sentence_idx
int64
0
17.5k
words
list
POS
list
tag
list
700
[ "The", "image", "decoder", "in", "WebKit", "before", "r52833", "as", "used", "in", "Google", "Chrome", "before", "4.0.249.78", "does", "not", "properly", "handle", "a", "failure", "of", "memory", "allocation", "which", "allows", "remote", "attackers", "to", "e...
[ 9, 17, 17, 12, 18, 12, 17, 12, 33, 12, 18, 18, 12, 8, 35, 25, 25, 30, 9, 17, 12, 17, 17, 36, 35, 17, 20, 29, 30, 13, 17, 12, 9, 18, 17, 12, 9, 13, 18, 17, 36, 35, 9, 13, 17, 5 ]
[ 23, 23, 23, 23, 0, 14, 22, 23, 23, 23, 13, 0, 14, 22, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 11, 11, 19, 23, 11, 19, 19, 23, 23, 0, 14, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
701
[ "Google", "Chrome", "before", "4.0.249.78", "sends", "an", "https", "URL", "in", "the", "Referer", "header", "of", "an", "http", "request", "in", "certain", "circumstances", "involving", "https", "to", "http", "redirection", "which", "allows", "remote", "HTTP", ...
[ 18, 18, 12, 8, 20, 9, 17, 18, 12, 9, 18, 17, 12, 9, 17, 17, 12, 13, 20, 32, 17, 29, 30, 17, 36, 35, 34, 18, 20, 29, 30, 25, 13, 17, 12, 13, 18, 17, 5 ]
[ 13, 0, 14, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 11, 23, 23, 23, 11, 11, 19, 11, 23, 23, 23, 23, 23 ]
702
[ "WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp", "in", "WebKit", "before", "r52401", "as", "used", "in", "Google", "Chrome", "before", "4.0.249.78", "allows", "remote", "attackers", "to", "bypass", "the", "Same", "Origin", "Policy", "via", "vectors", "involving", "...
[ 18, 12, 18, 12, 17, 12, 33, 12, 18, 18, 12, 8, 35, 34, 20, 29, 30, 9, 18, 18, 18, 12, 20, 32, 9, 13, 17, 5 ]
[ 3, 23, 0, 14, 22, 23, 23, 23, 13, 0, 14, 22, 11, 11, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
703
[ "The", "ParamTraits<SkBitmap>::Read", "function", "in", "common/common_param_traits.cc", "in", "Google", "Chrome", "before", "4.0.249.78", "does", "not", "use", "the", "correct", "variables", "in", "calculations", "designed", "to", "prevent", "integer", "overflows", "wh...
[ 9, 19, 17, 12, 17, 12, 18, 18, 12, 8, 35, 25, 30, 9, 13, 20, 12, 20, 33, 29, 30, 17, 20, 36, 35, 20, 29, 30, 14, 17, 29, 30, 9, 17, 12, 17, 7, 25, 34, 33, 13, 17, 12, 17, 20, 33, 29, 17, 5 ]
[ 23, 4, 23, 23, 3, 23, 13, 0, 14, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 12, 11, 11, 23, 11, 11, 23, 23, 23, 11, 23, 23, 23, 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
704
[ "The", "ParamTraits<SkBitmap>::Read", "function", "in", "common/common_param_traits.cc", "in", "Google", "Chrome", "before", "4.0.249.78", "does", "not", "initialize", "the", "memory", "locations", "that", "will", "hold", "bitmap", "data", "which", "might", "allow", "...
[ 9, 19, 17, 12, 17, 12, 18, 18, 12, 8, 35, 25, 30, 9, 17, 20, 36, 16, 30, 17, 20, 36, 16, 30, 13, 20, 29, 30, 25, 13, 17, 12, 17, 17, 12, 32, 13, 20, 33, 29, 30, 12, 9, 3, 8, 4, 17, 17, 7, 3, 8, 4, 18, 17, 5 ]
[ 23, 4, 23, 23, 3, 23, 13, 0, 14, 22, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 19, 23, 11, 11, 19, 11, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 2...
705
[ "Stack", "consumption", "vulnerability", "in", "the", "ChildProcessSecurityPolicy::CanRequestURL", "function", "in", "browser/child_process_security_policy.cc", "in", "Google", "Chrome", "before", "4.0.249.78", "allows", "remote", "attackers", "to", "cause", "a", "denial", ...
[ 18, 17, 17, 12, 9, 18, 17, 12, 17, 12, 18, 18, 12, 8, 20, 34, 20, 29, 30, 9, 17, 12, 17, 3, 13, 17, 7, 17, 17, 4, 12, 9, 18, 36, 35, 13, 20, 12, 33, 12, 9, 18, 36, 35, 12, 13, 20, 12, 9, 17, 6, 17, 5 ]
[ 23, 23, 23, 23, 23, 4, 23, 23, 3, 23, 13, 0, 14, 22, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 11, 23, 23, 11, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
706
[ "JAG", "(", "Just", "Another", "Guestbook", ")", "1.14", "stores", "sensitive", "information", "under", "the", "web", "root", "with", "insufficient", "access", "control", "which", "allows", "remote", "attackers", "to", "obtain", "sensitive", "information", "via", ...
[ 18, 3, 18, 9, 18, 4, 8, 20, 13, 17, 12, 9, 13, 17, 12, 13, 17, 17, 36, 35, 17, 20, 29, 30, 13, 17, 12, 9, 13, 17, 12, 17, 5 ]
[ 0, 23, 23, 23, 23, 23, 14, 23, 11, 19, 23, 23, 23, 23, 23, 23, 11, 19, 23, 11, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23, 23, 3, 23 ]
707
[ "Unspecified", "vulnerability", "in", "eMBox", "in", "Novell", "eDirectory", "8.8", "SP5", "Patch", "2", "and", "earlier", "allows", "remote", "attackers", "to", "cause", "a", "denial", "of", "service", "(", "crash", ")", "via", "unknown", "a", "crafted", "S...
[ 13, 17, 12, 17, 12, 18, 17, 8, 18, 18, 8, 7, 14, 20, 34, 20, 29, 30, 9, 17, 12, 17, 3, 17, 4, 12, 12, 9, 13, 18, 17, 9, 13, 17, 12, 18, 5 ]
[ 23, 23, 23, 23, 23, 13, 0, 14, 12, 23, 14, 22, 22, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 1, 23 ]
708
[ "MoinMoin", "1.9", "before", "1.9.1", "does", "not", "perform", "the", "expected", "clearing", "of", "the", "sys.argv", "array", "in", "situations", "where", "the", "GATEWAY_INTERFACE", "environment", "variable", "is", "set", "which", "allows", "remote", "attacker...
[ 18, 8, 12, 8, 35, 25, 30, 9, 13, 17, 12, 9, 13, 17, 12, 20, 39, 9, 18, 17, 17, 35, 33, 36, 35, 17, 20, 29, 30, 13, 17, 12, 13, 20, 5 ]
[ 0, 14, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23 ]
709
[ "Unspecified", "vulnerability", "in", "MoinMoin", "1.5.x", "through", "1.7.x", "1.8.x", "before", "1.8.7", "and", "1.9.x", "before", "1.9.2", "has", "unknown", "impact", "and", "attack", "vectors", "related", "to", "configurations", "that", "have", "a", "non-empty...
