
"when",
"constructing",
"SQL",
"queries",
... | [
9,
17,
17,
12,
9,
18,
18,
12,
18,
18,
17,
8,
12,
13,
12,
18,
35,
25,
13,
17,
17,
17,
20,
39,
32,
18,
20,
36,
35,
17,
20,
29,
30,
13,
13,
20,
12,
13,
20,
5
] | [
23,
4,
23,
23,
23,
23,
23,
23,
23,
23,
23,
14,
22,
22,
23,
23,
23,
23,
23,
23,
23,
11,
19,
23,
23,
11,
23,
23,
11,
11,
19,
23,
23,
23,
23,
23,
23,
23,
23,
23
] |
799 | [
"SQL",
"injection",
"vulnerability",
"in",
"the",
"SQL",
"Reports",
"(",
"com_sqlreport",
")",
"component",
"1.1",
"for",
"Joomla!",
"allows",
"remote",
"attackers",
"to",
"execute",
"arbitrary",
"SQL",
"commands",
"via",
"the",
"user_id",
"parameter",
"to",
"aj... | [
18,
17,
17,
12,
9,
18,
18,
3,
17,
4,
17,
8,
12,
18,
35,
13,
20,
29,
30,
13,
18,
35,
12,
9,
13,
17,
29,
30,
5
] | [
11,
19,
19,
23,
23,
11,
23,
23,
23,
23,
23,
14,
23,
23,
11,
11,
19,
23,
11,
19,
19,
11,
23,
23,
9,
23,
23,
3,
23
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.