FreeBSD VuXML

Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Security issues that affect the FreeBSD operating system or applications in the FreeBSD Ports Collection are documented using the Vulnerabilities and Exposures Markup Language (VuXML). The current VuXML document that serves as the source for the content of this site can be found:

Please report security issues to the FreeBSD Security Team at . Full contact details, including information handling policies and PGP key, can be found on the FreeBSD Security page.

VuXML ID index


VuXML ID Topic
00263aa3-67a8-11d8-80e3-0020ed76ef5a mailman XSS in user options page
00644f03-fb58-11d8-9837-000c41e2cdad imlib -- BMP decoder heap buffer overflow
00784d6e-f4ce-11da-87a1-000c6ec775d9 squirrelmail -- plugin.php local file inclusion vulnerability
00b0d8cd-7097-11e2-98d9-003067c2616f OpenSSL -- TLS 1.1, 1.2 denial of service
00b296b6-7db1-11e0-96b7-00300582f9fc Apache APR -- DoS vulnerabilities
00d6040a-b8e0-11dd-a578-0030843d3802 mantis -- session hijacking vulnerability
012b495c-9d51-11de-8d20-001bd3385381 cyrus-imapd -- Potential buffer overflow in Sieve
01356ccc-6a87-11da-b96e-000fb586ba73 horde -- Cross site scripting vulnerabilities in several of Horde's templates
013fa252-0724-11d9-b45d-000c41e2cdad mod_dav -- lock related denial-of-service
0163b498-af54-11d9-acd0-000854d03344 axel -- remote buffer overflow
018a84d0-2548-11df-b4a3-00e0815b8da8 sudo -- Privilege escalation with sudoedit
01bb84e2-bd88-11d9-a281-02e018374e71 groff -- pic2graph and eqn2graph are vulnerable to symlink attack through temporary files
01c231cd-4393-11d9-8bb9-00065be4b5b6 mysql -- GRANT access restriction problem
01c57d20-ea26-11de-bd39-00248c9b4be7 mozilla -- multiple vulnerabilities
01cf67b3-dc3b-11e2-a6cd-c48508086173 cURL library -- heap corruption in curl_easy_unescape
01d3ab7d-9c43-11e0-bc0f-0014a5e3cda6 ejabberd -- remote denial of service vulnerability
02274fd9-6bc5-11d9-8edb-000a95bc6fae realplayer -- arbitrary file deletion and other vulnerabilities
022a4c77-2da4-11e1-b356-00215c6a37bb proftpd -- arbitrary code execution vulnerability with chroot
022baf71-38e6-11dd-8d34-00e0815b8da8 Courier Authentication Library -- SQL Injection
024edd06-c933-11dc-810c-0016179b2dd5 xfce -- multiple vulnerabilities
027380b7-3404-11d9-ac1b-000d614f7fad hafiye -- lack of terminal escape sequence filtering
0274a9f1-0759-11da-bc08-0001020eed82 postnuke -- multiple vulnerabilities
027af74d-eb56-11e3-9032-000c2980a9f3 gnutls -- client-side memory corruption
02bc9b7c-e019-11d9-a8bd-000cf18bbe54 acroread -- XML External Entity vulnerability
02db20d7-e34a-11e3-bd92-bcaec565249c openjpeg -- Multiple vulnabilities
02eedd3c-c6b5-11dc-93b6-000e35248ad7 libxine -- buffer overflow vulnerability
03140526-1250-11de-a964-0030843d3802 zabbix -- php frontend multiple vulnerabilities
03159886-a8a3-11e3-8f36-0025905a4771 asterisk -- multiple vulnerabilities
035d17b2-484a-11d9-813c-00065be4b5b6 mysql -- erroneous access restrictions applied to table renames
03653079-8594-11d9-afa0-003048705d5a phpbb -- multiple information disclosure vulnerabilities
039d057e-544e-11e1-9fb7-003067b2972c surf -- private information disclosure
03d22656-2690-11de-8226-0030843d3802 drupal6-cck -- cross-site scripting
03e48bf5-a96d-11e3-a556-3c970e169bc2 samba -- multiple vulnerabilities
04042f95-14b8-4382-a8b9-b30e365776cf puppet26 -- multiple vulnerabilities
04104985-d846-11de-84e4-00215af774f0 cacti -- cross-site scripting issues
04320e7d-ea66-11e2-a96e-60a44c524f57 libzrtpcpp -- multiple security vulnerabilities
043d3a78-f245-4938-9bc7-3d0d35dd94bf wordpress -- multiple vulnerabilities
045944a0-6bca-11d9-aaa6-000a95bc6fae sudo -- environmental variable CDPATH is not cleared
048c77df-3211-11e1-9583-14dae938ec40 zabbix-frontend -- multiple XSS vulnerabilities
0491d15a-5875-11df-8d80-0015587e2cc1 lxr -- multiple XSS vulnerabilities
049332d2-f6e1-11e2-82f3-000c29ee3065 wordpress -- multiple vulnerabilities
04b7d46c-7226-11e0-813a-6c626dd55a41 Mozilla -- multiple vulnerabilities
04c6187d-2d8f-11dd-98c9-00163e000016 linux-flashplugin -- unspecified remote code execution vulnerability
0502c1cb-8f81-11df-a0bb-0050568452ac codeigniter -- file upload class vulnerability
0512b761-70fb-40d3-9954-aa4565528fa8 kstars -- exploitable set-user-ID application fliccd
057130e6-7f61-11e1-8a43-00262d5ed8ee chromium -- multiple vulnerabilities
057bf770-cac4-11e0-aea3-00215c6a37bb php -- multiple vulnerabilities
05dc6efa-2370-11e3-95b7-00e0814cab4e django -- denial-of-service via large passwords
05dcf751-0733-11d9-b45d-000c41e2cdad cups -- print queue browser denial-of-service
063399fc-f6d6-11dc-bcee-001c2514716c bzip2 -- crash with certain malformed archive files
0640198a-d117-11de-b667-0030843d3802 wordpress -- multiple vulnerabilities
06404241-b306-11d9-a788-0001020eed82 kdelibs -- kimgio input validation errors
064225c5-1f53-11d9-836a-0090962cff2a squid -- NTLM authentication denial-of-service vulnerability
0679deeb-8eaf-11db-abc9-0003476f14d3 sql-ledger -- multiple vulnerabilities
06a12e26-142e-11e0-bea2-0015f2db7bde webkit-gtk2 -- Multiple vulnabilities
06a6b2cf-484b-11d9-813c-00065be4b5b6 mysql -- ALTER MERGE denial of service vulnerability
06eac338-9ddf-11dd-813f-000e35248ad7 libxine -- denial of service vulnerability
06f142ff-4df3-11d9-a9e7-0001020eed82 wget -- multiple vulnerabilities
06f9174f-190f-11de-b2f0-001c2514716c phpmyadmin -- insufficient output sanitizing when generating configuration file
070b5b22-6d74-11dd-aa18-0030843d3802 drupal -- multiple vulnerabilities
07234e78-e899-11e1-b38d-0023ae8e59f0 databases/postgresql*-server -- multiple vulnerabilities
072a53e0-0397-11dd-bd06-0017319806e7 postfix-policyd-weight -- working directory symlink vulnerability
077c2dca-8f9a-11db-ab33-000e0c2e438a openssl -- Incorrect PKCS#1 v1.5 padding validation in crypto(3)
0792e7a7-8e37-11d8-90d1-0020ed76ef5a CVS path validation errors
07bb3bd2-a920-11dd-8503-0211060005df qemu -- Heap overflow in Cirrus emulation
07ead557-a220-11da-b410-000e0c2e438a WebCalendar -- unauthorized access vulnerability
07f3fe15-a9de-11d9-a788-0001020eed82 php -- readfile() DoS vulnerability
0809ce7d-f672-4924-9b3b-7c74bc279b83 gtar -- GNU TAR safer_name_suffix Remote Denial of Service Vulnerability
0832ee18-cf77-11dc-8c6a-00304881ac9a jetty -- multiple vulnerability
0838733d-1698-11dc-a197-0011098b2f36 wordpress -- XMLRPC SQL Injection
0871d18b-9638-11e3-a371-6805ca0b3d42 phpMyAdmin -- Self-XSS due to unescaped HTML output in import.
08ac7b8b-bb30-11da-b2fb-000e0c2e438a sendmail -- race condition vulnerability
08df5d46-1baf-11da-8038-0040f42d58c6 urban -- stack overflow vulnerabilities
09066828-2ef1-11dd-a0d8-0016d325a0ed ikiwiki -- empty password security hole
0925716f-34e2-11e2-aa75-003067c2616f opera -- execution of arbitrary code
09429f7c-fd6e-11da-b1cd-0050bf27ba24 horde -- multiple parameter cross site scripting vulnerabilities
09639ccc-3abb-11db-81e1-000e0c2e438a hlstats -- multiple cross site scripting vulnerabilities
0981958a-f733-11e3-8276-071f1604ef8a iodined -- authentication bypass
09910d76-4c82-11df-83fb-0015587e2cc1 fetchmail -- denial of service vulnerability
0998e79d-0055-11e3-905b-0025905a4771 mozilla -- multiple vulnerabilities
09c87973-8b9d-11e1-b393-20cf30e32f6d bugzilla -- multiple vulnerabilities
09c92f3a-fd49-11da-995c-605724cdf281 WebCalendar -- information disclosure vulnerability
09d418db-70fd-11d8-873f-0020ed76ef5a Apache 1.3 IP address access control failure on some 64-bit platforms
09db2844-0b21-11da-bc08-0001020eed82 gaim -- AIM/ICQ non-UTF-8 filename crash
09e83f7f-1326-11e2-afe3-00262d5ed8ee chromium -- multiple vulnerabilities
09f47c51-c1a6-11e3-a5ac-001b21614864 libaudiofile -- heap-based overflow in Microsoft ADPCM compression module
0a799a8e-c9d4-11e2-a424-14dae938ec40 irc/bitchx -- multiple vulnerabilities
0a82ac0c-1886-11df-b0d1-0015f2db7bde gnome-screensaver -- Multiple monitor hotplug issues
0a9e2b72-4cb7-11e1-9146-14dae9ebcf89 mozilla -- multiple vulnerabilities
0ab423e7-3822-11db-81e1-000e0c2e438a joomla -- multiple vulnerabilities
0ac1aace-f7b9-11da-9156-000e0c2e438a ypserv -- Inoperative access controls in ypserv
0ac68e68-d32b-11dd-b540-d1288664c17e ampache -- insecure temporary file usage
0ac89b39-f829-11db-b55c-000e0c6d38a9 qemu -- several vulnerabilities
0b0fb9b0-f0fb-11e3-9bcd-000c6e25e3e9 chromium -- multiple vulnerabilities
0b2b4b4d-a07c-11da-be0a-000c6ec775d9 postgresql81-server -- SET ROLE privilege escalation
0b535cd0-9b90-11e0-800a-00215c6a37bb Dokuwiki -- cross site scripting vulnerability
0b53f5f7-ca8a-11e0-aea3-00215c6a37bb dovecot -- denial of service vulnerability
0b628470-e9a6-11da-b9f4-00123ffe8333 coppermine -- Multiple File Extensions Vulnerability
0b79743b-3ab7-11db-81e1-000e0c2e438a gtetrinet -- remote code execution
0b8d7194-ca88-11e3-9d8d-c80aa9043978 OpenSSL -- Remote Data Injection / DoS
0bb7677d-52f3-11d9-a9e7-0001020eed82 krb5 -- heap buffer overflow vulnerability in libkadm5srv
0bc67930-d5c3-11e1-bef6-0024e81297ae dns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure
0bf376b7-cc6b-11e2-a424-14dae938ec40 net/openafs -- buffer overflow
0bf9d7fb-05b3-11da-bc08-0001020eed82 mambo -- multiple vulnerabilities
0c0dc409-1c5e-11da-92ce-0048543d60ce squid -- Possible Denial Of Service Vulnerability in store.c
0c14dfa7-879e-11e1-a2a0-00500802d8f7 nginx -- Buffer overflow in the ngx_http_mp4_module
0c39bafc-6771-11e3-868f-0025905a4771 asterisk -- multiple vulnerabilities
0c4d5973-f2ab-11d8-9837-000c41e2cdad mysql -- mysqlhotcopy insecure temporary file creation
0c592c4a-1bcc-11d9-a3ec-00061bd2d56f cyrus-sasl -- potential buffer overflow in DIGEST-MD5 plugin
0c6f3fde-9c51-11d8-9366-0020ed76ef5a Midnight Commander buffer overflows, format string bugs, and insecure temporary file handling
0c7a3ee2-3654-11e1-b404-20cf30e32f6d bugzilla -- multiple vulnerabilities
0cf3480d-5fdf-11d9-b721-00065be4b5b6 helvis -- arbitrary file deletion problem
0d0237d0-7f68-11de-984d-0011098ad87f SquirrelMail -- Plug-ins compromise
0d3547ab-9b69-11e1-bdb1-525401003090 PivotX -- 'ajaxhelper.php' Cross Site Scripting Vulnerability
0d3a5148-f512-11d8-9837-000c41e2cdad SpamAssassin -- denial-of-service in tokenize_headers
0d4c31ac-cb91-11d8-8898-000d6111a684 Remote code injection in phpMyAdmin
0d530174-6eef-11e1-afd6-14dae9ebcf89 asterisk -- multiple vulnerabilities
0d57c1d9-03f4-11e0-bf50-001a926c7637 krb5 -- multiple checksum handling vulnerabilities
0d9ba03b-0dbb-42b4-ae0f-60e27af78e22 sympa -- buffer overflow in "queue"
0dc91089-ca41-11df-aade-0050568f000c FreeBSD -- Unvalidated input in nfsclient
0dccaa28-7f3c-11dd-8de5-0030843d3802 python -- multiple vulnerabilities
0ddb57a9-da20-4e99-b048-4366092f3d31 bzip2 -- integer overflow vulnerability
0e154a9c-5d7a-11d8-80e3-0020ed76ef5a seti@home remotely exploitable buffer overflow