[ 13, 17, 12, 18, 8, 12, 8, 8, 12, 8, 7, 8, 12, 8, 35, 33, 17, 7, 17, 20, 33, 29, 20, 36, 34, 9, 13, 17, 17, 9, 13, 17, 31, 9, 18, 17, 31, 7, 18, 31, 5 ]
[ 23, 23, 23, 0, 14, 22, 22, 14, 22, 22, 23, 14, 22, 22, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 14, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
710
[ "MoinMoin", "before", "1.8.7", "and", "1.9.x", "before", "1.9.2", "does", "not", "properly", "sanitize", "user", "profiles", "which", "has", "unspecified", "impact", "and", "attack", "vectors", "." ]
[ 18, 12, 8, 7, 8, 12, 8, 35, 25, 25, 30, 17, 20, 36, 35, 33, 17, 7, 17, 20, 5 ]
[ 0, 14, 22, 23, 14, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23 ]
711
[ "Unspecified", "vulnerability", "in", "the", "IP-Tech", "JQuarks", "(", "com_jquarks", ")", "Component", "before", "0.2.4", "for", "Joomla!", "allows", "attackers", "to", "obtain", "the", "installation", "path", "for", "Joomla!", "via", "unknown", "vectors", "." ]
[ 13, 17, 12, 9, 13, 18, 3, 20, 4, 18, 12, 8, 12, 18, 35, 20, 29, 30, 9, 17, 17, 12, 18, 12, 13, 20, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 14, 22, 23, 23, 11, 11, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
712
[ "SQL", "injection", "vulnerability", "in", "index.php", "in", "KR", "MEDIA", "Pogodny", "CMS", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "id", "parameter", "in", "a", "niusy", "action", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 18, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 12, 9, 13, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 15, 15, 15, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
713
[ "SQL", "injection", "vulnerability", "in", "index.php", "in", "WSN", "Guest", "1.02", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "orderlinks", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 8, 20, 34, 20, 29, 30, 13, 18, 35, 12, 9, 20, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 15, 14, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
714
[ "SQL", "injection", "vulnerability", "in", "cplphoto.php", "in", "the", "Copperleaf", "Photolog", "plugin", "0.16", "and", "possibly", "earlier", "for", "WordPress", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "p...
[ 18, 17, 17, 12, 17, 12, 9, 18, 18, 17, 8, 7, 25, 26, 12, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 9, 17, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 23, 13, 0, 23, 14, 23, 23, 23, 23, 23, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
715
[ "StatCounteX", "3.1", "stores", "sensitive", "information", "under", "the", "web", "root", "with", "insufficient", "access", "control", "which", "allows", "remote", "attackers", "to", "download", "a", "database", "via", "a", "direct", "request", "for", "path/stats...
[ 18, 8, 20, 13, 17, 12, 9, 13, 17, 12, 13, 17, 17, 36, 35, 17, 20, 29, 30, 9, 17, 12, 9, 13, 17, 12, 17, 5 ]
[ 0, 14, 23, 11, 19, 23, 23, 23, 23, 23, 23, 11, 19, 23, 11, 11, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 3, 23 ]
716
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "index.php", "in", "BGSvetionik", "BGS", "CMS", "2.2.1", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web", "script", "or", "HTML", "via", "the", "search", "parameter", "in", ...
[ 13, 17, 3, 18, 4, 17, 12, 17, 12, 18, 18, 18, 8, 20, 34, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 17, 17, 12, 9, 17, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 23, 13, 0, 15, 14, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
717
[ "NOTE", ":", "some", "of", "these", "details", "are", "obtained", "from", "third", "party", "information", "." ]
[ 17, 6, 9, 12, 9, 20, 34, 33, 12, 13, 17, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 11, 23 ]
718
[ "Directory", "traversal", "vulnerability", "in", "index.php", "in", "the", "RWCards", "(", "com_rwcards", ")", "component", "3.0.18", "for", "Joomla!", "allows", "remote", "attackers", "to", "read", "arbitrary", "files", "via", "a", "." ]
[ 17, 13, 17, 12, 17, 12, 9, 18, 3, 20, 4, 34, 8, 12, 18, 35, 13, 20, 29, 30, 13, 20, 12, 9, 5 ]
[ 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 14, 23, 23, 11, 11, 19, 23, 23, 11, 19, 23, 23, 11 ]
719
[ "." ]
[ 5 ]
[ 19 ]
720
[ "(", "dot", "dot", ")", "in", "the", "controller", "parameter", "." ]
[ 3, 13, 17, 4, 12, 9, 17, 17, 5 ]
[ 23, 11, 19, 23, 23, 23, 23, 23, 23 ]
721
[ "SQL", "injection", "vulnerability", "in", "index.php", "in", "Katalog", "Stron", "Hurricane", "1.3.5", "and", "possibly", "earlier", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "get", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 18, 8, 7, 25, 26, 35, 34, 20, 29, 30, 13, 18, 35, 12, 9, 17, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 15, 15, 14, 23, 23, 23, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
722
[ "PHP", "remote", "file", "inclusion", "vulnerability", "in", "includes/moderation.php", "in", "Katalog", "Stron", "Hurricane", "1.3.5", "and", "possibly", "earlier", "when", "register_globals", "is", "enabled", "allows", "remote", "attackers", "to", "execute", "arbitr...
[ 18, 34, 13, 17, 17, 12, 17, 12, 18, 18, 18, 8, 7, 25, 26, 39, 20, 35, 33, 35, 34, 20, 29, 30, 13, 18, 17, 12, 9, 18, 12, 9, 17, 17, 5 ]
[ 23, 11, 23, 23, 23, 23, 3, 23, 0, 15, 15, 14, 23, 23, 23, 23, 23, 23, 23, 11, 11, 19, 23, 11, 11, 19, 19, 23, 23, 23, 23, 23, 9, 23, 23 ]
723
[ "Multiple", "stack-based", "buffer", "overflows", "in", "the", "HyleosChemView.HLChemView", "ActiveX", "control", "(", "HyleosChemView.ocx", ")", "in", "Hyleos", "ChemView", "1.9.5.1", "allow", "remote", "attackers", "to", "execute", "arbitrary", "code", "via", "a", ...
[ 13, 13, 17, 35, 12, 9, 18, 18, 17, 3, 18, 4, 12, 18, 18, 8, 13, 17, 20, 29, 30, 13, 17, 12, 9, 13, 17, 12, 13, 17, 20, 12, 9, 17, 17, 29, 9, 3, 8, 4, 17, 7, 3, 8, 4, 18, 20, 5 ]
[ 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 13, 0, 14, 23, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 7, 23, 23 ]
724
[ "Directory", "traversal", "vulnerability", "in", "index.php", "in", "ZeusCMS", "0.2", "allows", "remote", "attackers", "to", "include", "and", "execute", "arbitrary", "local", "files", "via", "directory", "traversal", "sequences", "in", "the", "page", "parameter", ...
[ 18, 13, 17, 12, 17, 12, 18, 8, 20, 34, 20, 29, 30, 7, 30, 13, 13, 20, 12, 17, 17, 20, 12, 9, 17, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 14, 11, 11, 19, 23, 23, 23, 11, 11, 11, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
725
[ "ZeusCMS", "0.2", "stores", "sensitive", "information", "under", "the", "web", "root", "with", "insufficient", "access", "control", "which", "allows", "remote", "attackers", "to", "obtain", "sensitive", "information", "via", "a", "direct", "request", "for", "admin...