0e1e3789-d87f-11dd-8ecd-00163e000016 vim -- multiple vulnerabilities in the netrw module
0e30e802-a9db-11dd-93a2-000bcdf0a03b opera -- multiple vulnerabilities
0e43a14d-3f3f-11dc-a79a-0016179b2dd5 xpdf -- stack based buffer overflow
0e575ed3-0764-11dc-a80b-0016179b2dd5 squirrelmail -- Cross site scripting in HTML filter
0e8e1212-0ce5-11e1-849b-003067b2972c linux-flashplugin -- multiple vulnerabilities
0f020b7b-e033-11e1-90a2-000c299b62e1 FreeBSD -- named(8) DNSSEC validation Denial of Service
0f37d765-c5d4-11db-9f82-000e0c2e438a OpenSSL -- Multiple problems in crypto(3)
0f51f2c9-8956-11dd-a6fe-0030843d3802 proftpd -- Long Command Processing Vulnerability
0f5a2b4d-694b-11d9-a9e7-0001020eed82 awstats -- remote command execution vulnerability
0f62be39-e8e0-11e1-bea0-002354ed89bc OpenTTD -- Denial of Service
0fa15e08-92ec-11e1-a94a-00215c6a37bb samba -- incorrect permission checks vulnerability
0fe73a4a-1b18-11de-8226-0030843d3802 pivot-weblog -- file deletion vulnerability
0ff0e9a6-4ee0-11d9-a9e7-0001020eed82 phpmyadmin -- command execution vulnerability
100a9ed2-ee56-11dd-ab4f-0030843d3802 tor -- unspecified memory corruption vulnerability
1015e1fe-69ce-11e1-8288-00262d5ed8ee chromium -- cross-site scripting vulnerability
101f0aae-52d1-11e2-87fe-f4ce46b9ace8 puppet -- multiple vulnerabilities
1033750f-cab4-11d9-9aed-000e0c2e438a oops -- format string vulnerability
104beb63-af4d-11da-8414-0013d4a4a40e mplayer -- heap overflow in the ASF demuxer
10720fe8-51e0-11e1-91c1-00215c6a37bb drupal -- multiple vulnerabilities
107692a1-ee6c-11d9-8310-0001020eed82 acroread -- insecure temporary file creation
107e2ee5-f941-11da-b1fa-020039488e34 libxine -- buffer overflow vulnerability
111f1f84-1d14-4ff2-a9ea-cf07119c0d3b libyaml heap overflow resulting in possible code execution
113cd7e9-a4e2-11de-84af-001195e39404 fwbuilder -- security issue in temporary file handling
114d70f3-3d16-11d9-8818-008088034841 Cyrus IMAPd -- PARTIAL command out of bounds memory corruption
115a1389-858e-11e0-a76c-000743057ca2 Pubcookie Login Server -- XSS vulnerability
116b0820-d59c-11da-8098-00123ffe8333 lifetype -- ADOdb "server.php" Insecure Test Script Security Issue
11a84092-8f9f-11db-ab33-000e0c2e438a gzip -- multiple vulnerabilities
11bbccbc-03ee-11e0-bcdb-001fc61c2a55 krb5 -- multiple checksum handling vulnerabilities
1225549f-ca91-11e2-b3b8-f0def16c5c1b passenger -- security vulnerability
12488805-6773-11dc-8be8-02e0185f8d72 coppermine -- multiple vulnerabilities
12b1a62d-6056-4d90-9e21-45fcde6abae4 gallery -- remote code injection via HTTP_POST_VARS
12b336c6-fe36-11dc-b09c-001c2514716c mozilla -- multiple vulnerabilities
12b7286f-16a2-11dc-b803-0016179b2dd5 webmin -- cross site scripting vulnerability
12b7b4cf-1d53-11d9-814e-0001020eed82 wordpress -- XSS in administration panel
12bd6ecf-c430-11db-95c5-000c6ec775d9 mozilla -- multiple vulnerabilities
12c7b7ae-ec90-11d8-b913-000c41e2cdad popfile file disclosure
12d266b6-363f-11dc-b6c9-000c6ec775d9 opera -- multiple vulnerabilities
12efc567-9879-11dd-a5e7-0030843d3802 drupal -- multiple vulnerabilities
12f9d9e9-9e1e-11da-b410-000e0c2e438a phpicalendar -- cross site scripting vulnerability
13031d98-9bd1-11e2-a7be-8c705af55518 FreeBSD -- BIND remote denial of service
131bd7c4-64a3-11d9-829a-000a95bc6fae libxine -- DVD subpicture decoder heap overflow
13320091-52a6-11e2-a289-1c4bd681f0cf otrs -- XSS vulnerability
13419364-1685-11e4-bf04-60a44c524f57 i2p -- Multiple Vulnerabilities
134acaa2-51ef-11e2-8e34-0022156e8794 tomcat -- denial of service
1374b96c-a1c2-11db-9ddc-0011098b2f36 sircd -- remote reverse DNS buffer overflow
13b0c8c8-bee0-11dd-a708-001fc66e7203 p5-File-Path -- rmtree allows creation of setuid files
13bf0602-c08a-11e2-bb21-083e8ed0f47b plib -- buffer overflow
13d6d997-f455-11dd-8516-001b77d09812 sudo -- certain authorized users could run commands as any user
142353df-b5cc-11d9-a788-0001020eed82 gaim -- remote DoS on receiving malformed HTML
1431f2d6-a06e-11e2-b9e0-001636d274f3 NVIDIA UNIX driver -- ARGB cursor buffer overflow in "NoScanout" mode
143f6932-fedb-11e1-ad4a-003067b2972c bacula -- Console ACL Bypass
1449af37-9eba-11e1-b9c1-00262d5ed8ee chromium -- multiple vulnerabilities
144e524a-77eb-11df-ae06-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
1489df94-6bcb-11d9-a21e-000a95bc6fae opera -- multiple vulnerabilities in Java implementation
1495f931-8522-11e0-a1c1-00215c6a37bb pureftpd -- multiple vulnerabilities
14a37474-1383-11e0-8a58-00215c6a37bb django -- multiple vulnerabilities
14a6f516-502f-11e0-b448-bbfa2731f9c7 postfix -- plaintext command injection with SMTP over TLS
14ab174c-40ef-11de-9fd5-001bd3385381 cyrus-sasl -- buffer overflow vulnerability
14ad2a28-66d2-11dc-b25f-02e0185f8d72 konquerer -- address bar spoofing
150e4548-8950-11dd-a6fe-0030843d3802 phpmyadmin -- Cross-Site Scripting Vulnerability
15236023-a21b-11e2-a460-208984377b34 linux-flashplugin -- multiple vulnerabilities
152b27f0-a158-11de-990c-e5b1d4c882e0 nginx -- remote denial of service vulnerability
152e4c7e-2a2e-11e2-99c7-00a0d181e71d tomcat -- authentication weaknesses
15485ae8-9848-11dc-9e48-0016179b2dd5 phpmyadmin -- Cross Site Scripting
1583640d-be20-11dd-a578-0030843d3802 samba -- potential leakage of arbitrary memory contents
15e0e963-02ed-11d9-a209-00061bc2ad93 mpg123 buffer overflow
15ec9123-7061-11dc-b372-001921ab2fa4 id3lib -- insecure temporary file creation
1613db79-8e52-11da-8426-000fea0a9611 kpopup -- local root exploit and local denial of service
1657a3e6-4585-11e2-a396-10bf48230856 linux-flashplugin -- multiple vulnerabilities
167953a4-b01c-11df-9a98-0015587e2cc1 quagga -- stack overflow and DoS vulnerabilities
168190df-3e9a-11dd-87bc-000ea69a5213 fetchmail -- potential crash in -v -v verbose mode
16846d1e-f1de-11e1-8bd8-0022156e8794 Java 1.7 -- security manager bypass
169f422f-bd88-11d9-a281-02e018374e71 groff -- groffer uses temporary files unsafely
1709084d-4d21-11db-b48d-00508d6a62df plans -- multiple vulnerabilities
172acf78-780c-11dc-b3f4-0016179b2dd5 png -- multiple vulnerabilities
17326fd5-fcfb-11e2-9bb9-6805ca0b3d42 phpMyAdmin -- clickJacking protection can be bypassed
174b8864-6237-11e1-be18-14dae938ec40 databases/postgresql*-client -- multiple vulnerabilities
1753f0ff-8dd5-11e3-9b45-b4b52fce4ce8 mozilla -- multiple vulnerabilities
178ba4ea-fd40-11e1-b2ae-001fd0af1a4c mod_pagespeed -- multiple vulnerabilities
17dfd984-feba-11e3-b938-5404a68ad561 mencoder -- potential buffer overrun when processing malicious lzo compressed input
17f369dc-d7e7-11e1-90a2-000c299b62e1 nsd -- Denial of Service
17f53c1d-2ae9-11db-a6e2-000e0c2e438a postgresql -- encoding based SQL injection
1800886c-3dde-11e1-89b4-001ec9578670 isc-dhcp-server -- DoS in DHCPv6
180e9a38-060f-4c16-a6b7-49f3505ff22a kernel -- information disclosure when using HTT
1827f213-633e-11e2-8d93-c8600054b392 drupal -- multiple vulnerabilities
1839f78c-9f2b-11e3-980f-20cf30e32f6d subversion -- mod_dav_svn vulnerability
184ab9e0-64cd-11d9-9e1e-c296ac722cb3 squid -- buffer overflow vulnerability in gopherToHTML
184f5d0b-0fe8-11d9-8a8a-000c41e2cdad subversion -- WebDAV fails to protect metadata
185ff22e-c066-11e1-b5e0-000c299b62e1 FreeBSD -- Incorrect crypt() hashing
18974c8a-1fbd-11d9-814e-0001020eed82 apache13-modssl -- format string vulnerability in proxy support
18a14baa-5ee5-11db-ae08-0008743bf21a ingo -- local arbitrary shell command execution
18ce9a90-f269-11e1-be53-080027ef73ec fetchmail -- chosen plaintext attack against SSL CBC initialization vectors
18dc48fe-ca42-11df-aade-0050568f000c FreeBSD -- Integer overflow in bzip2 decompression
18dffa02-946a-11e1-be9d-000c29cc39d3 WebCalendar -- multiple vulnerabilities
18e3a5be-81f9-11db-95a2-0012f06707f0 ImageMagick -- SGI Image File heap overflow vulnerability
18e5428f-ae7c-11d9-837d-000e0c2e438a jdk -- jar directory traversal vulnerability
19207592-5f17-11db-ae08-0008743bf21a drupal -- HTML attribute injection
192609c8-0c51-11df-82a0-00248c9b4be7 irc-ratbox -- multiple vulnerabilities
19419b3b-92bd-11df-b140-0015f2db7bde webkit-gtk2 -- Multiple vulnabilities
19518d22-2d05-11d9-8943-0050fc56d258 putty -- buffer overflow vulnerability in ssh2 support
1959e847-d4f0-11e3-84b0-0018fe623f2b OpenSSL -- NULL pointer dereference / DoS
19751e06-c798-11e2-a373-000c29833058 znc -- null pointer dereference in webadmin module
197f444f-e8ef-11d9-b875-0001020eed82 bzip2 -- denial of service and permission race vulnerabilities
1986449a-8b74-40fa-b7cc-0d8def8aad65 openvpn -- denial of service: malicious authenticated "tap" client can deplete server virtual memory
1989b511-ae62-11d9-a788-0001020eed82 mozilla -- code execution through javascript: favicons
19a92df1-548d-11db-8f1a-000a48049292 tin -- buffer overflow vulnerabilities
19b17ab4-51e0-11db-a5ae-00508d6a62df phpmyadmin -- XSRF vulnerabilities
1a0704e7-0edf-11e0-becc-0022156e8794 php-imap -- Denial of Service
1a0de610-a761-11e3-95fe-bcaec565249c freetype2 -- Out of bounds read/write
1a0e4cc6-29bf-11de-bdeb-0030843d3802 phpmyadmin -- insufficient output sanitizing when generating configuration file
1a1aef8e-3894-11e1-8b5c-00262d5ed8ee chromium -- multiple vulnerabilities
1a216dfd-f710-11da-9156-000e0c2e438a freeradius -- authentication bypass vulnerability
1a32e8ee-3edb-11d9-8699-00065be4b5b6 ProZilla -- server response buffer overflow vulnerabilities
1a3bd81f-1b25-11df-bd1a-002170daae37 lighttpd -- denial of service vulnerability
1a448eb7-6988-11d8-873f-0020ed76ef5a mod_python denial-of-service vulnerability in parse_qs
1a818749-d646-11dc-8959-000bcdc1757a zenphoto -- XSS vulnerability
1a9f678d-48ca-11df-85f8-000c29a67389 sudo -- Privilege escalation with sudoedit
1ac77649-0908-11dd-974d-000fea2763ce lighttpd -- OpenSSL Error Queue Denial of Service Vulnerability
1ac858b0-3fae-11e1-a127-0013d3ccd9df OpenTTD -- Denial of service (server) via slow read attack
1acf9ec5-877d-11e0-b937-001372fd0af2 drupal6 -- multiple vulnerabilities
1ae613c3-5728-11e2-9483-14dae938ec40 freetype -- Multiple vulnerabilities
1b043693-8617-11db-93b2-000e35248ad7 libxine -- multiple buffer overflow vulnerabilities
1b27af46-d6f6-11e0-89a6-080027ef73ec ca_root_nss -- extraction of explicitly-untrusted certificates into trust bundle
1b3f854b-e4bd-11de-b276-000d8787e1be freeradius -- remote packet of death vulnerability
1b70bef4-649f-11d9-a30e-000a95bc6fae libxine -- multiple buffer overflows in RTSP
1b725079-9ef6-11da-b410-000e0c2e438a sudo -- arbitrary command execution
1b769b72-582b-11e2-b66b-00e0814cab4e django -- multiple vulnerabilities
1b93f6fe-e1c1-11e2-948d-6805ca0b3d42 phpMyAdmin -- Global variable scope injection
1b9b199f-5efd-11e2-a1ee-c48508086173 ettercap -- buffer overflow in target list parsing
1c0def84-5fb1-11db-b2e9-0008c79fa3d2 asterisk -- remote heap overwrite vulnerability