[ 18, 8, 20, 13, 17, 12, 9, 13, 17, 12, 13, 17, 17, 36, 35, 17, 20, 29, 30, 13, 17, 12, 9, 13, 17, 12, 17, 5 ]
[ 0, 14, 23, 11, 19, 23, 23, 23, 23, 23, 23, 11, 19, 23, 11, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23, 23, 3, 23 ]
726
[ "WordPress", "2.9", "before", "2.9.2", "allows", "remote", "authenticated", "users", "to", "read", "trash", "posts", "from", "other", "authors", "via", "a", "direct", "request", "with", "a", "modified", "p", "parameter", "." ]
[ 7, 8, 12, 8, 20, 34, 33, 20, 29, 30, 13, 20, 12, 13, 20, 12, 9, 13, 17, 12, 9, 13, 17, 17, 5 ]
[ 0, 14, 22, 22, 11, 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
727
[ "Unspecified", "vulnerability", "in", "TIBRepoServer5.jar", "in", "TIBCO", "Administrator", "5.4.0", "through", "5.6.0", "when", "JMS", "transport", "is", "used", "allows", "remote", "authenticated", "users", "to", "execute", "arbitrary", "code", "on", "all", "domai...
[ 13, 17, 12, 18, 12, 18, 18, 8, 12, 8, 39, 18, 17, 35, 33, 35, 34, 33, 20, 29, 30, 13, 17, 12, 9, 17, 20, 12, 20, 33, 29, 32, 13, 20, 5 ]
[ 23, 23, 23, 23, 23, 13, 0, 14, 22, 22, 23, 23, 23, 23, 23, 11, 11, 19, 19, 23, 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23 ]
728
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "createDestination.action", "in", "Apache", "ActiveMQ", "before", "5.3.1", "allows", "remote", "authenticated", "users", "to", "inject", "arbitrary", "web", "script", "or", "HTML", "via", "the", "J...
[ 13, 17, 3, 18, 4, 17, 12, 17, 12, 18, 18, 12, 8, 20, 34, 33, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 18, 17, 12, 9, 13, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 23, 13, 0, 14, 22, 11, 11, 19, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
729
[ "The", "design", "of", "the", "dialplan", "functionality", "in", "Asterisk", "Open", "Source", "1.2.x", "1.4.x", "and", "1.6.x", ";", "and", "Asterisk", "Business", "Edition", "B.x.x", "and", "C.x.x", "when", "using", "the", "${EXTEN}", "channel", "variable", ...
[ 9, 17, 12, 9, 17, 17, 12, 18, 18, 18, 8, 8, 7, 8, 6, 7, 18, 18, 18, 18, 7, 18, 39, 32, 9, 13, 17, 17, 7, 17, 17, 20, 35, 13, 20, 29, 30, 20, 12, 9, 17, 32, 20, 36, 34, 33, 39, 9, 17, 35, 33, 12, 33, 32, 9, ...
[ 23, 23, 23, 23, 23, 23, 23, 0, 23, 23, 14, 14, 23, 14, 23, 23, 0, 2, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 11, 23, 11, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 2...
730
[ "NOTE", ":", "it", "could", "be", "argued", "that", "this", "is", "not", "a", "vulnerability", "in", "Asterisk", "but", "a", "class", "of", "vulnerabilities", "that", "can", "occur", "in", "any", "program", "that", "uses", "this", "feature", "without", "th...
[ 17, 6, 23, 16, 30, 33, 12, 9, 35, 25, 9, 17, 12, 18, 7, 9, 17, 12, 20, 36, 16, 30, 12, 9, 17, 36, 35, 9, 17, 12, 9, 13, 17, 17, 36, 35, 25, 13, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 0, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
731
[ "WebAccess", "in", "VMware", "VirtualCenter", "2.0.2", "and", "2.5", "VMware", "Server", "2.0", "and", "VMware", "ESX", "3.0.3", "and", "3.5", "allows", "remote", "attackers", "to", "leverage", "proxy-server", "functionality", "to", "spoof", "the", "origin", "of...
[ 18, 12, 18, 18, 8, 7, 8, 18, 18, 8, 7, 18, 18, 8, 7, 8, 20, 34, 20, 29, 30, 13, 17, 29, 30, 9, 17, 12, 20, 12, 13, 20, 33, 29, 9, 18, 17, 17, 5 ]
[ 23, 23, 13, 0, 14, 23, 14, 13, 0, 14, 23, 13, 23, 14, 23, 14, 11, 11, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
732
[ "Stack-based", "buffer", "overflow", "in", "Orbital", "Viewer", "1.04", "allows", "user-assisted", "remote", "attackers", "to", "execute", "arbitrary", "code", "via", "a", "crafted", "(", "1", ")", "." ]
[ 13, 17, 17, 12, 18, 18, 8, 35, 13, 17, 20, 29, 30, 13, 17, 12, 9, 33, 3, 8, 4, 5 ]
[ 23, 11, 19, 23, 0, 15, 14, 11, 23, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23, 23, 23, 23 ]
733
[ "orb", "or", "(", "2", ")", "." ]
[ 17, 7, 3, 8, 4, 5 ]
[ 23, 23, 23, 23, 23, 23 ]
734
[ "ov", "file", "." ]
[ 13, 17, 5 ]
[ 23, 23, 23 ]
735
[ "The", "ExecuteExe", "method", "in", "the", "DVBSExeCall", "Control", "ActiveX", "control", "1.0.0.1", "in", "DVBSExeCall.ocx", "in", "DATEV", "Base", "System", "(", "aka", "Grundpaket", "Basis", ")", "allows", "remote", "attackers", "to", "execute", "arbitrary", ...
[ 9, 18, 17, 12, 9, 18, 18, 18, 17, 8, 12, 18, 12, 18, 18, 18, 3, 34, 18, 18, 4, 35, 13, 20, 29, 30, 13, 20, 12, 13, 20, 5 ]
[ 23, 7, 23, 23, 23, 23, 23, 23, 23, 14, 23, 23, 23, 13, 0, 15, 23, 23, 23, 23, 23, 11, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23 ]
736
[ "SQL", "injection", "vulnerability", "in", "index.php", "in", "CommodityRentals", "Video", "Games", "Rentals", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "pfid", "parameter", "in", "a", "catalog", "action", "." ...
[ 18, 17, 17, 12, 17, 12, 18, 18, 18, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 9, 17, 17, 12, 9, 17, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 13, 0, 15, 15, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
737
[ "SQL", "injection", "vulnerability", "in", "druckansicht.php", "in", "JTL-Shop", "2", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "s", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 8, 20, 34, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 14, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
738
[ "SQL", "injection", "vulnerability", "in", "the", "IP-Tech", "JQuarks", "(", "com_jquarks", ")", "Component", "0.2.3", "and", "possibly", "earlier", "for", "Joomla!", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", ...
[ 18, 17, 17, 12, 9, 13, 18, 3, 20, 4, 18, 8, 7, 25, 26, 12, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 29, 30, 5 ]
[ 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 23, 14, 23, 23, 23, 23, 23, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23, 23, 23 ]
739
[ "NOTE", ":", "some", "of", "these", "details", "are", "obtained", "from", "third", "party", "information", "." ]
[ 17, 6, 9, 12, 9, 20, 34, 33, 12, 13, 17, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 11, 23 ]
740
[ "SQL", "injection", "vulnerability", "in", "products.php", "in", "CommodityRentals", "Trade", "Manager", "Script", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "cid", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 18, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 9, 17, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 13, 0, 15, 15, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
741
[ "SQL", "injection", "vulnerability", "in", "the", "PerchaGallery", "(", "com_perchagallery", ")", "component", "before", "1.5b", "for", "Joomla!", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "id", "parameter", "i...