1c3142a3-4ab2-11da-932d-00055d790c25 squid -- FTP server response handling denial of service
1c4cab30-5468-11e1-9fb7-003067b2972c bip -- buffer overflow
1c5abbe2-8d7f-11e1-a374-14dae9ebcf89 asterisk -- multiple vulnerabilities
1c840eb9-fb32-11e3-866e-b499baab0cbe gnupg -- possible DoS using garbled compressed data packets
1c8a039b-7b23-11e2-b17b-20cf30e32f6d bugzilla -- multiple vulnerabilities
1ca8228f-858d-11e0-a76c-000743057ca2 mod_pubcookie -- Empty Authentication Security Advisory
1cae628c-3569-11e0-8e81-0022190034c0 rubygem-mail -- Remote Arbitrary Shell Command Injection Vulnerability
1cd3ca42-33e6-11e2-a255-5404a67eef98 lighttpd -- remote DoS in header parsing
1cd87e2a-81e3-11df-81d8-00262d5ed8ee mDNSResponder -- corrupted stack crash when parsing bad resolv.conf
1cf00643-ed8a-11d9-8310-0001020eed82 cacti -- multiple vulnerabilities
1d193bba-03f6-11e0-bf50-001a926c7637 krb5 -- RFC 3961 key-derivation checksum handling vulnerability
1d23109a-9005-11e2-9602-d43d7e0c7c02 php5 -- Multiple vulnerabilities
1d3a2737-7eb7-11d9-acf7-000854d03344 unace -- multiple vulnerabilities
1d8ff4a2-0445-11e0-8e32-000f20797ede mozilla -- multiple vulnerabilities
1d96305d-6ae6-11dd-91d5-000c29d47fd7 Bugzilla -- Directory Traversal in importxml.pl
1daea60a-4719-11da-b5c6-0004614cc33d ruby -- vulnerability in the safe level settings
1db1ed59-af07-11d8-acb9-000d610a3b12 buffer cache invalidation implementation issues
1db7ecf5-fd24-11d9-b4d6-0007e900f87b clamav -- multiple remote buffer overflows
1e1421f0-8d6f-11e0-89b4-001ec9578670 BIND -- Large RRSIG RRsets and Negative Caching DoS
1e14d46f-af1f-11e1-b242-00215af774f0 quagga -- BGP OPEN denial of service vulnerability
1e606080-3293-11da-ac91-020039488e34 uim -- privilege escalation vulnerability
1e6c4008-245f-11d9-b584-0050fc56d258 gaim -- buffer overflow in MSN protocol support
1e8031be-4258-11de-b67a-0030843d3802 php -- ini database truncation inside dba_replace() function
1e8e63c0-478a-11dd-a88d-000ea69a5213 fetchmail -- potential crash in -v -v verbose mode (revised patch)
1ecc0d3f-ae8e-11e1-965b-0024e88a8c98 dns/bind9* -- zero-length RDATA can cause named to terminate, reveal memory
1ecf4ca1-f7ad-11d8-96c9-00061bc2ad93 moinmoin -- ACL group bypass
1ed03222-3c65-11dc-b3d3-0016179b2dd5 vim -- Command Format String Vulnerability
1f2fdcff-ae60-11d9-a788-0001020eed82 firefox -- arbitrary code execution in sidebar panel
1f5b711b-3d0e-11dc-b3d3-0016179b2dd5 drupal -- Multiple cross-site scripting vulnerabilities
1f6e2ade-35c2-11da-811d-0050bf27ba24 imap-uw -- mailbox name handling remote buffer vulnerability
1f6ee708-0d22-11e1-b5bd-14dae938ec40 phpmyadmin -- Local file inclusion
1f738bda-c6ac-11d8-8898-000d6111a684 Remote Denial of Service of HTTP server and client
1f826757-26be-11d9-ad2d-0050fc56d258 rssh -- format string vulnerability
1f922de0-3fe5-11d9-a9e7-0001020eed82 unarj -- directory traversal vulnerability
1f935f61-075d-11db-822b-728b50d539a3 Joomla -- multiple vulnerabilities
1f9e2376-c52f-11dd-8cbc-00163e000016 php5 -- potential magic_quotes_gpc vulnerability
1fa4c9f1-cfca-11da-a672-000e0c2e438a FreeBSD -- FPU information disclosure
1fade8a3-e9e8-11e0-9580-4061862b8c22 Mozilla -- multiple vulnerabilities
1fe734bf-4a06-11db-b48d-00508d6a62df opera -- RSA Signature Forgery
2001103a-6bbd-11d9-851d-000a95bc6fae imlib -- xpm heap buffer overflows and integer overflows
206f9826-a06d-4927-9a85-771c37010b32 node.js -- DoS Vulnerability
2070c79a-8e1e-11e2-b34d-000c2957946c ModSecurity -- XML External Entity Processing Vulnerability
207f8ff3-f697-11d8-81b0-000347a4fa7d nss -- exploitable buffer overflow in SSLv2 protocol handler
20923a0d-82ba-11e1-8d7b-003067b2972c linux-flashplugin -- multiple vulnerabilities
2092a45b-e2f6-11e1-a8ca-00262d5ed8ee www/chromium -- multiple vulnerabilities
209c068d-28be-11e2-9160-00262d5ed8ee chromium -- multiple vulnerabilities
209f0d75-4b5c-11dc-a6cd-000fb5066b20 flyspray -- authentication bypass
20a4eb11-8ea3-11dc-a396-0016179b2dd5 tikiwiki -- multiple vulnerabilities
20b4f284-2bfc-11de-bdeb-0030843d3802 freetype2 -- multiple vulnerabilities
20be2982-4aae-11d8-96f2-0020ed76ef5a fsp buffer overflow and directory traversal vulnerabilities
20c9bb14-81e6-11d9-a9e7-0001020eed82 opera -- "data:" URI handler spoofing vulnerability
20d16518-2477-11d9-814e-0001020eed82 mpg123 -- buffer overflow in URL handling
20dfd134-1d39-11d9-9be9-000c6e8f12ef freeradius -- denial-of-service vulnerability
20e23b65-a52e-11e3-ae3a-00224d7c32a2 xmms -- Integer Overflow And Underflow Vulnerabilities
214e8e07-d369-11dd-b800-001b77d09812 vinagre -- format string vulnerability
219d0bfd-a915-11e1-b519-00262d5ed8ee chromium -- multiple vulnerabilities
21b7c550-2a22-11db-a6e2-000e0c2e438a squirrelmail -- random variable overwrite vulnerability
21c223f2-d596-11da-8098-00123ffe8333 ethereal -- Multiple Protocol Dissector Vulnerabilities
21c59f5e-7cc5-11e2-9c11-080027a5ec9a django -- multiple vulnerabilities
225bc349-ce10-11dd-a721-0030843d3802 opera -- multiple vulnerabilities
2273879e-8a2f-11dd-a6fe-0030843d3802 mozilla -- multiple vulnerabilities
227475c2-09cb-11db-9156-000e0c2e438a webmin, usermin -- arbitrary file disclosure vulnerability
229577a8-0936-11db-bf72-00046151137e phpmyadmin -- cross site scripting vulnerability
22c6b826-cee0-11da-8578-00123ffe8333 plone -- "member_id" Parameter Portrait Manipulation Vulnerability
22f00553-a09d-11d9-a788-0001020eed82 portupgrade -- insecure temporary file handling vulnerability
2328adef-157c-11d9-8402-000d93664d5c racoon -- improper certificate handling
23573650-f99a-11da-994e-00142a5f241c dokuwiki -- multiple vulnerabilities
23afd91f-676b-11da-99f6-00123ffe8333 phpmyadmin -- register_globals emulation "import_blacklist" manipulation
23c8423e-9bff-11e0-8ea2-0019d18c446a Piwik -- remote command execution vulnerability
23fb5a04-722b-11d9-9e1e-c296ac722cb3 squid -- buffer overflow in WCCP recvfrom() call
240ac24c-dff3-11dd-a765-0030843d3802 mysql -- remote dos via malformed password packet
2430e9c3-8741-11de-938e-003048590f9e wordpress -- remote admin password reset vulnerability
249a8c42-6973-11d9-ae49-000c41e2cdad zgv -- exploitable heap overflows
24aa9970-9ccd-11de-af10-000c29a67389 silc-toolkit -- Format string vulnerabilities
24b64fb0-af1d-11dd-8a16-001b1116b350 clamav -- off-by-one heap overflow in VBA project parser
24cefa4b-a940-11e3-91f2-00262d5ed8ee www/chromium --multiple vulnerabilities
24ec781b-8c11-11dd-9923-0016d325a0ed bitlbee -- account recreation security issues
24eee285-09c7-11da-bc08-0001020eed82 xpdf -- disk fill DoS vulnerability
24f6b1eb-43d5-11db-81e1-000e0c2e438a win32-codecs -- multiple vulnerabilities
2506f558-6a8a-11da-b96e-000fb586ba73 mnemo -- Cross site scripting vulnerabilities in several of the notepad name and note data fields
253ea131-bd12-11d8-b071-00e08110b673 Gallery 1.4.3 and ealier user authentication bypass
2544f543-c178-11de-b175-001cc0377035 elinks -- buffer overflow vulnerability
25673e6e-786b-11df-a921-0245fb008c0b ziproxy -- security vulnerability in PNG decoder
25858c37-bdab-11da-b7d4-00123ffe8333 linux-realplayer -- buffer overrun
25eb365c-fd11-11dd-8424-c213de35965d dia -- remote command execution vulnerability
25ed4ff8-8940-11df-a339-0026189baca3 bogofilter -- heap underrun on malformed base64 input
262b92fe-81c8-11e1-8899-001ec9578670 png -- memory corruption/possible remote code execution
265c8b00-d2d0-11d8-b479-02e0185c0b53 multiple vulnerabilities in ethereal
2689f4cb-ec4c-11d8-9440-000347a4fa7d rsync -- path sanitizing vulnerability
26a08c77-32da-4dd7-a884-a76fc49aa824 tomcat -- Tomcat Manager cross-site scripting
26c9e8c6-1c99-11d9-814e-0001020eed82 sharutils -- buffer overflows
26e1c48a-9fa7-11df-81b5-00e0814cab4e Piwik -- Local File Inclusion Vulnerability
2701611f-df5c-11d9-b875-0001020eed82 gaim -- Yahoo! remote crash vulnerability
271498a9-2cd4-11da-a263-0001020eed82 clamav -- arbitrary code execution and DoS vulnerabilities
273cc1a3-0d6b-11d9-8a8a-000c41e2cdad lha -- numerous vulnerabilities when extracting archives
2747fc39-915b-11dc-9239-001c2514716c xpdf -- multiple remote Stream.CC vulnerabilities
2748fdde-3a3c-11de-bbc5-00e0815b8da8 quagga -- Denial of Service
274922b8-ad20-11df-af1f-00e0814cab4e phpmyadmin -- Several XSS vulnerabilities
275b845e-f56c-11db-8163-000e0c2e438a FreeBSD -- IPv6 Routing Header 0 is dangerous
2797b27a-f55b-11d8-81b0-000347a4fa7d kdelibs -- konqueror cross-domain cookie injection
279e5f4b-d823-11e2-928e-08002798f6ff apache-xml-security-c -- heap overflow
27a70a01-5f6c-11da-8d54-000cf18bbe54 ghostscript -- insecure temporary file creation vulnerability
27c331d5-64c7-11d8-80e3-0020ed76ef5a Vulnerabilities in H.323 implementations
27d01223-c457-11dd-a721-0030843d3802 php -- multiple vulnerabilities
27d78386-d35f-11dd-b800-001b77d09812 awstats -- multiple XSS vulnerabilities
28022228-5a0e-11df-942d-0015587e2cc1 wireshark -- DOCSIS dissector denial of service
282dfea0-3378-11d9-b404-000c6e8f12ef apache2 multiple space header denial-of-service vulnerability
2892a8e2-3d68-11e2-8e01-0800273fe665 dns/bind9* -- servers using DNS64 can be crashed by a crafted query
28a7310f-9855-11df-8d36-001aa0166822 apache -- Remote DoS bug in mod_cache and mod_dav
28ab7ddf-61ab-11d9-a9e7-0001020eed82 dillo -- format string vulnerability
28c575fa-784e-11e3-8249-001cc0380077 libXfont -- Stack buffer overflow in parsing of BDF font files in libXfont
28c9243a-72ed-11da-8c1d-000e0c2e438a phpbb -- multiple vulnerabilities
28e93883-539f-11d9-a9e7-0001020eed82 acroread5 -- mailListIsPdf() buffer overflow vulnerability
290d81b9-80f1-11d8-9645-0020ed76ef5a oftpd denial-of-service vulnerability (PORT command)
29194cb8-6e9f-11e1-8376-f0def16c5c1b nginx -- potential information leak
29255141-c3df-11dd-a721-0030843d3802 mantis -- multiple vulnerabilities
296ecb59-0f6b-11df-8bab-0019996bc1f7 squid -- Denial of Service vulnerability in DNS handling
299e3f81-aee7-11dc-b781-0016179b2dd5 e2fsprogs -- heap buffer overflow
29b7e3f4-b6a9-11df-ae63-f255a795cb21 lftp -- multiple HTTP client download filename vulnerability
29dd0065-81fa-11d9-a9e7-0001020eed82 kdelibs -- insecure temporary file creation
29edd807-438d-11d9-8bb9-00065be4b5b6 mysql -- FTS request denial of service vulnerability
29f5bfc5-ce04-11dd-a721-0030843d3802 mozilla -- multiple vulnerabilities
2a093853-2495-11e2-b0c7-000d601460a4 ruby -- $SAFE escaping vulnerability about Exception#to_s/NameError#to_s
2a41233d-10e7-11e0-becc-0022156e8794 php-zip -- multiple Denial of Service vulnerabilities
2a6a966f-1774-11df-b5c1-0026189baca3 fetchmail -- heap overflow on verbose X.509 display
2adc3e78-22d1-11e2-b9f0-d0df9acfd7e5 drupal7 -- multiple vulnerabilities
2ae114de-c064-11e1-b5e0-000c299b62e1 FreeBSD -- OpenSSL multiple vulnerabilities
2ae24334-f2e6-11e2-8346-001e8c75030d subversion -- remotely triggerable "Assertion failed" DoS vulnerability or read overflow.