[ 18, 17, 17, 12, 9, 18, 3, 17, 4, 17, 12, 8, 12, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 12, 9, 13, 17, 29, 30, 5 ]
[ 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 14, 22, 23, 23, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
742
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "pages/index.php", "in", "BASIC-CMS", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web", "script", "or", "HTML", "via", "the", "nav_id", "parameter", "." ]
[ 13, 17, 3, 18, 4, 17, 12, 17, 12, 18, 20, 34, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 13, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 3, 23, 0, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 9, 23, 23 ]
743
[ "Directory", "traversal", "vulnerability", "in", "includes/download.php", "in", "the", "JoomlaWorks", "AllVideos", "(", "Jw_allVideos", ")", "plugin", "3.0", "through", "3.2", "for", "Joomla!", "allows", "remote", "attackers", "to", "read", "arbitrary", "files", "vi...
[ 18, 13, 17, 12, 17, 12, 9, 18, 18, 3, 18, 4, 31, 8, 12, 8, 12, 18, 35, 13, 20, 29, 30, 13, 20, 12, 9, 18, 3, 33, 25, 17, 4, 12, 9, 17, 17, 5 ]
[ 11, 19, 19, 23, 3, 23, 23, 13, 23, 23, 23, 23, 23, 14, 22, 22, 23, 23, 11, 11, 19, 23, 23, 11, 19, 23, 23, 23, 23, 23, 11, 19, 23, 23, 23, 23, 23, 23 ]
744
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "the", "iTweak", "Upload", "module", "6.x-1.x", "before", "6.x-1.2", "and", "6.x-2.x", "before", "6.x-2.3", "for", "Drupal", "allows", "remote", "authenticated", "users", "with", "create", "content...
[ 13, 17, 3, 18, 4, 17, 12, 9, 17, 18, 17, 13, 12, 13, 7, 13, 12, 13, 12, 18, 35, 30, 13, 20, 12, 17, 17, 7, 13, 17, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 17, 17, 12, 9, 13, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 0, 15, 23, 14, 22, 22, 23, 14, 22, 22, 23, 23, 11, 11, 19, 19, 23, 23, 23, 23, 23, 23, 11, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
745
[ "SQL", "injection", "vulnerability", "in", "backoffice/login.asp", "in", "Dynamicsoft", "WSC", "CMS", "2.2", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "Password", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 18, 8, 20, 34, 20, 29, 30, 13, 18, 35, 12, 9, 18, 17, 5 ]
[ 11, 19, 19, 23, 3, 23, 13, 0, 15, 14, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 11, 23, 23 ]
746
[ "NOTE", ":", "some", "of", "these", "details", "are", "obtained", "from", "third", "party", "information", "." ]
[ 17, 6, 9, 12, 9, 20, 34, 33, 12, 13, 17, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 11, 23 ]
747
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "index.php", "in", "VideoSearchScript", "Pro", "3.5", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web", "script", "or", "HTML", "via", "the", "q", "parameter", "." ]
[ 13, 17, 3, 18, 4, 17, 12, 17, 12, 18, 18, 8, 20, 34, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 13, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 23, 0, 15, 14, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23 ]
748
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "index.php", "in", "WampServer", "2.0i", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web", "script", "or", "HTML", "via", "the", "lang", "parameter", "." ]
[ 13, 17, 3, 18, 4, 17, 12, 17, 12, 18, 8, 20, 34, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 17, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 23, 0, 14, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23 ]
749
[ "SQL", "injection", "vulnerability", "in", "ForceChangePassword.jsp", "in", "Newgen", "Software", "OmniDocs", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "unspecified", "vectors", "." ]
[ 18, 17, 17, 12, 18, 12, 18, 18, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 13, 20, 5 ]
[ 11, 19, 19, 23, 23, 23, 23, 23, 0, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23 ]
750
[ "SQL", "injection", "vulnerability", "in", "cisco/services/PhonecDirectory.php", "in", "Fonality", "Trixbox", "2.2.4", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "ID", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 8, 20, 34, 20, 29, 30, 13, 18, 35, 12, 9, 18, 17, 5 ]
[ 11, 19, 19, 23, 3, 23, 13, 0, 14, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
751
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "wa/auth", "in", "PortWise", "SSL", "VPN", "4.6", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web", "script", "or", "HTML", "via", "the", "reloadFrame", "parameter", "." ]
[ 13, 17, 3, 18, 4, 17, 12, 17, 12, 18, 18, 18, 8, 20, 34, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 17, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 23, 13, 0, 15, 14, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 9, 23, 23 ]
752
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "the", "Portlet", "Palette", "in", "IBM", "WebSphere", "Portal", "6.0.1.5", "wp6015_008_01", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web", "script", "or", "HTML", "via", "t...
[ 13, 17, 3, 18, 4, 17, 12, 9, 18, 18, 12, 18, 18, 18, 8, 17, 20, 34, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 17, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 13, 0, 15, 14, 23, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23 ]
753
[ "Aavmker4.sys", "in", "avast", "!", "4.8", "through", "4.8.1368.0", "and", "5.0", "before", "5.0.418.0", "running", "on", "Windows", "2000", "and", "XP", "does", "not", "properly", "validate", "input", "to", "IOCTL", "0xb2d60030", "which", "allows", "local", "...
[ 18, 12, 17, 5, 8, 12, 8, 7, 8, 12, 8, 32, 12, 18, 8, 7, 18, 35, 25, 25, 13, 17, 29, 18, 8, 36, 35, 13, 20, 29, 30, 9, 17, 12, 17, 3, 17, 17, 4, 7, 13, 13, 17, 29, 30, 20, 12, 18, 20, 32, 13, 17, 35, 12, 14, ...
[ 23, 23, 13, 23, 14, 22, 22, 23, 14, 22, 22, 23, 23, 8, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 14, 23, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 23, 11, 23, 23, 11, 19, 19, 23, 11, 19, 23, 23, 11, 23, 23, 11, 23, ...
754
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "the", "login/prompt", "component", "in", "Subex", "Nikira", "Fraud", "Management", "System", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web", "script", "or", "HTML", "via", "...
[ 13, 17, 3, 18, 4, 17, 12, 9, 13, 17, 12, 18, 18, 18, 18, 18, 35, 30, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 17, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 0, 15, 15, 15, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23 ]
755
[ "Cross-site", "request", "forgery", "(", "CSRF", ")", "vulnerability", "in", "add_user.php", "in", "Employee", "Timeclock", "Software", "0.99", "allows", "remote", "attackers", "to", "hijack", "the", "authentication", "of", "an", "administrator", "for", "requests", ...
[ 13, 17, 17, 3, 18, 4, 17, 12, 17, 12, 18, 18, 18, 8, 20, 34, 20, 29, 30, 9, 17, 12, 9, 17, 12, 20, 36, 34, 13, 13, 20, 5 ]
[ 11, 19, 19, 23, 11, 23, 23, 23, 23, 23, 0, 15, 15, 14, 11, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23 ]
756
[ "NOTE", ":", "some", "of", "these", "details", "are", "obtained", "from", "third", "party", "information", "." ]
[ 17, 6, 9, 12, 9, 20, 34, 33, 12, 13, 17, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 11, 23 ]
757
[ "Multiple", "unspecified", "vulnerabilities", "in", "(", "1", ")", "ns-slapd", "and", "(", "2", ")", "slapd.exe", "in", "Sun", "Directory", "Server", "Enterprise", "Edition", "7.0", "Sun", "Java", "System", "Directory", "Server", "5.2", "and", "Sun", "Java", ...