2b20fd5f-552e-11e1-9fb7-003067b2972c WebCalendar -- Persistent XSS
2b2b333b-6bd3-11d9-95f8-000a95bc6fae mc -- multiple vulnerabilities
2b2f6092-0694-11e3-9e8e-000c29f6ae42 puppet -- multiple vulnerabilities
2b4d5288-447e-11d9-9ebb-000854d03344 rockdodger -- buffer overflows
2b6e47b1-0598-11da-86bc-000e0c2e438a ipsec -- Incorrect key usage in AES-XCBC-MAC
2b6ed5c7-1a7f-11e0-b61d-000c29d1636d php -- multiple vulnerabilities
2b841f88-2e8d-11e2-ad21-20cf30e32f6d bugzilla -- multiple vulnerabilities
2b8cad90-f289-11e1-a215-14dae9ebcf89 mozilla -- multiple vulnerabilities
2bc960c4-e665-11dd-afcd-00e0815b8da8 optipng -- arbitrary code execution via crafted BMP image
2bc96f18-683f-11dc-82b6-02e0185f8d72 samba -- nss_info plugin privilege escalation vulnerability
2bcd2d24-24ca-11d8-82e5-0020ed76ef5a Buffer overflow in pam_smb password handling
2be7c122-0614-11db-9156-000e0c2e438a hashcash -- heap overflow vulnerability
2c12ae0c-c38d-11e0-8eb7-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
2c25e762-6bb9-11d9-93db-000a95bc6fae quake2 -- multiple critical vulnerabilities
2c2d4e83-2370-11e0-a91b-00e0815b8da8 tarsnap -- cryptographic nonce reuse
2c4f4688-298b-11dc-a197-0011098b2f36 typespeed -- arbitrary code execution
2c5757f4-88bf-11d9-8720-0007e900f87b sup -- format string vulnerability
2c6acefd-8194-11d8-9645-0020ed76ef5a setsockopt(2) IPv6 sockets input validation error
2c8a84d9-5bee-11db-a5ae-00508d6a62df vtiger -- multiple remote file inclusion vulnerabilities
2cde1892-913e-11e1-b44c-001fd0af1a4c php -- multiple vulnerabilities
2d2dcbb4-906c-11dc-a951-0016179b2dd5 phpmyadmin -- cross-site scripting vulnerability
2d8cf857-81ea-11d9-a9e7-0001020eed82 gftp -- directory traversal vulnerability
2d9ad236-4d26-11db-b48d-00508d6a62df freeciv -- Denial of Service Vulnerabilities
2db97aa6-be81-11da-9b82-0050bf27ba24 horde -- remote code execution vulnerability in the help viewer
2dc764fa-40c0-11dc-aeac-02e0185f8d72 FreeBSD -- Buffer overflow in tcpdump(1)
2ddbfd29-a455-11dd-a55e-00163e000016 libspf2 -- Buffer overflow
2de14f7a-dad9-11d8-b59a-00061bc2ad93 Multiple Potential Buffer Overruns in Samba
2df297a2-dc74-11da-a22b-000c6ec775d9 awstats -- arbitrary command execution vulnerability
2e116ba5-f7c3-11d9-928e-000b5d7e6dd5 kdebase -- Kate backup file permission leak
2e129846-8fbb-11d8-8b29-0020ed76ef5a MySQL insecure temporary file creation (mysqlbug)
2e25d38b-54d1-11d9-b612-000c6e8f12ef jabberd -- denial-of-service vulnerability
2e28cefb-2aee-11da-a263-0001020eed82 firefox & mozilla -- command line URL shell command injection
2e5715f8-67f7-11e3-9811-b499baab0cbe gnupg -- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack
2e7e9072-73a0-11e1-a883-001cc0a36e12 libtasn1 -- ASN.1 length decoding vulnerability
2ea6ce3d-6afd-11e2-9d4e-bcaec524bf84 upnp -- multiple vulnerabilities
2ecb7b20-d97e-11e0-b2e2-00215c6a37bb OpenSSL -- multiple vulnerabilities
2eccb24f-61c0-11e0-b199-0015f2db7bde xrdb -- root hole via rogue hostname
2ecd02e2-e864-11da-b9f4-00123ffe8333 phpmyadmin -- XSRF vulnerabilities
2eda0c54-34ab-11e0-8103-00215c6a37bb opera -- multiple vulnerabilities
2eebebff-cd3b-11e2-8f09-001b38c3836c xorg -- protocol handling issues in X Window System client libraries
2f0cb4bb-416d-11da-99fe-000854d03344 xloadimage -- buffer overflows in NIFF image title handling
2f5ff968-5829-11e1-8288-00262d5ed8ee chromium -- multiple vulnerabilities
2f794295-7b69-11dd-80ba-000bcdf0a03b FreeBSD -- Remote kernel panics on IPv6 connections
2f90556f-18c6-11e4-9cc4-5453ed2e2b49 kdelibs -- KAuth PID Reuse Flaw
2fbe16c2-cab6-11d9-9aed-000e0c2e438a freeradius -- sql injection and denial of service vulnerability
2fbfd455-f2d0-11e2-8a46-000d601460a4 suPHP -- Privilege escalation
2fda6bd2-c53c-11de-b157-001999392805 opera -- multiple vulnerabilities
2fe4b57f-d110-11e1-ac76-10bf48230856 Dokuwiki -- cross site scripting vulnerability
2ffb1b0d-ecf5-11dd-abae-00219b0fc4d8 glpi -- SQL Injection
30149157-f926-11e1-95cd-001fd0af1a4c wordpress -- multiple unspecified privilege escalation bugs
30211c45-e52a-11de-b5cd-00e0815b8da8 dovecot -- Insecure directory permissions
3030ae22-1c7f-11d9-81a4-0050fc56d258 mail-notification -- denial-of-service vulnerability
30394651-13e1-11dd-bab7-0016179b2dd5 gnupg -- memory corruption vulnerability
3042c33a-f237-11df-9d02-0018fe623f2b openssl -- TLS extension parsing race condition
304409c3-c3ef-11e0-8aa5-485d60cb5385 libXfont -- possible local privilege escalation
30866e6c-3c6d-11dd-98c9-00163e000016 vim -- Vim Shell Command Injection Vulnerabilities
309542b5-50b9-11e1-b0d8-00151735203a bugzilla -- multiple vulnerabilities
30a04ab4-ed7b-11e2-8643-8c705af55518 squid -- denial of service
30acb8ae-9d46-11dc-9114-001c2514716c rubygem-rails -- session-fixation vulnerability
30c560ff-e0df-11dc-891a-02061b08fc24 opera -- multiple vulnerabilities
30cb4522-b94d-11e0-8182-485d60cb5385 libsoup -- unintentionally allow access to entire local filesystem
30cea6be-1d0c-11d9-814e-0001020eed82 CUPS -- local information disclosure
30cf9485-1c2c-11d9-9ecb-000c6e8f12ef zinf -- potential buffer overflow playlist support
30e4ed7b-1ca6-11da-bc01-000e0c2e438a bind9 -- denial of service
30f5ca1d-a90b-11dc-bf13-0211060005df qemu -- Translation Block Local Denial of Service Vulnerability
310d0087-0fde-4929-a41f-96f17c5adffe xloadimage -- arbitrary command execution when handling compressed files
313da7dc-763b-11df-bcce-0018f3e2eb82 tiff -- buffer overflow vulnerability
31435fbc-ae73-11dc-a5f9-001a4d49522b peercast -- buffer overflow vulnerability
3145faf1-974c-11e0-869e-000c29249b2e ikiwiki -- tty hijacking via ikiwiki-mass-rebuild
3149ab1c-c8b9-11de-b87b-0011098ad87f vlc -- stack overflow in MPA, AVI and ASF demuxer
316e1c9b-671c-11d8-9aad-000a95bc6fae hsftp format string vulnerabilities
31952117-3d17-11d9-8818-008088034841 Cyrus IMAPd -- APPEND command uses undefined programming construct
31b045e7-ae75-11dc-a5f9-001a4d49522b opera -- multiple vulnerabilities
31b145f2-d9d3-49a9-8023-11cf742205dc PHP5 -- Heap corruption in XML parser
31c09848-1829-11e4-bf04-60a44c524f57 tor -- traffic confirmation attack
31d9fbb4-9d09-11dc-a29d-0016d325a0ed ikiwiki -- improper symlink verification vulnerability
31db9a18-e289-11e1-a57d-080027a27dbf rubygem-rails -- multiple vulnerabilities
322d4ff6-85c3-11d8-a41f-0020ed76ef5a Midnight Commander buffer overflow during symlink resolution
323784cf-48a6-11d9-a9e7-0001020eed82 viewcvs -- information leakage
3243e839-f489-11d8-9837-000c41e2cdad fidogate -- write files as `news' user
326c517a-d029-11d9-9aed-000e0c2e438a phpbb -- multiple vulnerabilities
32b05547-6913-11e0-bdc4-001b2134ef46 linux-flashplugin -- remote code execution vulnerability
32d38cbb-2632-11dc-94da-0016179b2dd5 flac123 -- stack overflow in comment parsing
32d4f0f1-85c3-11d9-b6dc-0007e900f747 mkbold-mkitalic -- format string vulnerability
32db37a5-50c3-11db-acf3-000c6ec775d9 openssh -- multiple vulnerabilities
330106da-7406-11e1-a1d7-00262d5ed8ee chromium -- multiple vulnerabilities
3338f87c-3d5f-11e1-a00a-000c6eb41cf7 PowerDNS -- Denial of Service Vulnerability
3383e706-4fc3-11df-83fb-0015587e2cc1 tomcat -- information disclosure vulnerability
3388eff9-5d6e-11d8-80e3-0020ed76ef5a Samba 3.0.x password initialization bug
338d1723-5f03-11d9-92a7-000bdb1444a4 horde -- XSS vulnerabilities
339fbbc1-4d23-11db-b48d-00508d6a62df freeciv -- Packet Parsing Denial of Service Vulnerability
33ab4a47-bfc1-11d8-b00e-000347a4fa7d Several vulnerabilities found in PHPNuke
33d73d59-4677-11e1-88cd-00262d5ed8ee chromium -- multiple vulnerabilities
34134fd4-5d81-11d8-80e3-0020ed76ef5a pine insecure URL handling
342176a8-f464-11e1-8bd8-0022156e8794 GNU gatekeeper -- denial of service
342d2e48-26db-11db-9275-000475abc56f clamav -- heap overflow vulnerability
34414a1e-e377-11db-b8ab-000c76189c4c zope -- cross-site scripting vulnerability
3497d7be-2fef-45f4-8162-9063751b573a fetchmail -- remote root/code injection from malicious POP3 server
34c93ae8-7e6f-11db-bf00-02e081235dab gnupg -- buffer overflow
34ce5817-8d56-11e0-b5a2-6c626dd55a41 asterisk -- Remote crash vulnerability
34e0316a-aa91-11df-8c2e-001517289bf8 ruby -- UTF-7 encoding XSS vulnerability in WEBrick
34e8ccf5-7d71-11e0-9d83-000c29cc39d3 Zend Framework -- potential SQL injection when using PDO_MySql
350a5bd9-520b-11db-8f1a-000a48049292 MT -- Search Unspecified XSS
3546a833-03ea-11dc-a51d-0019b95d4f14 samba -- multiple vulnerabilities
358133b5-c2b9-11e2-a738-00262d5ed8ee chromium -- multiple vulnerabilities
359f615d-a9e1-11e1-8a66-14dae9ebcf89 asterisk -- multiple vulnerabilities
35c0b572-125a-11de-a964-0030843d3802 roundcube -- webmail script insertion and php code injection
35e54755-54e4-11dd-ad8b-0030843d3802 phpmyadmin -- cross site request forgery vulnerabilites
35ecdcbe-3501-11e0-afcd-0015f2db7bde webkit-gtk2 -- Multiple vurnabilities.