[ 18, 13, 20, 12, 3, 8, 4, 17, 7, 3, 8, 4, 17, 12, 18, 18, 18, 18, 18, 8, 18, 18, 18, 18, 18, 8, 7, 18, 18, 18, 18, 18, 18, 18, 8, 12, 8, 13, 17, 20, 29, 30, 9, 17, 12, 17, 3, 13, 17, 4, 12, 9, 13, 18, 17, 17...
[ 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 13, 23, 23, 2, 23, 14, 13, 0, 15, 15, 15, 14, 23, 13, 0, 15, 15, 15, 2, 23, 14, 22, 22, 23, 11, 19, 23, 23, 23, 11, 19, 19, 23, 23, 11, 23, 23, 23, 23, 23...
758
[ "Multiple", "cross-site", "request", "forgery", "(", "CSRF", ")", "vulnerabilities", "in", "Limny", "2.0", "allow", "remote", "attackers", "to", "(", "1", ")", "hijack", "the", "authentication", "of", "users", "or", "administrators", "for", "requests", "that", ...
[ 13, 13, 17, 17, 3, 18, 4, 20, 12, 18, 8, 13, 17, 20, 29, 3, 8, 4, 17, 9, 17, 12, 20, 7, 20, 12, 20, 36, 34, 9, 17, 17, 7, 17, 12, 9, 13, 17, 29, 30, 7, 3, 8, 4, 17, 9, 17, 12, 9, 17, 12, 20, 36, 34, 9, 13, ...
[ 11, 19, 19, 11, 23, 11, 23, 23, 23, 0, 14, 23, 11, 19, 23, 23, 23, 23, 11, 19, 19, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 19, 19, 23, 23, 23, 23, 11, 23, ...
759
[ "SQL", "injection", "vulnerability", "in", "default.asp", "in", "ASPCode", "CMS", "1.5.8", "2.0.0", "Build", "103", "and", "possibly", "other", "versions", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "newsid", ...
[ 18, 17, 17, 12, 17, 12, 18, 18, 8, 8, 18, 8, 7, 25, 13, 20, 35, 34, 20, 29, 30, 13, 18, 35, 12, 9, 17, 17, 39, 9, 17, 17, 35, 8, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 15, 14, 14, 23, 23, 23, 23, 23, 23, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
760
[ "NOTE", ":", "the", "provenance", "of", "this", "information", "is", "unknown", ";", "the", "details", "are", "obtained", "solely", "from", "third", "party", "information", "." ]
[ 17, 6, 9, 17, 12, 9, 17, 35, 13, 6, 9, 20, 34, 33, 25, 12, 13, 17, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 11, 23 ]
761
[ "Cross-site", "request", "forgery", "(", "CSRF", ")", "vulnerability", "in", "default.asp", "in", "ASPCode", "CMS", "1.5.8", "2.0.0", "Build", "103", "and", "possibly", "other", "versions", "allows", "remote", "attackers", "to", "hijack", "the", "authentication", ...
[ 13, 17, 17, 3, 18, 4, 17, 12, 17, 12, 18, 18, 8, 8, 18, 8, 7, 25, 13, 20, 35, 34, 20, 29, 30, 9, 17, 12, 9, 17, 12, 20, 36, 3, 8, 4, 17, 20, 12, 9, 13, 17, 12, 9, 17, 17, 7, 3, 8, 4, 17, 20, 12, 9, 13, 17, ...
[ 11, 19, 19, 23, 11, 23, 23, 23, 23, 23, 0, 15, 14, 14, 23, 23, 23, 23, 23, 23, 11, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, ...
762
[ "Multiple", "SQL", "injection", "vulnerabilities", "in", "zport/dmd/Events/getJSONEventsInfo", "in", "Zenoss", "2.3.3", "and", "other", "versions", "before", "2.5", "allow", "remote", "authenticated", "users", "to", "execute", "arbitrary", "SQL", "commands", "via", "t...
[ 18, 18, 17, 20, 12, 17, 12, 18, 8, 7, 13, 20, 12, 8, 13, 17, 31, 20, 29, 30, 13, 18, 35, 12, 9, 3, 8, 4, 17, 3, 8, 4, 17, 3, 8, 4, 17, 3, 8, 4, 17, 7, 3, 8, 4, 17, 20, 5 ]
[ 23, 11, 19, 19, 23, 23, 23, 0, 14, 23, 23, 23, 14, 22, 23, 11, 19, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
763
[ "Multiple", "cross-site", "request", "forgery", "(", "CSRF", ")", "vulnerabilities", "in", "Zenoss", "2.3.3", "and", "other", "versions", "before", "2.5", "allow", "remote", "attackers", "to", "hijack", "the", "authentication", "of", "an", "administrator", "for", ...
[ 13, 13, 17, 17, 3, 18, 4, 20, 12, 18, 8, 7, 13, 20, 12, 8, 13, 17, 20, 29, 30, 9, 17, 12, 9, 17, 12, 3, 8, 4, 20, 36, 34, 13, 20, 12, 17, 7, 3, 8, 4, 20, 12, 34, 13, 20, 36, 35, 12, 13, 17, 12, 17, 20, 12, ...
[ 11, 19, 19, 11, 23, 11, 23, 23, 23, 0, 14, 23, 23, 23, 14, 22, 23, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 11, 23, 11, 23, 11, 23, 23, 23, ...
764
[ "Open", "redirect", "vulnerability", "in", "login.jsp", "in", "IBM", "WebSphere", "Portal", "IBM", "Lotus", "Web", "Content", "Management", "(", "WCM)", "and", "IBM", "Lotus", "Workplace", "Web", "Content", "Management", "5.1.0.0", "through", "5.1.0.5", "6.0.0.0",...
[ 13, 13, 17, 12, 17, 12, 18, 18, 18, 18, 18, 18, 18, 18, 3, 18, 7, 18, 18, 18, 18, 18, 18, 8, 12, 8, 8, 12, 8, 8, 12, 8, 8, 12, 8, 7, 8, 6, 7, 18, 18, 18, 20, 8, 8, 8, 8, 7, 8, 12, 18, 18, 6, 35, 34, 20, 2...
[ 23, 23, 23, 23, 23, 23, 13, 0, 15, 13, 0, 15, 15, 15, 23, 23, 23, 13, 0, 15, 15, 15, 15, 14, 22, 22, 14, 22, 22, 14, 22, 22, 14, 22, 22, 23, 14, 23, 23, 13, 0, 15, 23, 14, 14, 14, 14, 23, 14, 23, 0, 15, 23, 11,...
765
[ "_layouts/Upload.aspx", "in", "the", "Documents", "module", "in", "Microsoft", "SharePoint", "before", "2010", "uses", "URLs", "with", "the", "same", "hostname", "and", "port", "number", "for", "a", "web", "site's", "primary", "files", "and", "individual", "user...
[ 17, 12, 9, 18, 17, 12, 18, 18, 12, 8, 20, 18, 12, 9, 13, 17, 7, 17, 17, 12, 9, 17, 17, 13, 20, 7, 13, 20, 22, 13, 20, 3, 12, 17, 36, 35, 17, 31, 20, 29, 30, 13, 20, 7, 17, 13, 17, 3, 18, 4, 20, 12, 32, 18, 20...
[ 3, 23, 23, 23, 23, 23, 13, 23, 14, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 11, 11, 19, 19, 23, 23, 23, 23, 23, 23, 11, 19, 23, 11, 23, 23, 23, 23, ...
766
[ "NOTE", ":", "the", "vendor", "disputes", "the", "significance", "of", "this", "issue", "because", "cross-domain", "isolation", "can", "be", "implemented", "when", "needed", "." ]
[ 17, 6, 9, 17, 35, 9, 17, 12, 9, 17, 12, 13, 17, 16, 30, 33, 39, 33, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
767
[ "The", "default", "configuration", "of", "cfg.packagepages_actions_excluded", "in", "MoinMoin", "before", "1.8.7", "does", "not", "prevent", "unsafe", "package", "actions", "which", "has", "unspecified", "impact", "and", "attack", "vectors", "." ]
[ 9, 17, 17, 12, 33, 12, 18, 12, 8, 35, 25, 30, 13, 17, 20, 36, 35, 33, 17, 7, 17, 20, 5 ]
[ 23, 23, 11, 23, 23, 23, 0, 14, 22, 23, 23, 12, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23 ]
768
[ "Buffer", "overflow", "in", "Microsoft", "Windows", "Media", "Player", "9", "and", "11.0.5721.5145", "allows", "remote", "attackers", "to", "cause", "a", "denial", "of", "service", "(", "divide-by-zero", "error", "and", "application", "crash", ")", "via", "a", ...
[ 18, 12, 12, 18, 18, 18, 18, 8, 7, 8, 20, 34, 20, 29, 30, 9, 17, 12, 17, 3, 13, 17, 7, 17, 17, 4, 12, 9, 33, 5 ]
[ 11, 19, 23, 13, 8, 15, 15, 14, 23, 14, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 23, 23, 23, 11, 19, 23, 23, 23, 23, 23 ]
769
[ "mpg", "file", "." ]
[ 17, 17, 5 ]
[ 23, 23, 23 ]
770
[ "An", "unspecified", "API", "in", "Microsoft", "Windows", "2000", "Windows", "XP", "Windows", "Server", "2003", "Windows", "Vista", "Windows", "Server", "2008", "and", "Windows", "7", "does", "not", "validate", "arguments", "which", "allows", "local", "users", ...
[ 9, 13, 18, 12, 18, 18, 8, 18, 18, 18, 18, 8, 18, 18, 18, 18, 8, 7, 35, 8, 35, 25, 30, 20, 36, 35, 13, 20, 29, 30, 9, 17, 12, 17, 3, 17, 17, 4, 12, 9, 13, 17, 5 ]
[ 23, 23, 23, 23, 13, 8, 18, 8, 18, 8, 23, 23, 8, 18, 8, 18, 18, 23, 8, 18, 23, 23, 23, 23, 23, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 23, 11, 23, 23, 23, 23, 11, 23 ]
771
[ "SQL", "injection", "vulnerability", "in", "news.php", "in", "Erotik", "Auktionshaus", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "id", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 15, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
772
[ "SQL", "injection", "vulnerability", "in", "news.php", "in", "Auktionshaus", "Gelb", "3.0", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "id", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 8, 20, 34, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 15, 14, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
773
[ "SQL", "injection", "vulnerability", "in", "news.php", "in", "Php", "Auktion", "Pro", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "id", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 15, 15, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
774
[ "SQL", "injection", "vulnerability", "in", "news.php", "in", "Ero", "Auktion", "2.0", "and", "2010", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "id", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 8, 7, 8, 20, 34, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 15, 14, 23, 14, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
775
[ "SQL", "injection", "vulnerability", "in", "showimg.php", "in", "Arab", "Cart", "1.0.2.0", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "id", "parameter", "." ]
[ 18, 17, 17, 12, 17, 12, 18, 18, 8, 20, 34, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 5 ]
[ 11, 19, 19, 23, 23, 23, 0, 15, 14, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 23, 23, 23 ]
776
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "showimg.php", "in", "Arab", "Cart", "1.0.2.0", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web", "script", "or", "HTML", "via", "the", "id", "parameter", "." ]
[ 13, 17, 3, 18, 4, 17, 12, 17, 12, 18, 18, 8, 20, 34, 20, 29, 30, 13, 13, 17, 7, 18, 12, 9, 13, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 23, 0, 15, 14, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23 ]
777
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "the", "tb-send.rb", "(", "TrackBack", "transmission", ")", "plugin", "in", "tDiary", "2.2.2", "and", "earlier", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web", "script", "or...
[ 13, 17, 3, 18, 4, 17, 12, 9, 17, 3, 18, 17, 4, 17, 12, 13, 8, 7, 14, 20, 34, 20, 29, 30, 13, 13, 17, 7, 18, 12, 13, 20, 25, 33, 29, 9, 3, 8, 4, 17, 7, 3, 8, 4, 17, 20, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 0, 14, 22, 22, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 9, 23, 23 ]
778
[ "The", "gfs2_lock", "function", "in", "the", "Linux", "kernel", "before", "2.6.34-rc1-next-20100312", "and", "the", "gfs_lock", "function", "in", "the", "Linux", "kernel", "on", "Red", "Hat", "Enterprise", "Linux", "(", "RHEL", ")", "5", "and", "6", "does", ...
[ 9, 17, 17, 12, 9, 18, 17, 12, 13, 7, 9, 17, 17, 12, 9, 18, 17, 12, 18, 18, 18, 18, 3, 18, 4, 8, 7, 8, 35, 25, 25, 30, 18, 20, 12, 20, 36, 34, 13, 12, 13, 17, 36, 35, 13, 20, 29, 30, 9, 17, 12, 17, 3, 18, 7, ...
[ 23, 4, 23, 23, 23, 8, 18, 14, 22, 23, 23, 4, 23, 23, 23, 8, 18, 23, 23, 23, 8, 13, 23, 23, 23, 14, 23, 14, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 23,...
779
[ "smbd", "in", "Samba", "3.3.11", "3.4.6", "and", "3.5.0", "when", "libcap", "support", "is", "enabled", "runs", "with", "the", "CAP_DAC_OVERRIDE", "capability", "which", "allows", "remote", "authenticated", "users", "to", "bypass", "intended", "file", "permissions...
[ 17, 12, 18, 8, 8, 7, 8, 39, 13, 17, 35, 33, 35, 12, 9, 18, 17, 36, 35, 17, 31, 20, 29, 30, 33, 13, 20, 12, 13, 17, 20, 12, 9, 17, 5 ]
[ 23, 23, 0, 14, 14, 23, 14, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 11, 19, 19, 23, 11, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23 ]
780
[ "A", "certain", "Red", "Hat", "patch", "for", "the", "Linux", "kernel", "in", "Red", "Hat", "Enterprise", "Linux", "(", "RHEL", ")", "4", "on", "the", "ia64", "platform", "allows", "local", "users", "to", "use", "ptrace", "on", "an", "arbitrary", "proces...
[ 9, 13, 18, 18, 17, 12, 9, 18, 17, 12, 18, 18, 18, 18, 3, 18, 4, 8, 12, 9, 17, 17, 35, 13, 20, 29, 30, 17, 12, 9, 13, 17, 7, 25, 17, 20, 12, 20, 33, 29, 9, 32, 17, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 8, 18, 23, 23, 23, 14, 23, 23, 23, 23, 11, 11, 19, 23, 23, 23, 23, 23, 11, 23, 23, 23, 11, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
781
[ "The", "MMIO", "instruction", "decoder", "in", "the", "Xen", "hypervisor", "in", "the", "Linux", "kernel", "2.6.18", "in", "Red", "Hat", "Enterprise", "Linux", "(", "RHEL", ")", "5", "allows", "guest", "OS", "users", "to", "cause", "a", "denial", "of", "...