35f2679f-52d7-11db-8f1a-000a48049292 postnuke -- admin section SQL injection
35f6093c-73c3-11d9-8a93-00065be4b5b6 newsgrab -- directory traversal vulnerability
35f6fdf8-a425-11d8-9c6d-0020ed76ef5a Cyrus IMAP pre-authentication heap overflow vulnerability
36235c38-e0a8-11e1-9f4d-002354ed89bc automake -- Insecure 'distcheck' recipe granted world-writable distdir
36494478-6a88-11da-b96e-000fb586ba73 kronolith -- Cross site scripting vulnerabilities in several of the calendar name and event data fields
36533a59-2770-11e2-bb44-003067b2972c linux-flashplugin -- multiple vulnerabilities
36594c54-7be7-11e0-9838-0022156e8794 Exim -- remote code execution and information disclosure
36858e78-3963-11e4-ad84-000c29f6ae42 security/ossec-hids-* -- root escalation via temp files
36a415c8-3867-11e4-b522-00262d5ed8ee www/chromium -- multiple vulnerabilities
36f9ac43-b2ac-11e3-8752-080027ef73ec mail/trojita -- may leak mail contents (not user credentials) over unencrypted connection
3718833e-0d27-11e4-89db-000c6e25e3e9 chromium -- multiple vulnerabilities
373e412e-f748-11df-96cd-0015f2db7bde OpenTTD -- Denial of service (server/client) via invalid read
3761df02-0f9c-11e0-becc-0022156e8794 php -- NULL byte poisoning
37940643-be1b-11dd-a578-0030843d3802 hplip -- hpssd Denial of Service
37a365ed-1269-11de-a964-0030843d3802 gstreamer-plugins-good -- multiple memory overflows
37a5c10f-bf56-11da-b0e9-00123ffe8333 freeradius -- EAP-MSCHAPv2 Authentication Bypass
37a8603d-4494-11de-bea7-000c29a67389 nsd -- buffer overflow vulnerability
37e30313-9d8c-11db-858b-0060084a00e5 fetchmail -- crashes when refusing a message bound for an MDA
380e8c56-8e32-11e1-9580-4061862b8c22 mozilla -- multiple vulnerabilities
38195f00-b215-11e1-8132-003067b2972c linux-flashplugin -- multiple vulnerabilities
38242d51-3e58-11e4-ac2f-bcaec565249c dbus -- multiple vulnabilities
3837f462-5d6b-11d8-80e3-0020ed76ef5a Buffer overflows in XFree86 servers
38560d79-0e42-11e1-902b-20cf30e32f6d Apache APR -- DoS vulnerabilities
3886cafe-668c-11e2-94b8-1c4bd681f0cf django-cms -- XSS Vulnerability
388d9ee4-7f22-11dd-a66a-0019666436c2 mysql -- MyISAM table privileges security bypass vulnerability
3897a2f8-1d57-11d9-bc4a-000c41e2cdad tiff -- multiple integer overflows
38bdf10e-2293-11e0-bfa4-001676740879 tor -- remote code execution and crash
38c76fcf-1744-11da-978e-0001020eed82 pam_ldap -- authentication bypass vulnerability
38daea4f-2851-11e2-9483-14dae938ec40 opera -- multiple vulnerabilities
392b5b1d-9471-11dc-9db7-001c2514716c php -- multiple security vulnerabilities
395e0faa-ffa7-11e0-8ac4-6c626dd55a41 phpmyfaq -- Remote PHP Code Injection Vulnerability
396ee517-a607-11d9-ac72-000bdb1444a4 horde -- Horde Page Title Cross-Site Scripting Vulnerability
3987c5d1-47a9-11df-a0d5-0016d32f24fb KDM -- local privilege escalation vulnerability
39953788-6bbb-11d9-8bc9-000a95bc6fae egroupware -- arbitrary file download in JiNN
39988ee8-1918-11dc-b6bd-0016179b2dd5 cups -- Incomplete SSL Negotiation Denial of Service
399f4cd7-4d59-11de-8811-0030843d3802 eggdrop -- denial of service vulnerability
39a25a63-eb5c-11de-b650-00215c6a37bb php -- multiple vulnerabilities
39bd57e6-5d83-11d8-80e3-0020ed76ef5a pine remotely exploitable vulnerabilities
3a408f6f-9c52-11d8-9366-0020ed76ef5a libpng denial-of-service
3a429192-c36a-11e2-97a9-6805ca0b3d42 RT -- multiple vulnerabilities
3a4a3e9c-a1fe-11dd-81be-001c2514716c wordpress -- snoopy "_httpsrequest()" shell command execution vulnerability
3a65d33b-5950-11e2-b66b-00e0814cab4e jenkins -- HTTP access to the server to retrieve the master cryptographic key
3a6960ef-c8a8-11e1-9924-001fd0af1a4c puppet -- multiple vulnerabilities
3a7c5fc4-b50c-11df-977b-ecc31dd8ad06 p5-libwww -- possibility to remote servers to create file with a .(dot) character
3a81017a-8154-11dc-9283-0016179b2dd5 ldapscripts -- Command Line User Credentials Disclosure
3ac80dd2-14df-11dc-bcfc-0016179b2dd5 mplayer -- cddb stack overflow
3b18e237-2f15-11de-9672-0030843d3802 mozilla -- multiple vulnerabilities
3b260179-e464-460d-bf9f-d5cda6204020 racoon -- remote denial-of-service
3b3676be-52e1-11d9-a9e7-0001020eed82 samba -- integer overflow vulnerability
3b4a6982-0b24-11da-bc08-0001020eed82 libgadu -- multiple vulnerabilities
3b7967f1-49e8-11df-83fb-0015587e2cc1 irssi -- multiple vulnerabilities
3b7c7f6c-7102-11d8-873f-0020ed76ef5a wu-ftpd ftpaccess `restricted-uid'/`restricted-gid' directive may be bypassed
3b80104f-e96c-11e2-8bac-00262d5ed8ee chromium -- multiple vulnerabilities
3b86583a-66a7-11e3-868f-0025905a4771 phpmyfaq -- arbitrary PHP code execution vulnerability
3bbbe3aa-fbeb-11e1-8bd8-0022156e8794 freeradius -- arbitrary code execution for TLS-based authentication
3bc5691e-38dd-11da-92f5-020039488e34 libxine -- format string vulnerability
3bf157fa-e1c6-11d9-b875-0001020eed82 sudo -- local race condition vulnerability
3bfc7016-4bcc-11e3-b0cf-00262d5ed8ee chromium -- multiple vulnerabilities
3c1a672e-e508-11de-9f4a-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
3c5579f7-294a-11e4-99f6-00e0814cab4e django -- multiple vulnerabilities
3c7d565a-6c64-11e0-813a-6c626dd55a41 Asterisk -- multiple vulnerabilities
3c8d1e5b-b673-11e1-be25-14dae9ebcf89 asterisk -- remote crash vulnerability
3c90e093-7c6e-11e2-809b-6c626d99876c FreeBSD -- glob(3) related resource exhaustion
3c957a3e-2978-11e1-89b4-001ec9578670 typo3 -- Remote Code Execution
3cb6f059-c69d-11db-9f82-000e0c2e438a bind -- Multiple Denial of Service vulnerabilities
3cb88bb2-67a6-11d8-80e3-0020ed76ef5a mailman XSS in admin script
3cc84400-6576-11d9-a9e7-0001020eed82 mpg123 -- buffer overflow vulnerability
3ce8c7e2-66cf-11dc-b25f-02e0185f8d72 mozilla -- code execution via Quicktime media-link files
3d0e724e-129b-11dc-9f79-0016179b2dd5 phppgadmin -- cross site scripting vulnerability
3d1e9267-073f-11d9-b45d-000c41e2cdad gdk-pixbuf -- image decoding vulnerabilities
3d55b961-9a2e-11e1-a2ef-001fd0af1a4c rubygem-mail -- multiple vulnerabilities
3d8d3548-9d02-11db-a541-000ae42e9b93 drupal -- multiple vulnerabilities
3d95c9a7-7d5c-11e3-a8c1-206a8a720317 ntpd DRDoS / Amplification Attack using ntpdc monlist command
3dd7eb58-80ae-11db-b4ec-000854d03344 gtar -- GNUTYPE_NAMES directory traversal vulnerability
3de342fb-40be-11dc-aeac-02e0185f8d72 FreeBSD -- Predictable query ids in named(8)
3de49331-0dec-422c-93e5-e4719e9869c5 openvpn -- potential denial-of-service on servers in TCP mode
3decc87d-2498-11e2-b0c7-000d601460a4 ruby -- Unintentional file creation caused by inserting an illegal NUL character
3e0072d4-d05b-11d9-9aed-000e0c2e438a net-snmp -- fixproc insecure temporary file creation
3e0507c6-9614-11e3-b3a5-00e0814cab4e jenkins -- multiple vulnerabilities
3e33a0bb-6b2f-11e3-b042-20cf30e32f6d OpenX -- SQL injection vulnerability
3e3c860d-7dae-11d9-a9e7-0001020eed82 emacs -- movemail format string vulnerability
3e4ffe76-e0d4-11d8-9b0a-000347a4fa7d SoX buffer overflows when handling .WAV files
3e8b7f8a-49b0-11e4-b711-6805ca0b3d42 phpMyAdmin -- XSS vulnerabilities
3e9be8c4-8192-11d8-9645-0020ed76ef5a ecartis buffer overflows and input validation bugs
3eb2c100-738b-11e0-89f4-001e90d46635 Postfix -- memory corruption vulnerability
3ebb2dc8-4609-11e1-9f47-00e0815b8da8 Wireshark -- Multiple vulnerabilities
3ebd4cb5-657f-11de-883a-00e0815b8da8 nagios -- Command Injection Vulnerability
3ec8f43b-e8ef-11d9-b875-0001020eed82 kernel -- TCP connection stall denial of service
3efc106e-c451-11dd-a721-0030843d3802 dovecot-managesieve -- Script Name Directory Traversal Vulnerability
3f09ca29-0e48-11e4-b17a-6805ca0b3d42 phpMyAdmin -- multiple XSS vulnerabilities, missing validation
3f1df2f9-cd22-11e0-9bb2-00215c6a37bb PHP -- crypt() returns only the salt for MD5
3f332f16-9b6b-11e2-8fe9-08002798f6ff PostgreSQL -- anonymous remote access data corruption vulnerability
3f4ac724-fa8b-11d9-afcf-0060084a00e5 fetchmail -- denial of service/crash from malicious POP3 server
3f851b22-89fb-11db-a937-003048116330 proftpd -- remote code execution vulnerabilities
3fa2b372-a9f5-11d9-a788-0001020eed82 gaim -- remote DoS on receiving malformed HTML
3fadb7c6-7b0a-11e0-89b4-001ec9578670 mediawiki -- multiple vulnerabilities
3fbf9db2-658b-11d9-abad-000a95bc6fae mozilla -- heap overflow in NNTP handler
3fd040be-4f0b-11e1-9e32-0025900931f8 php -- arbitrary remote code execution vulnerability
3ff95dd3-c291-11df-b0dc-00215c6a37bb django -- cross-site scripting vulnerability
400d9d22-d6c5-11da-a14b-00123ffe8333 trac -- Wiki Macro Script Insertion Vulnerability
402ae710-26a2-11dd-ae05-825f4c35000a peercast -- arbitrary code execution
40544e8c-9f7b-11e0-9bec-6c626dd55a41 Asterisk -- multiple vulnerabilities
40549bbf-43b5-11d9-a9e7-0001020eed82 zip -- long path buffer overflow
406779fd-ca3b-11df-aade-0050568f000c FreeBSD -- SSL protocol flaw
40774927-f6b4-11dd-94d9-0030843d3802 phplist -- local file inclusion vulnerability
40856a51-e1d9-11d9-b875-0001020eed82 opera -- "javascript:" URL cross-site scripting vulnerability
408f6ebf-d152-11da-962f-000b972eb521 cyrus-sasl -- DIGEST-MD5 Pre-Authentication Denial of Service
40a0185f-ec32-11da-be02-000c6ec775d9 drupal -- multiple vulnerabilities
40a3bca2-6809-11d9-a9e7-0001020eed82 cups-base -- HPGL buffer overflow vulnerability
40d5ab37-85f2-11e2-b528-00262d5ed8ee chromium -- multiple vulnerabilities
40fcf20f-8891-11d8-90d1-0020ed76ef5a racoon remote denial of service vulnerability (IKE Generic Payload Header)
4108cc57-54d7-11e2-9483-14dae938ec40 ircd-ratbox and charybdis -- remote DoS vulnerability
411ecb79-f9bc-11e0-a7e6-6c626dd55a41 piwik -- unknown critical vulnerabilities
414e6a41-7204-11e2-8599-001060e06fd4 linux-flashplugin -- multiple vulnerabilities
4158c57e-5d39-11e3-bc1e-6cf0490a8c18 Joomla! -- Core XSS Vulnerabilities
4175c811-f690-4898-87c5-755b3cf1bac6 ntp -- stack-based buffer overflow
41da2ba4-a24e-11db-bd24-000f3dcc6a5d cacti -- Multiple vulnerabilities
4238151d-207a-11d9-bfe2-0090962cff2a mod_ssl -- SSLCipherSuite bypass
4260eacb-26b8-11d9-9289-000c41e2cdad gaim -- multiple buffer overflows
429249d2-67a7-11d8-80e3-0020ed76ef5a mailman XSS in create script
42a2c82a-75b9-11e1-89b4-001ec9578670 quagga -- multiple vulnerabilities
42d42090-9a4d-11e3-b029-08002798f6ff PostgreSQL -- multiple privilege issues
43024078-9b63-11df-8983-001d60d86f38 libmspack -- infinite loop denial of service
432bf98d-9e25-11da-b410-000e0c2e438a kpdf -- heap based buffer overflow
4364e1f1-0f44-11e4-b090-20cf30e32f6d apache24 -- several vulnerabilities
43770b1c-72f6-11da-8c1d-000e0c2e438a nbd-server -- buffer overflow vulnerability
437a68cf-b752-11de-b6eb-00e0815b8da8 php5 -- Multiple security issues
43a7b0a7-f9bc-11d9-b473-00061bc2ad93 PowerDNS -- LDAP backend fails to escape all queries
43cb40b3-c8c2-11da-a672-000e0c2e438a f2c -- insecure temporary files
44224e08-8306-11dc-9283-0016179b2dd5 opera -- multiple vulnerabilities
44449bf7-c69b-11db-9f82-000e0c2e438a gtar -- name mangling symlink vulnerability
4451a4c9-c05e-11dc-982e-001372fd0af2 drupal -- cross site request forgery
445ed958-b0d9-11dd-a55e-00163e000016 faad2 -- heap overflow vulnerability
4465c897-ee5c-11de-b6ef-00215c6a37bb monkey -- improper input validation vulnerability
446dbecb-9edc-11d8-9366-0020ed76ef5a heimdal kadmind remote heap buffer overflow
44c8694a-12f9-11dd-9b26-001c2514716c extman -- password bypass vulnerability
44ccfab0-3564-11e0-8e81-0022190034c0 exim -- local privilege escalation
44d0f8dc-6607-11e3-bb11-0025900931f8 zabbix -- shell command injection vulnerability
44e5f5bd-4d76-11da-bf37-000fb586ba73 pear-PEAR -- PEAR installer arbitrary code execution vulnerability
44e7764c-2614-11da-9e1e-c296ac722cb3 squid -- possible denial of service condition regarding NTLM authentication
44ee8160-c453-11dd-a721-0030843d3802 mgetty+sendfax -- symlink attack via insecure temporary files
44fb0302-9d38-11dc-9114-001c2514716c rubygem-rails -- JSON XSS vulnerability