[ 9, 18, 17, 17, 12, 9, 18, 17, 12, 9, 18, 31, 8, 12, 18, 18, 18, 18, 3, 18, 4, 8, 35, 15, 17, 20, 29, 30, 9, 17, 12, 17, 3, 13, 17, 18, 17, 4, 12, 20, 36, 34, 9, 13, 17, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 14, 23, 23, 23, 8, 18, 23, 23, 23, 14, 11, 23, 23, 23, 23, 23, 23, 11, 19, 19, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
782
[ "The", "gnutls_x509_crt_get_serial", "function", "in", "the", "GnuTLS", "library", "before", "1.2.1", "when", "running", "on", "big-endian", "64-bit", "platforms", "calls", "the", "asn1_read_value", "with", "a", "pointer", "to", "the", "wrong", "data", "type", "an...
[ 9, 13, 17, 12, 9, 18, 17, 12, 8, 39, 32, 12, 13, 13, 20, 35, 9, 17, 12, 9, 17, 29, 9, 13, 20, 17, 7, 9, 13, 17, 17, 36, 35, 17, 20, 29, 30, 9, 17, 17, 17, 3, 18, 4, 17, 7, 30, 9, 13, 17, 12, 12, 9, 13, 17, ...
[ 23, 4, 23, 23, 23, 0, 23, 14, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 11, 11, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 19, 23, 23, ...
783
[ "gdk/gdkwindow.c", "in", "GTK+", "before", "2.18.5", "as", "used", "in", "gnome-screensaver", "before", "2.28.1", "performs", "implicit", "paints", "on", "windows", "of", "type", "GDK_WINDOW_FOREIGN", "which", "triggers", "an", "X", "error", "in", "certain", "circ...
[ 17, 12, 18, 12, 8, 12, 33, 12, 17, 12, 8, 20, 34, 20, 12, 20, 12, 17, 18, 36, 35, 9, 13, 17, 12, 13, 20, 7, 25, 35, 25, 13, 20, 29, 30, 17, 32, 7, 17, 9, 13, 17, 12, 32, 9, 18, 31, 13, 20, 5 ]
[ 3, 23, 23, 14, 22, 23, 23, 23, 23, 14, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 11, 23, 11, 23, 23, 23, 11, 23, 23, 23, 23, 12, 23, 23, 23, 23, 23, 23 ]
784
[ "Integer", "overflow", "in", "src/backend/executor/nodeHash.c", "in", "PostgreSQL", "8.4.1", "and", "earlier", "and", "8.5", "through", "8.5alpha2", "allows", "remote", "authenticated", "users", "to", "cause", "a", "denial", "of", "service", "(", "daemon", "crash", ...
[ 18, 12, 12, 17, 12, 18, 8, 7, 14, 7, 8, 12, 8, 35, 34, 33, 20, 29, 30, 9, 17, 12, 17, 3, 13, 17, 4, 12, 9, 18, 17, 12, 13, 18, 18, 20, 33, 29, 13, 13, 17, 20, 5 ]
[ 11, 19, 23, 3, 23, 0, 14, 22, 22, 23, 14, 22, 22, 11, 11, 19, 19, 23, 23, 23, 11, 19, 19, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
785
[ "content_encoding.c", "in", "libcurl", "7.10.5", "through", "7.19.7", "when", "zlib", "is", "enabled", "does", "not", "properly", "restrict", "the", "amount", "of", "callback", "data", "sent", "to", "an", "application", "that", "requests", "automatic", "decompress...
[ 17, 12, 17, 8, 12, 8, 39, 17, 35, 33, 35, 25, 25, 30, 9, 17, 12, 17, 20, 31, 29, 9, 17, 36, 35, 13, 17, 36, 16, 30, 13, 20, 29, 30, 9, 17, 12, 17, 3, 17, 17, 4, 7, 34, 33, 13, 17, 12, 32, 33, 13, 20, 29, 9, 1...
[ 23, 23, 0, 14, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 23, 11, 23, 23, 23, 23, 23, 11, 19, 23, 23, 23, 11, 19, 19, 23, 11, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, ...
786
[ "Cross-site", "scripting", "(", "XSS", ")", "vulnerability", "in", "the", "view_queryform", "function", "in", "lib/viewvc.py", "in", "ViewVC", "before", "1.0.10", "and", "1.1.x", "before", "1.1.4", "allows", "remote", "attackers", "to", "inject", "arbitrary", "web...
[ 13, 17, 3, 18, 4, 17, 12, 9, 17, 17, 12, 17, 12, 18, 12, 8, 7, 8, 12, 8, 35, 34, 20, 29, 30, 13, 13, 17, 7, 18, 12, 13, 17, 5 ]
[ 11, 19, 23, 11, 23, 23, 23, 23, 4, 23, 23, 3, 23, 0, 14, 22, 23, 14, 22, 22, 11, 11, 19, 23, 11, 11, 19, 19, 23, 11, 23, 23, 23, 23 ]
787
[ "The", "JMX-Console", "web", "application", "in", "JBossAs", "in", "Red", "Hat", "JBoss", "Enterprise", "Application", "Platform", "(", "aka", "JBoss", "EAP", "or", "JBEAP", ")", "4.2", "before", "4.2.0.CP09", "and", "4.3", "before", "4.3.0.CP08", "performs", ...
[ 9, 18, 17, 17, 12, 18, 12, 18, 18, 18, 18, 18, 18, 3, 13, 18, 18, 7, 18, 4, 8, 12, 8, 7, 8, 12, 8, 20, 17, 17, 25, 12, 9, 18, 7, 18, 20, 36, 35, 17, 20, 29, 30, 20, 29, 9, 17, 18, 17, 12, 32, 9, 13, 17, 5 ]
[ 23, 23, 23, 11, 23, 23, 23, 23, 23, 0, 15, 15, 15, 23, 23, 23, 23, 23, 23, 23, 14, 22, 22, 23, 14, 22, 22, 23, 11, 19, 23, 23, 23, 23, 23, 23, 23, 23, 11, 11, 19, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, ...
788
[ "Integer", "overflow", "in", "the", "predospecial", "function", "in", "dospecial.c", "in", "dvips", "in", "(", "1", ")", "TeX", "Live", "and", "(", "2", ")", "teTeX", "might", "allow", "user-assisted", "remote", "attackers", "to", "execute", "arbitrary", "co...
[ 18, 12, 12, 9, 13, 17, 12, 17, 12, 20, 12, 3, 8, 4, 18, 18, 7, 3, 8, 4, 17, 16, 30, 13, 17, 20, 29, 30, 13, 17, 12, 9, 13, 18, 17, 36, 35, 9, 13, 17, 17, 5 ]
[ 11, 19, 23, 23, 12, 23, 23, 3, 23, 23, 23, 23, 23, 23, 0, 15, 23, 23, 23, 23, 0, 23, 23, 23, 11, 19, 23, 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 19, 23 ]
789
[ "NOTE", ":", "some", "of", "these", "details", "are", "obtained", "from", "third", "party", "information", "." ]
[ 17, 6, 9, 12, 9, 20, 34, 33, 12, 13, 17, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 11, 23 ]
790
[ "The", "ssl3_get_record", "function", "in", "ssl/s3_pkt.c", "in", "OpenSSL", "0.9.8f", "through", "0.9.8m", "allows", "remote", "attackers", "to", "cause", "a", "denial", "of", "service", "(", "crash", ")", "via", "a", "malformed", "record", "in", "a", "TLS", ...