450b76ee-5068-11db-a5ae-00508d6a62df dokuwiki -- multiple vulnerabilities
45298931-b3bf-11dd-80f8-001cc0377035 gnutls -- X.509 certificate chain validation vulnerability
45500f74-5947-11dc-87c1-000e2e5785ad fetchmail -- denial of service on reject of local warning message
4582948a-9716-11de-83a5-001999392805 opera -- multiple vulnerabilities
4593cb09-4c81-11d9-983e-000c6e8f12ef konqueror -- Password Disclosure for SMB Shares
45b75152-ae5f-11d9-a788-0001020eed82 mozilla -- javascript "lambda" replace exposes memory contents
45f102cd-4456-11e0-9580-4061862b8c22 mozilla -- multiple vulnerabilities
462e2d6c-8017-11e1-a571-bcaec565249c freetype -- multiple vulnerabilities
4645b98c-e46e-11da-9ae7-00123fcc6e5c vnc -- authentication bypass vulnerability
4671cdc9-7c6d-11e2-809b-6c626d99876c FreeBSD -- BIND remote DoS with deliberately crafted DNS64 query
46aeba13-64a1-11e1-bc16-0023ae8e59f0 openx -- undisclosed security issue
46b922a8-c69c-11db-9f82-000e0c2e438a FreeBSD -- Jail rc.d script privilege escalation
46bd747b-5b84-11e2-b06d-00262d5ed8ee chromium -- multiple vulnerabilities
46f7b598-a781-11da-906a-fde5cdde365e bugzilla -- multiple vulnerabilities
4769914e-b844-11de-b159-0030843d3802 phpmyadmin -- XSS and SQL injection vulnerabilities
4775c807-8f30-11dd-821f-001cc0377035 mysql -- command line client input validation vulnerability
479efd57-516e-11e3-9b62-000c292e4fd8 samba -- Private key in key.pem world readable
47b4e713-6513-11e3-868f-0025905a4771 PHP5 -- memory corruption in openssl_x509_parse()
47bdabcf-3cf9-11da-baa2-0004614cc33d gallery2 -- file disclosure vulnerability
47f13540-c4cb-4971-8dc6-28d0dabfd9cd nut -- upsd can be remotely crashed
48103b0a-ca3f-11df-aade-0050568f000c FreeBSD -- ntpd mode 7 denial of service
48108fb0-751c-4cbb-8f33-09239ead4b55 NSS -- RSA Signature Forgery
4865d189-cd62-11e2-ae11-00262d5ed8ee chromium -- multiple vulnerabilities
4867ae85-608d-11db-8faf-000c6ec775d9 opera -- URL parsing heap overflow vulnerability
486aff57-9ecd-11da-b410-000e0c2e438a postgresql -- character conversion and tsearch2 vulnerabilities
4872d9a7-4128-11dc-bdb0-0016179b2dd5 joomla -- multiple vulnerabilities
48a59c96-9c6e-11d9-a040-000a95bc6fae wine -- information disclosure due to insecure temporary file handling
48aab1d0-4252-11de-b67a-0030843d3802 libwmf -- integer overflow vulnerability
48bcb4b2-e708-11e1-a59d-000d601460a4 typo3 -- Multiple vulernabilities in TYPO3 Core
48e14d86-42f1-11de-ad22-000e35248ad7 libxine -- multiple vulnerabilities
4913886c-e875-11da-b9f4-00123ffe8333 MySQL -- Information Disclosure and Buffer Overflow Vulnerabilities
492f8896-70fa-11d8-873f-0020ed76ef5a Apache 2 mod_ssl denial-of-service
49314321-7fd4-11e1-9582-001b2134ef46 mutt-devel -- failure to check SMTP TLS server certificate
495b46fd-a30f-11e1-82c9-d0df9acfd7e5 foswiki -- Script Insertion Vulnerability via unchecked user registration fields
498a8731-7cfc-11dc-96e6-0012f06707f0 phpmyadmin -- cross-site scripting vulnerability
49a6026a-52a3-11e2-a289-1c4bd681f0cf otrs -- XSS vulnerability in Internet Explorer
49ad1bf8-5d7e-11d8-80e3-0020ed76ef5a ChiTeX/ChiLaTeX unsafe set-user-id root
49e8f2ee-8147-11de-a994-0030843d3802 mozilla -- multiple vulnerabilities
4a0b334d-8d8d-11d9-afa0-003048705d5a phpbb -- Insuffient check against HTML code in usercp_register.php
4a114331-0d24-11e4-8dd2-5453ed2e2b49 kdelibs4 -- KMail/KIO POP3 SSL Man-in-the-middle Flaw
4a1ca8a4-bd82-11e2-b7a0-d43d7e0c7c02 mozilla -- multiple vulnerabilities
4a21ce2c-bb13-11df-8e32-000f20797ede mozilla -- multiple vulnerabilities
4a338d17-412d-11dc-bdb0-0016179b2dd5 fsplib -- multiple vulnerabilities
4a3482da-3624-11e0-b995-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
4a4e9f88-491c-11e4-ae2c-c80aa9043978 bash -- out-of-bounds memory access in parser
4a638895-41b7-11de-b1cc-00219b0fc4d8 mod_perl -- cross-site scripting
4a8a98ab-f745-11e1-8bd8-0022156e8794 moinmoin -- cross-site scripting via RST parser
4a99d61c-f23a-11dd-9f55-0030843d3802 perl -- Directory Permissions Race Condition
4aab7bcd-b294-11dc-a6f0-00a0cce0781e gallery2 -- multiple vulnerabilities
4ab29e12-e787-11df-adfa-00e0815b8da8 Mailman -- cross-site scripting in web interface
4ab413ea-66ce-11e0-bf05-d445f3aa24f0 krb5 -- MITKRB5-SA-2011-002, KDC vulnerable to hang when using LDAP back end
4ae68e7c-dda4-11e0-a906-00215c6a37bb roundcube -- XSS vulnerability
4aec9d58-ce7b-11d8-858d-000d610a3b12 Format string vulnerability in SSLtelnet
4afacca1-eb9d-11d9-a8bd-000cf18bbe54 phpbb -- remote PHP code execution vulnerability
4b09378e-addb-11dd-a578-0030843d3802 vlc -- cue processing stack overflow
4b172278-3f46-11de-becb-001cc0377035 pango -- integer overflow
4b448a96-ff73-11e2-b28d-080027ef73ec PuTTY -- Four security holes in versions before 0.63
4b673ae7-5f9a-11dc-84dd-000102cc8983 lighttpd -- FastCGI header overrun in mod_fastcgi
4b68d917-e705-11dd-afcd-00e0815b8da8 Teamspeak Server -- Directory Traversal Vulnerability
4b738d54-2427-11e2-9817-c8600054b392 RT -- Multiple Vulnerabilities
4b79538b-a450-11e2-9898-001060e06fd4 FreeBSD -- Multiple Denial of Service vulnerabilities with named(8)
4b7dbfab-4c6b-11e1-bc16-0023ae8e59f0 apache -- multiple vulnerabilities
4b8b748e-2a24-11e2-bb44-003067b2972c linux-flashplugin -- multiple vulnerabilities
4bd33bc5-0cd6-11e0-bfa4-001676740879 tor -- remote crash and potential remote code execution
4bfcd857-c628-11da-b2fb-000e0c2e438a kaffeine -- buffer overflow vulnerability
4c005a5e-2541-4d95-80a0-00c76919aa66 fd_set -- bitmap index overflow in multiple applications
4c017345-1d89-11e0-bbee-0014a5e3cda6 MoinMoin -- cross-site scripting vulnerabilities
4c1ac2dd-c788-11e1-be25-14dae9ebcf89 asterisk -- multiple vulnerabilities
4c53f007-f2ed-11e1-a215-14dae9ebcf89 asterisk -- multiple vulnerabilities
4ca26574-2a2c-11e2-99c7-00a0d181e71d tomcat -- Denial of Service
4cb9c513-03ef-11dc-a51d-0019b95d4f14 png -- DoS crash vulnerability
4ccbd40d-03f7-11e0-bf50-001a926c7637 krb5 -- client impersonation vulnerability
4ccee784-a721-11e0-89b4-001ec9578670 BIND -- Remote DoS with certain RPZ configurations
4cdfe875-e8d6-11e1-bea0-002354ed89bc Wireshark -- Multiple vulnerabilities
4ce3c20b-124b-11de-a964-0030843d3802 phppgadmin -- directory traversal with register_globals enabled
4d087b35-0990-11e3-a9f4-bcaec565249c gstreamer-ffmpeg -- Multiple vulnerabilities in bundled libav
4d1d2f6d-ec94-11e1-8bd8-0022156e8794 jabberd -- domain spoofing in server dialback protocol
4d49f4ba-071f-11d9-b45d-000c41e2cdad apache -- ap_resolve_env buffer overflow
4d4caee0-b939-11dd-a578-0030843d3802 streamripper -- multiple buffer overflows
4d6076fe-ee7a-11de-9cd0-001a926c7637 fuser -- missing user's privileges check
4d64fc61-3878-11e2-a4eb-00262d5ed8ee chromium -- multiple vulnerabilities
4d837296-cc28-11d8-a54c-02e0185c0b53 GNATS local privilege elevation
4d87d357-202c-11e3-be06-000c29ee3065 FreeBSD -- Insufficient credential checks in network ioctl(2)
4db1669c-8589-11db-ac4f-02e081235dab gnupg -- remotely controllable function pointer
4dd575b8-8f82-11e3-bb11-0025905a4771 phpmyfaq -- multiple vulnerabilities
4ddc78dc-300a-11e1-a2aa-0016ce01e285 krb5-appl -- telnetd code execution vulnerability
4e1f4abc-6837-11e3-9cda-3c970e169bc2 cURL library -- cert name check ignore with GnuTLS
4e210d72-1c5c-11da-92ce-0048543d60ce squid -- Denial Of Service Vulnerability in sslConnectTimeout
4e23644c-cb93-4f83-9e20-5bc07ad9b39f mod_pagespeed -- critical cross-site scripting (XSS) vulnerability
4e306850-811f-11de-8a67-000c29a67389 silc-client -- Format string vulnerability
4e4bd2c2-6bd5-11d9-9e1e-c296ac722cb3 squid -- HTTP response splitting cache pollution attack
4e8344a3-ca52-11de-8ee8-00215c6a37bb gd -- '_gdGetColors' remote buffer overflow vulnerability
4e95eb4e-b737-11e3-87cd-f0def10dca57 Icinga -- buffer overflow in classic web interface
4e9e410b-d462-11e2-8d57-080027019be0 dbus -- local dos
4f838b74-50a1-11de-b01f-001c2514716c dokuwiki -- Local File Inclusion with register_globals on
4f99e2ef-f725-11e1-8bd8-0022156e8794 moinmoin -- wrong processing of group membership
4fb43b2f-46a9-11dd-9d38-00163e000016 FreeType 2 -- Multiple Vulnerabilities
4fb45a1c-c5d0-11e2-8400-001b216147b0 couchdb -- DOM based Cross-Site Scripting via Futon UI
4fb5d2cd-4c77-11df-83fb-0015587e2cc1 png -- libpng decompression denial of service
501ee07a-5640-11e0-985a-001b2134ef46 linux-flashplugin -- remote code execution vulnerability
50383bde-b25b-11de-8c83-02e0185f8d72 FreeBSD -- Devfs / VFS NULL pointer race condition
5039ae61-2c9f-11db-8401-000ae42e9b93 globus -- Multiple tmpfile races
50457509-d05e-11d9-9aed-000e0c2e438a phpSysInfo -- cross site scripting vulnerability
5053420c-4935-11df-83fb-0015587e2cc1 mahara -- sql injection vulnerability
50744596-368f-11d9-a9e7-0001020eed82 proxytunnel -- format string vulnerability
50d233d9-374b-46ce-922d-4e6b3f777bef poppler -- Poppler Multiple Vulnerabilities
510b630e-c43b-11e0-916c-00e0815b8da8 isc-dhcp-server -- server halt upon processing certain packets
512d1301-49b9-11e4-ae2c-c80aa9043978 bash -- remote code execution
5140dc69-b65e-11e1-9425-001b21614864 ImageMagick -- multiple vulnerabilities
51436b4c-1250-11dd-bab7-0016179b2dd5 postgresql -- multiple vulnerabilities
5179d85c-8683-11de-91b9-0022157515b2 fetchmail -- improper SSL certificate subject verification
5192e7ca-7d4f-11d9-a9e7-0001020eed82 mod_python -- information leakage vulnerability
5198ef84-4fdc-11df-83fb-0015587e2cc1 cacti -- SQL injection and command execution vulnerabilities
51b51d4a-7c0f-11dc-9e47-0011d861d5e2 phpmyadmin -- cross-site scripting vulnerability
51d1d428-42f0-11de-ad22-000e35248ad7 libxine -- multiple vulnerabilities
51f84e28-444e-11e2-8306-00262d5ed8ee chromium -- multiple vulnerabilities
5238ac45-9d8c-11db-858b-0060084a00e5 fetchmail -- TLS enforcement problem/MITM attack/password exposure
523fad14-eb9d-11d9-a8bd-000cf18bbe54 pear-XML_RPC -- arbitrary remote code execution
52ba7713-9d42-11da-8c1d-000e0c2e438a pf -- IP fragment handling panic
52bbc7e8-f13c-11e3-bc09-bcaec565249c dbus -- local DoS
533d20e7-f71f-11df-9ae1-000bcdf0a03b proftpd -- remote code execution vulnerability
5360a659-131c-11d9-bc4a-000c41e2cdad mozilla -- hostname spoofing bug
53802164-3f7e-11dd-90ea-0019666436c2 ruby -- multiple integer and buffer overflow vulnerabilities
53a0ddef-0208-11e2-8afa-0024e830109b dns/bind9* -- Several vulnerabilities
53bde960-356b-11e0-8e81-0022190034c0 mupdf -- Remote System Access
53e531a7-e559-11e0-b481-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
53e711ed-8972-11d9-9ff8-00306e01dda2 phpbb -- privilege elevation and path disclosure
54075e39-04ac-11e1-a94e-bcaec565249c freetype -- Some type 1 fonts handling vulnerabilities
5415f1b3-f33d-11e1-8bd8-0022156e8794 wireshark -- denial of service in DRDA dissector
54237182-9635-4a8b-92d7-33bfaeed84cd ruby-gems -- Algorithmic Complexity Vulnerability
5486669e-ea9f-11de-bd9c-00215c6a37bb tptest -- pwd Remote Stack Buffer Overflow
549787c1-8916-11e2-8549-68b599b52a02 libpurple -- multiple vulnerabilities
549a2771-49cc-11e4-ae2c-c80aa9043978 jenkins -- remote execution, privilege escalation, XSS, password exposure, ACL hole, DoS
54bed676-87ce-11e2-b528-00262d5ed8ee chromium -- WebKit vulnerability
54f72962-c7ba-11dd-a721-0030843d3802 phpmyadmin -- cross-site request forgery vulnerability
55041d37-ff62-11d9-a9a5-000ae4641456 jabberd -- 3 buffer overflows
553224e7-4325-11d9-a3d5-000c6e8f12ef jabberd -- remote buffer overflow vulnerability
5536c8e4-36b3-11e2-a633-902b343deec9 FreeBSD -- Linux compatibility layer input validation error
553ec4ed-38d6-11e0-94b1-000c29ba66d2 tomcat -- Cross-site scripting vulnerability
55587adb-b49d-11e1-8df1-0004aca374af mantis -- multiple vulnerabilities
555ac165-2bee-11dd-bbdc-00e0815b8da8 spamdyke -- open relay
55616fda-a2d0-11dd-a9f9-0030843d3802 openx -- sql injection vulnerability