[ 9, 17, 17, 12, 17, 12, 18, 8, 12, 8, 20, 34, 20, 29, 30, 9, 17, 12, 17, 3, 17, 4, 12, 9, 13, 17, 12, 9, 18, 17, 12, 35, 9, 18, 17, 17, 33, 29, 9, 13, 17, 17, 5 ]
[ 23, 4, 23, 23, 3, 23, 0, 14, 22, 22, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
791
[ "NOTE", ":", "some", "of", "these", "details", "are", "obtained", "from", "third", "party", "information", "." ]
[ 17, 6, 9, 12, 9, 20, 34, 33, 12, 13, 17, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 23, 11, 23, 23, 23, 11, 23 ]
792
[ "The", "virtio_net_bad_features", "function", "in", "hw/virtio-net.c", "in", "the", "virtio-net", "driver", "in", "the", "Linux", "kernel", "before", "2.6.26", "when", "used", "on", "a", "guest", "OS", "in", "conjunction", "with", "qemu-kvm", "0.11.0", "or", "KV...
[ 9, 20, 34, 12, 17, 12, 9, 13, 17, 12, 9, 18, 17, 12, 8, 39, 33, 12, 9, 17, 17, 12, 17, 12, 13, 8, 7, 18, 8, 35, 34, 20, 29, 30, 9, 17, 12, 17, 3, 15, 18, 17, 7, 9, 13, 13, 17, 17, 4, 12, 32, 9, 13, 17, 12, ...
[ 23, 4, 23, 23, 3, 23, 23, 23, 23, 23, 23, 8, 18, 14, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 14, 23, 23, 23, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 2...
793
[ "Multiple", "format", "string", "vulnerabilities", "in", "isns.c", "in", "(", "1", ")", "Linux", "SCSI", "target", "framework", "(", "aka", "tgt", "or", "scsi-target-utils", ")", "1.0.3", "0.9.5", "and", "earlier", "and", "(", "2", ")", "iSCSI", "Enterprise"...
[ 13, 13, 17, 20, 12, 17, 12, 3, 8, 4, 18, 18, 17, 17, 3, 13, 17, 7, 20, 4, 8, 8, 7, 14, 7, 3, 8, 4, 17, 18, 18, 3, 13, 17, 4, 8, 13, 17, 20, 29, 30, 9, 17, 12, 17, 3, 13, 17, 17, 4, 7, 25, 34, 33, 13, 17, ...
[ 23, 11, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 0, 23, 23, 23, 14, 14, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 0, 23, 14, 23, 11, 19, 23, 23, 23, 11, 19, 19, 23, 23, 23, 11, 23, 23, 23, 23, ...
794
[ "aMSN", "(", "aka", "Alvaro's", "Messenger", ")", "0.98.3", "and", "earlier", "when", "SSL", "is", "used", "does", "not", "verify", "that", "the", "server", "hostname", "matches", "a", "domain", "name", "in", "the", "subject's", "Common", "Name", "(", "CN"...
[ 17, 3, 13, 18, 18, 4, 8, 7, 14, 39, 18, 35, 33, 35, 25, 30, 12, 9, 17, 17, 35, 9, 17, 17, 12, 9, 13, 18, 18, 3, 18, 4, 17, 7, 9, 13, 18, 18, 17, 12, 9, 18, 17, 36, 35, 13, 20, 29, 30, 9, 18, 17, 12, 9, 13, ...
[ 23, 23, 23, 23, 23, 23, 14, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 11, 11, 11, 23, 23, 23, 23, 23, 23, ...
795
[ "Unspecified", "vulnerability", "in", "Dovecot", "1.2.x", "before", "1.2.11", "allows", "remote", "attackers", "to", "cause", "a", "denial", "of", "service", "(", "CPU", "consumption", ")", "via", "long", "headers", "in", "an", "e-mail", "message", "." ]
[ 13, 17, 12, 18, 8, 12, 8, 20, 34, 20, 29, 30, 9, 17, 12, 17, 3, 18, 17, 4, 12, 13, 20, 12, 9, 13, 17, 5 ]
[ 23, 23, 23, 0, 14, 22, 22, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
796
[ "pkexec.c", "in", "pkexec", "in", "libpolkit", "in", "PolicyKit", "0.96", "allows", "local", "users", "to", "determine", "the", "existence", "of", "arbitrary", "files", "via", "the", "argument", "." ]
[ 17, 12, 17, 12, 17, 12, 18, 8, 35, 13, 20, 29, 30, 9, 17, 12, 13, 20, 12, 9, 17, 5 ]
[ 23, 23, 23, 23, 23, 23, 0, 14, 11, 11, 19, 23, 23, 23, 23, 23, 11, 19, 23, 23, 23, 23 ]
797
[ "The", "ip_evictor", "function", "in", "ip_fragment.c", "in", "libnids", "1.24", "as", "used", "in", "dsniff", "and", "possibly", "other", "products", "allows", "remote", "attackers", "to", "cause", "a", "denial", "of", "service", "(", null, "pointer", "derefe...
[ 9, 17, 17, 12, 17, 12, 20, 8, 12, 33, 12, 17, 7, 25, 13, 20, 35, 34, 20, 29, 30, 9, 17, 12, 17, 3, 18, 17, 17, 7, 17, 4, 12, 33, 13, 20, 5 ]
[ 23, 4, 23, 23, 3, 23, 0, 14, 23, 23, 23, 23, 23, 23, 23, 23, 11, 11, 19, 23, 23, 23, 11, 19, 19, 23, 23, 23, 23, 23, 11, 23, 23, 23, 23, 23, 23 ]
798
[ "The", "week_post_page", "function", "in", "the", "Weekly", "Archive", "by", "Node", "Type", "module", "6.x", "before", "6.x-2.7", "for", "Drupal", "does", "not", "properly", "implement", "node", "access", "restrictions", "when", "constructing", "SQL", "queries", ...
[ 9, 17, 17, 12, 9, 18, 18, 12, 18, 18, 17, 8, 12, 13, 12, 18, 35, 25, 13, 17, 17, 17, 20, 39, 32, 18, 20, 36, 35, 17, 20, 29, 30, 13, 13, 20, 12, 13, 20, 5 ]
[ 23, 4, 23, 23, 23, 23, 23, 23, 23, 23, 23, 14, 22, 22, 23, 23, 23, 23, 23, 23, 23, 11, 19, 23, 23, 11, 23, 23, 11, 11, 19, 23, 23, 23, 23, 23, 23, 23, 23, 23 ]
799
[ "SQL", "injection", "vulnerability", "in", "the", "SQL", "Reports", "(", "com_sqlreport", ")", "component", "1.1", "for", "Joomla!", "allows", "remote", "attackers", "to", "execute", "arbitrary", "SQL", "commands", "via", "the", "user_id", "parameter", "to", "aj...
[ 18, 17, 17, 12, 9, 18, 18, 3, 17, 4, 17, 8, 12, 18, 35, 13, 20, 29, 30, 13, 18, 35, 12, 9, 13, 17, 29, 30, 5 ]
[ 11, 19, 19, 23, 23, 11, 23, 23, 23, 23, 23, 14, 23, 23, 11, 11, 19, 23, 11, 19, 19, 11, 23, 23, 9, 23, 23, 3, 23 ]