559e00b7-6a4d-11e2-b6b0-10bf48230856 wordpress -- multiple vulnerabilities
55a528e8-9787-11e0-b24a-001b2134ef46 linux-flashplugin -- remote code execution vulnerability
55b498e2-e56c-11e1-bbd5-001c25e46b1d Several vulnerabilities found in IcedTea-Web
562a3fdf-16d6-11d9-bc4a-000c41e2cdad php -- vulnerability in RFC 1867 file upload processing
562cf6c4-b9f1-11dc-a302-000102cc8983 linux-flashplugin -- multiple vulnerabilities
5631ae98-be9e-11e3-b5e3-c80aa9043978 OpenSSL -- Remote Information Disclosure
5678da43-ea99-11db-a802-000fea2763ce lighttpd -- DOS when access files with mtime 0
56971fa6-641c-11d9-a097-000854d03344 xshisen -- local buffer overflows
56ba8728-f987-11de-b28d-00215c6a37bb PEAR -- Net_Ping and Net_Traceroute remote arbitrary command injection
56cfe192-329f-11df-abb2-000f20797ede mozilla -- multiple vulnerabilities
56f4b3a6-c82c-11e0-a498-00215c6a37bb Samba -- cross site scripting and request forgery vulnerabilities
5709d244-4873-11e3-8a46-000d601460a4 OpenSSH -- Memory corruption in sshd
5729b8ed-5d75-11d8-80e3-0020ed76ef5a rsync buffer overflow in server mode
5752a0df-60c5-4876-a872-f12f9a02fa05 gallery -- cross-site scripting
57573136-920e-11e0-bdc9-001b2134ef46 linux-flashplugin -- cross-site scripting vulnerability
57652765-18aa-11e2-8382-00a0d181e71d xlockmore -- local exploit
5789a92e-5d7f-11d8-80e3-0020ed76ef5a pine remotely exploitable buffer overflow in newmail.c
578f6322-c450-11dd-a721-0030843d3802 habari -- Cross-Site Scripting Vulnerability
5796858d-db0b-11dd-aa56-000bcdf0a03b FreeBSD -- arc4random(9) predictable sequence vulnerability
57a0242d-8c4e-11da-8ddf-000ae42e9b93 sge -- local root exploit in bundled rsh executable
57a700f9-12c0-11e2-9f86-001d923933b6 dns/bind9* -- crash on deliberately constructed combination of records
57ae52f7-b9cc-11db-bf0f-0013720b182d samba -- format string bug in afsacl.so VFS plugin
57c705d6-12ae-11dd-bab7-0016179b2dd5 png -- unknown chunk processing uninitialized memory access
57df803e-af34-11e2-8d62-6cf0490a8c18 Joomla! -- XXS and DDoS vulnerabilities
57f1a624-6197-11e1-b98c-bcaec565249c libxml2 -- heap buffer overflow
580cc46b-bb1e-11e3-b144-2c4138874f7d LibYAML input sanitization errors
58247a96-01c8-11da-bc08-0001020eed82 phpmyadmin -- cross site scripting vulnerability
58253655-d82c-11e1-907c-20cf30e32f6d bugzilla -- multiple vulnerabilities
584c506d-0e98-11e0-b59b-0050569b2d21 redmine -- multiple vulnerabilities
58997463-e012-11dd-a765-0030843d3802 verlihub -- insecure temporary file usage and arbitrary command execution
589d8053-0b03-11dd-b4ef-00e07dc4ec84 clamav -- Multiple Vulnerabilities
58a3c266-db01-11dd-ae30-001cc0377035 php5-gd -- uninitialized memory information disclosure vulnerability
58c15292-7b61-11e2-95da-001e8c1a8a0e nss-pam-ldapd -- file descriptor buffer overflow
58fc2752-5f74-11d9-a9e7-0001020eed82 pcal -- buffer overflow vulnerabilities
592815da-9eed-11da-b410-000e0c2e438a mantis -- "view_filters_page.php" cross site scripting vulnerability
594ad3c5-a39b-11da-926c-0800209adf0e SSH.COM SFTP server -- format string vulnerability
594eb447-e398-11d9-a8bd-000cf18bbe54 ruby -- arbitrary command execution on XMLRPC server
597e2bee-68ea-11d9-a9e7-0001020eed82 ImageMagick -- PSD handler heap overflow vulnerability
59ada6e5-676a-11da-99f6-00123ffe8333 phpmyadmin -- XSS vulnerabilities
59b68b1e-9c78-11e1-b5e0-000c299b62e1 php -- multiple vulnerabilities
59e7163c-cf84-11e2-907b-0025905a4770 php5 -- Heap based buffer overflow in quoted_printable_encode
59e72db2-cae6-11e3-8420-00e0814cab4e django -- multiple vulnerabilities
59e7af2d-8db7-11de-883b-001e3300a30d pidgin -- MSN overflow parsing SLP messages
5a021595-fba9-11dd-86f3-0030843d3802 pycrypto -- ARC2 module buffer overflow
5a39a22e-5478-11db-8f1a-000a48049292 mono -- "System.CodeDom.Compiler" Insecure Temporary Creation
5a5422fd-7e1a-11d9-a9e7-0001020eed82 powerdns -- DoS vulnerability
5a7d4110-0b7a-11e1-846b-00235409fd3e libxml -- Stack consumption vulnerability
5a945904-73b1-11db-91d2-0002a5c2f4ef unzoo -- Directory Traversal Vulnerability
5aaa257e-772d-11e3-a65a-3c970e169bc2 openssl -- multiple vulnerabilities
5ab9fb2a-23a5-11e0-a835-0003ba02bf30 asterisk -- Exploitable Stack Buffer Overflow
5abfee2d-5d82-11d8-80e3-0020ed76ef5a pine remote denial-of-service attack
5ac53801-ec2e-11e3-9cf3-3c970e169bc2 OpenSSL -- multiple vulnerabilities
5acf4638-7e2c-11e3-9fba-00262d5ed8ee chromium -- multiple vulnerabilities
5ad3e437-e527-4514-b9ed-280b2ca1a8c9 openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server
5af51ae9-3acd-11e2-a4eb-00262d5ed8ee chromium -- multiple vulnerabilities
5b47b70d-8ba9-11db-81d5-00123ffe8333 dbus -- match_rule_equal() Weakness
5b47c279-8cb5-11dc-8878-0016179b2dd5 perl -- regular expressions unicode data buffer overflow
5b8f9a02-ec93-11d8-b913-000c41e2cdad gaim remotely exploitable vulnerabilities in MSN component
5bae2ab4-0820-11e2-be5f-00262d5ed8ee chromium -- multiple vulnerabilities
5bd6811f-1c75-11e3-ba72-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
5bf1a715-cc57-440f-b0a5-6406961c54a7 squid -- denial-of-service vulnerabilities
5c34664f-2c2b-11e3-87c2-00215af774f0 xinetd -- ignores user and group directives for TCPMUX services
5c554c0f-c69a-11db-9f82-000e0c2e438a FreeBSD -- Kernel memory disclosure in firewire(4)
5c5f19ce-43af-11e1-89b4-001ec9578670 OpenSSL -- DTLS Denial of Service
5c7bb4dd-6a56-11d9-97ec-000c6e8f12ef konversation -- shell script command injection
5c9a2769-5ade-11db-a5ae-00508d6a62df google-earth -- heap overflow in the KML engine
5ccb1c14-e357-11dd-a765-0030843d3802 mplayer -- vulnerability in STR files processor
5d36ef32-a9cf-11d8-9c6d-0020ed76ef5a subversion date parsing vulnerability
5d374b01-c3ee-11e0-8aa5-485d60cb5385 freetype2 -- execute arbitrary code or cause denial of service
5d425189-7a03-11d9-a9e7-0001020eed82 postgresql -- privilege escalation vulnerability
5d433534-f41c-402e-ade5-e0a2259a7cb6 curl -- cURL/libcURL Location: Redirect URLs Security Bypass
5d51d245-00ca-11da-bc08-0001020eed82 ethereal -- multiple protocol dissectors vulnerabilities
5d5ed535-3653-11df-9edc-000f20797ede firefox -- WOFF heap corruption due to integer overflow
5d72701a-f601-11d9-bcd1-02061b08fc24 firefox & mozilla -- multiple vulnerabilities
5d85976a-9011-11e1-b5e0-000c299b62e1 net-snmp -- Remote DoS
5def3175-f3f9-4476-ba40-b46627cc638c PHP5 -- Integer overflow in Calendar module
5e647ca3-2aea-11e2-b745-001fd0af1a4c ruby -- Hash-flooding DoS vulnerability for ruby 1.9
5e7f58c3-b3f8-4258-aeb8-795e5e940ff8 mplayer heap overflow in http requests
5e92e8a2-5d7b-11d8-80e3-0020ed76ef5a icecast 1.x multiple vulnerabilities
5ebfe901-a3cb-11d9-b248-000854d03344 hashcash -- format string vulnerability
5ed2f96b-33b7-4863-8c6b-540d22344424 imap-uw -- University of Washington IMAP c-client Remote Format String Vulnerability
5ef12755-1c6c-11dd-851d-0016d325a0ed swfdec -- exposure of sensitive information
5f003a08-ba3c-11d9-837d-000e0c2e438a sharutils -- unshar insecure temporary file creation
5f030587-e39a-11de-881e-001aa0166822 expat2 -- Parser crash with specially formatted UTF-8 sequences
5f29c2e4-9f6a-11d8-abbc-00e08110b673 exim buffer overflow when verify = header_syntax is used
5f2a0c40-1322-11db-bd23-000475abc56f zope -- information disclosure vulnerability
5f326d75-1db9-11e2-bc8f-d0df9acfd7e5 django -- multiple vulnerabilities
5fde5c30-0f4e-11da-bc01-000e0c2e438a tor -- diffie-hellman handshake flaw
5fe7e27a-64cb-11d9-9e1e-c296ac722cb3 squid -- denial of service with forged WCCP messages
5ff40cb4-8b92-11e2-bdb6-001060e06fd4 linux-flashplugin -- multiple vulnerabilities
603fe36d-ec9d-11d8-b913-000c41e2cdad kdelibs insecure temporary file handling
607d2108-a0e4-423a-bf78-846f2a8f01b0 puppet -- Multiple Vulnerabilities
608ed765-c700-11e3-848c-20cf30e32f6d bugzilla -- Cross-Site Request Forgery
609c790e-ce0a-11dd-a721-0030843d3802 drupal -- multiple vulnerabilities
60bbe12c-e2c1-11e1-a8ca-00262d5ed8ee chromium -- multiple vulnerabilities
60bfa396-c702-11e3-848c-20cf30e32f6d bugzilla -- Social Engineering
60de13d5-95f0-11e1-806a-001143cd36d8 php -- vulnerability in certain CGI-based setups
60e1792b-c380-11dc-821a-000bcdc1757a geeklog xss vulnerability
60e26a40-3b25-11da-9484-00123ffe8333 openssl -- potential SSL 2.0 rollback
60eb344e-6eb1-11e1-8ad7-00e0815b8da8 OpenSSL -- CMS and S/MIME Bleichenbacher attack
60f81af3-7690-11e1-9423-00235a5f2c9a raptor/raptor2 -- XXE in RDF/XML File Interpretation
60f8fe7b-3cfb-11da-baa2-0004614cc33d WebCalendar -- remote file inclusion vulnerability
6107efb9-aae3-11da-aea1-000854d03344 gtar -- invalid headers buffer overflow
610bc692-a2ad-11dc-900c-000bcdc1757a GNU finger vulnerability
610de647-af8d-11e3-a25b-b4b52fce4ce8 mozilla -- multiple vulnerabilities
6111ecb8-b20d-11da-b2fb-000e0c2e438a nfs -- remote denial of service
6129fdc7-6462-456d-a3ef-8fc3fbf44d16 openvpn -- arbitrary code execution on client through malicious or compromised server
612a34ec-81dc-11da-a043-0002a5c3d308 clamav -- possible heap overflow in the UPX code
61349f77-c620-11da-b2fb-000e0c2e438a thunderbird -- javascript execution
613e45d1-6154-11e3-9b62-000c292e4fd8 samba -- multiple vulnerabilities
61480a9a-22b2-11d9-814e-0001020eed82 cabextract -- insecure directory handling
61534682-b8f4-11da-8e62-000e0c33c2dc xorg-server -- privilege escalation
616cf823-f48b-11d8-9837-000c41e2cdad courier-imap -- format string vulnerability in debug mode
617959ce-a5f6-11e1-a284-0023ae8e59f0 haproxy -- buffer overflow
617a4021-8bf0-11dc-bffa-0016179b2dd5 perdition -- str_vwrite format string vulnerability
6192ae3d-9595-11d9-a9e0-0001020eed82 phpmyadmin -- increased privilege vulnerability
619ef337-949a-11d9-b813-00d05964249f mysql-server -- multiple remote vulnerabilities
61b07d71-ce0e-11dd-a721-0030843d3802 mediawiki -- multiple vulnerabilities
620cf713-5a99-11e3-878d-20cf30e32f6d monitorix -- serious bug in the built-in HTTP server
62239968-2f2a-11d9-a9e7-0001020eed82 gd -- integer overflow
622bc638-be27-11dd-a578-0030843d3802 wordpress -- header rss feed script insertion vulnerability
622e14b1-b40c-11e2-8441-00e0814cab4e jenkins -- multiple vulnerabilities
624fe633-9006-11d9-a22c-0001020eed82 libexif -- buffer overflow vulnerability
62b8f253-12d9-11dc-a35c-001485ab073e typo3 -- email header injection
62e0fbe5-5798-11de-bb78-001cc0377035 ruby -- BigDecimal denial of service vulnerability
62f36dfd-ff56-11e1-8821-001b2134ef46 vlc -- arbitrary code execution in Real RTSP and MMS support
630c8c08-880f-11e2-807f-d43d7e0c7c02 mozilla -- Use-after-free in HTML Editor
6318b303-3507-11e4-b76c-0011d823eebd trafficserver -- unspecified vulnerability
632c98be-aad2-4af2-849f-41a6862afd6a p5-Imager -- possibly exploitable buffer overflow
63347ee7-6841-11dc-82b6-02e0185f8d72 wordpress -- remote sql injection vulnerability
633716fa-1f8f-11dd-b143-0211d880e350 vorbis-tools -- Speex header processing vulnerability
6355efdb-4d4d-11de-8811-0030843d3802 libsndfile -- multiple vulnerabilities
635bf5f4-26b7-11d9-9289-000c41e2cdad gaim -- malicious smiley themes
63bd4bad-dffe-11d9-b875-0001020eed82 gzip -- directory traversal and permission race vulnerabilities
63fe4189-9f97-11da-ac32-0001020eed82 gnupg -- false positive signature verification
641859e8-eca1-11d8-b913-000c41e2cdad Mutiple browser frame injection vulnerability
641e8609-cab5-11d9-9aed-000e0c2e438a ppxp -- local root exploit
6431c4db-deb4-11de-9078-0030843d3802 opera -- multiple vulnerabilities
64691c49-4b22-11e0-a226-00e0815b8da8 mailman -- XSS vulnerability
64bf6234-520d-11db-8f1a-000a48049292 gnutls -- RSA Signature Forgery Vulnerability
64c8cc2a-59b1-11d9-8a99-000c6e8f12ef libxine -- buffer-overflow vulnerability in aiff support
64f24a1e-66cf-11e0-9deb-f345f3aa24f0 krb5 -- MITKRB5-SA-2011-001, kpropd denial of service
64f3872b-e05d-11e3-9dd4-00262d5ed8ee chromium -- multiple vulnerabilities
64f8b72d-9c4e-11e1-9c94-000bcdf0a03b libpurple -- Invalid memory dereference in the XMPP protocol plug-in by processing serie of specially-crafted file transfer requests
651996e0-fe07-11d9-8329-000e0c2e438a apache -- http request smuggling
653606e9-f6ac-11dd-94d9-0030843d3802 typo3 -- multiple vulnerabilities
65539c54-2517-11e2-b9d6-20cf30e32f6d apache22 -- several vulnerabilities
655ee1ec-511b-11dd-80ba-000bcdf0a03b FreeBSD -- DNS cache poisoning
6596bb80-d026-11d9-9aed-000e0c2e438a shtool -- insecure temporary file creation
65a17a3f-ed6e-11d8-aff1-00061bc2ad93 Arbitrary code execution via a format string vulnerability in jftpgw
65a8f773-4a37-11db-a4cc-000a48049292 zope -- restructuredText "csv_table" Information Disclosure
65b25acc-e63b-11e1-b81c-001b77d09812 rssh -- arbitrary command execution
65c8ecf9-2adb-11db-a6e2-000e0c2e438a postgresql -- multiple vulnerabilities
65d16342-3ec8-11e0-9df7-001c42d23634 asterisk -- Exploitable Stack and Heap Array Overflows
65e99f52-1c5f-11d9-bc4a-000c41e2cdad squid -- SNMP module denial-of-service vulnerability
6601127c-9e09-11e1-b5e0-000c299b62e1 socat -- Heap-based buffer overflow
661bd031-c37d-11e2-addb-60a44c524f57 otrs -- XSS vulnerability
66657bd5-ac92-11dd-b541-001f3b19d541 emacs -- run-python vulnerability
666b8c9e-8212-11db-851e-0016179b2dd5 tdiary -- cross site scripting vulnerability
66759ce6-7530-11df-9c33-000c29ba66d2 moodle -- multiple vulnerabilities
6693bad2-ca50-11de-8ee8-00215c6a37bb typo3 -- multiple vulnerabilities in TYPO3 Core
66a770b4-e008-11dd-a765-0030843d3802 mysql -- empty bit-string literal denial of service
66dbb2ee-99b8-45b2-bb3e-640caea67a60 leafnode -- fetchnews denial-of-service triggered by transmission abort/timeout
670d732a-cdd4-11e3-aac2-0022fb6fcf92 mohawk -- multiple vulnerabilities
6733e1bf-125f-11de-a964-0030843d3802 ffmpeg -- 4xm processing memory corruption vulnerability
6738977b-e9a5-11da-b9f4-00123ffe8333 coppermine -- "file" Local File Inclusion Vulnerability
673aec6f-1cae-11da-bc01-000e0c2e438a htdig -- cross site scripting vulnerability
67516177-88ec-11e1-9a10-0023ae8e59f0 typo -- Cross-Site Scripting
67710833-1626-11d9-bc4a-000c41e2cdad Boundary checking errors in syscons
6779e82f-b60b-11da-913d-000ae42e9b93 drupal -- multiple vulnerabilities
67a1c3ae-ad69-11df-9be6-0015587e2cc1 corkscrew -- buffer overflow vulnerability
67b514c3-ba8f-11df-8f6e-000c29a67389 sudo -- Flaw in Runas group matching
67bd39ba-12b5-11dd-bab7-0016179b2dd5 firefox -- javascript garbage collector vulnerability
67c05283-5d62-11d8-80e3-0020ed76ef5a Buffer overflow in Mutt 1.4
67dbe99f-0f09-11db-94f8-00e029485e38 shoutcast -- cross-site scripting, information exposure
6821a2db-4ab7-11da-932d-00055d790c25 PHP -- multiple vulnerabilities
68222076-010b-11da-bc08-0001020eed82 tiff -- buffer overflow vulnerability
68233cba-7774-11d8-89ed-0020ed76ef5a OpenSSL ChangeCipherSpec denial-of-service vulnerability
6887828f-0229-11e0-b84d-00262d5ed8ee chromium -- multiple vulnerabilities
688e73a2-e514-11e3-a52a-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
689c2bf7-0701-11e3-9a25-002590860428 GnuPG and Libgcrypt -- side-channel attack vulnerability
68ac6266-25c3-11e1-b63a-00262d5ed8ee chromium -- multiple vulnerabilities
68bda678-caab-11de-a97e-be89dfd1042e p5-HTML-Parser -- denial of service
68c1f75b-8824-11e2-9996-c48508086173 perl -- denial of service via algorithmic complexity attack on hashing routines
68c7187a-abd2-11df-9be6-0015587e2cc1 slim -- insecure PATH assignment
69048656-2187-11e4-802c-20cf30e32f6d serf -- SSL Certificate Null Byte Poisoning
69098c5c-fc4b-11e2-8ad0-00262d5ed8ee chromium -- multiple vulnerabilities
691ed622-e499-11d9-a8bd-000cf18bbe54 tor -- information disclosure
692ab645-bf5d-11de-849b-00151797c2d4 squidGuard -- multiple vulnerabilities
694da5b4-5877-11df-8d80-0015587e2cc1 mediawiki -- authenticated CSRF vulnerability
696053c6-0f50-11df-a628-001517351c22 bugzilla -- information leak
69a20ce4-dfee-11dd-a765-0030843d3802 imap-uw -- imap c-client buffer overflow
69bfc852-9bd0-11e2-a7be-8c705af55518 FreeBSD -- OpenSSL multiple vulnerabilities
6a164d84-2f7f-11d9-a9e7-0001020eed82 postgresql-contrib -- insecure temporary file creation
6a245f31-4254-11de-b67a-0030843d3802 libwmf -- embedded GD library Use-After-Free vulnerability
6a308e8e-b1b4-11da-b2fb-000e0c2e438a openssh -- remote denial of service
6a31cbe3-1695-11dc-a197-0011098b2f36 wordpress -- unmoderated comments disclosure
6a33477e-3a9c-11d9-84ad-000c6e8f12ef phpMyAdmin -- cross-site scripting vulnerabilities
6a3c3e5c-66cb-11e0-a116-c535f3aa24f0 krb5 -- MITKRB5-SA-2011-004, kadmind invalid pointer free() [CVE-2011-0285]
6a4bfe75-692a-11e0-bce7-001eecdd401a VLC -- Heap corruption in MP4 demultiplexer
6a5174bd-c580-11da-9110-00123ffe8333 clamav -- Multiple Vulnerabilities
6a523dba-eeab-11dd-ab4f-0030843d3802 moinmoin -- multiple cross site scripting vulnerabilities
6a806960-3016-44ed-8575-8614a7cb57c7 rails -- multiple vulnerabilities
6ad18fe5-f469-11e1-920d-20cf30e32f6d bugzilla -- multiple vulnerabilities
6ad309d9-fb03-11e3-bebd-000c2980a9f3 samba -- multiple vulnerabilities
6adca5e9-95d2-11e2-8549-68b599b52a02 firebird -- Remote Stack Buffer Overflow
6ae7cef2-a6ae-11dc-95e6-000c29c5647f jetty -- multiple vulnerabilities
6afa87d3-764b-11d9-b0e7-0000e249a0a2 python -- SimpleXMLRPCServer.py allows unrestricted traversal
6b0215ae-8f26-11da-8c1d-000e0c2e438a cpio -- multiple vulnerabilities
6b3b1b97-207c-11e2-a03f-c8600054b392 mozilla -- multiple vulnerabilities
6b4b0b3f-8127-11d9-a9e7-0001020eed82 postgresql -- multiple buffer overflows in PL/PgSQL parser
6b575419-14cf-11df-a628-001517351c22 otrs -- SQL injection
6b8cadce-db0b-11dd-aa56-000bcdf0a03b FreeBSD -- IPv6 Neighbor Discovery Protocol routing vulnerability
6b97436c-ce1e-11e2-9cb2-6805ca0b3d42 phpMyAdmin -- XSS due to unescaped HTML output in Create View page
6bb6188c-17b2-11de-ae4d-0030843d3802 amarok -- multiple vulnerabilities
6c083cf8-4830-11e4-ae2c-c80aa9043978 fish -- local privilege escalation and remote code execution
6c2d4f29-af3e-11d9-837d-000e0c2e438a gld -- format string and buffer overflow vulnerabilities
6c4db192-cb23-11df-9c1b-0011098ad87f horde-imp -- XSS vulnerability
6c7661ff-7912-11d8-9645-0020ed76ef5a uudeview buffer overflows
6c7d9a35-2608-11e1-89b4-001ec9578670 krb5 -- KDC null pointer dereference in TGS handling
6c8ad3e8-0a30-11e1-9580-4061862b8c22 mozilla -- multiple vulnerabilities
6d08fa63-83bf-11e3-bdba-080027ef73ec HTMLDOC -- buffer overflow issues when reading AFM files and parsing page sizes
6d0bf320-ca39-11e2-9673-001e8c75030d devel/subversion -- contrib hook-scripts can allow arbitrary code execution
6d1761d2-0b23-11da-bc08-0001020eed82 gaim -- AIM/ICQ away message buffer overflow
6d18fe19-ee67-11d9-8310-0001020eed82 clamav -- MS-Expand file handling DoS vulnerability
6d21a287-fce0-11e0-a828-00235a5f2c9a kdelibs4, rekonq -- input validation failure
6d329b64-6bbb-11e1-9166-001e4f0fb9b1 portaudit -- auditfile remote code execution
6d4e4759-7b67-11dd-80ba-000bcdf0a03b FreeBSD -- amd64 swapgs local privilege escalation
6d68618a-7199-11db-a2ad-000c6ec775d9 bugzilla -- multiple vulnerabilities
6d78202e-e2f9-11da-8674-00123ffe8333 phpldapadmin -- Cross-Site Scripting and Script Insertion vulnerabilities
6d85dc62-f2bd-11dd-9f55-0030843d3802 drupal -- multiple vulnerabilities
6d87c2e9-c64d-11e2-9c22-50465d9ff992 socat -- FD leak
6d9a28f8-8152-11da-817c-0001020eed82 milter-bogom -- headerless message crash
6da7344b-128a-11db-b25f-00e00c69a70d drupal -- multiple vulnerabilities
6dd5e45c-f084-11e1-8d0f-406186f3d89d coppermine -- Multiple vulnerabilites
6e099997-25d8-11dc-878b-000c29c5647f gd -- multiple vulnerabilities
6e27f3b6-189b-11da-b6be-0090274e8dbb fswiki -- command injection vulnerability
6e33f4ab-efed-11d9-8310-0001020eed82 bugzilla -- multiple vulnerabilities
6e3b12e2-6ce3-11da-b90c-000e0c2e438a mantis -- "view_filters_page.php" cross-site scripting vulnerability
6e5a9afd-12d3-11e2-b47d-c8600054b392 mozilla -- multiple vulnerabilities
6e6a6b8a-2fde-11d9-b3a2-0050fc56d258 apache mod_include buffer overflow vulnerability
6e740881-0cae-11d9-8a8a-000c41e2cdad mozilla -- automated file upload
6e7ad1d7-4e27-11e1-8e12-90e6ba8a36a2 mathopd -- directory traversal vulnerability
6e87b696-ca3e-11df-aade-0050568f000c FreeBSD -- Inappropriate directory permissions in freebsd-update(8)
6e8f54af-a07d-11de-a649-000c2955660f ikiwiki -- insufficient blacklisting in teximg plugin
6eb1dc51-1244-11dd-bab7-0016179b2dd5 phpmyadmin -- Username/Password Session File Information Disclosure
6eb580d7-a29c-11dc-8919-001c2514716c Squid -- Denial of Service Vulnerability
6ecd0b42-ce77-11dc-89b1-000e35248ad7 libxine -- buffer overflow vulnerability
6f358f5a-c7ea-11de-a9f3-0030843d3802 KDE -- multiple vulnerabilities
6f736456-c060-11dc-982e-001372fd0af2 drupal -- cross site scripting (utf8)
6f955451-ba54-11d8-b88c-000d610a3b12 Buffer overflow in Squid NTLM authentication helper
6fb521b0-d388-11e3-a790-000c2980a9f3 strongswan -- Remote Authentication Bypass
6fd02439-5d70-11d8-80e3-0020ed76ef5a Several remotely exploitable buffer overflows in gaim
6ff570cb-b418-11e2-b279-20cf30e32f6d strongSwan -- ECDSA signature verification issue
700d43b4-a42a-11d8-9c6d-0020ed76ef5a Cyrus IMSPd multiple vulnerabilities
70372cda-6771-11de-883a-00e0815b8da8 nfsen -- remote command execution
705e003a-7f36-11d8-9645-0020ed76ef5a squid ACL bypass due to URL decoding bug
706c9eef-a077-11dd-b413-001372fd0af2 drupal -- multiple vulnerabilities
708c65a5-7c58-11de-a994-0030843d3802 mono -- XML signature HMAC truncation spoofing
70ae62b0-16b0-11dc-b803-0016179b2dd5 c-ares -- DNS Cache Poisoning Vulnerability
70b62f5e-9e2e-11d9-a256-0001020eed82 clamav -- zip handling DoS vulnerability
70b72a52-9e54-11e3-babe-60a44c524f57 otrs -- XSS Issue
70c59485-ee5a-11d9-8310-0001020eed82 acroread -- buffer overflow vulnerability
70f5b3c6-80f0-11d8-9645-0020ed76ef5a Critical SQL injection in phpBB
70fc13d9-4ab4-11da-932d-00055d790c25 skype -- multiple buffer overflow vulnerabilities
710cd5d5-35cb-11e3-85f9-00262d5ed8ee chromium -- multiple vulnerabilities
71273c4d-a6ec-11df-8a8d-0008743bf21a opera -- multiple vulnerabilities
7128fb45-2633-11dc-94da-0016179b2dd5 vlc -- format string vulnerability and integer overflow
7132c842-58e2-11df-8d80-0015587e2cc1 spamass-milter -- remote command execution vulnerability
713c3913-8c2b-11d9-b58c-0001020eed82 ImageMagick -- format string vulnerability
714c1406-e4cf-11de-883a-003048590f9e rt -- Session fixation vulnerability
71597e3e-f6b8-11dd-94d9-0030843d3802 websvn -- multiple vulnerabilities
71612099-1e93-11e0-a587-001b77d09812 subversion -- multiple DoS
7184f92e-8bb8-11e1-8d7b-003067b2972c OpenSSL -- integer conversions result in memory corruption
71ad81da-4414-11e4-a33e-3c970e169bc2 bash -- remote code execution vulnerability
71d903fc-602d-11dc-898c-001921ab2fa4 php -- multiple vulnerabilities
7229d900-88af-11d8-90d1-0020ed76ef5a mksnap_ffs clears file system options
724e6f93-8f2a-11dd-821f-001cc0377035 mplayer -- multiple integer overflows
7257b26f-0597-11da-86bc-000e0c2e438a devfs -- ruleset bypass
725ab25a-987b-11e1-a2ef-001fd0af1a4c p5-Config-IniFiles -- unsafe temporary file creation
726dd9bd-8f25-11da-8c1d-000e0c2e438a ee -- temporary file privilege escalation
7280c3f6-a99a-11e2-8cef-6805ca0b3d42 phpMyAdmin -- XSS due to unescaped HTML output in GIS visualisation page
7289187b-66a5-11da-99f6-00123ffe8333 trac -- search module SQL injection vulnerability
7289214f-7c55-11e1-ab3b-000bcdf0a03b libpurple -- Remote DoS via an MSN OIM message that lacks UTF-8 encoding
72999d57-d6f6-11db-961b-005056847b26 WebCalendar -- "noSet" variable overwrite vulnerability
72bf9e21-03df-11e3-bd8d-080027ef73ec polarssl -- denial of service vulnerability
72cba7b0-13cd-11de-a964-0030843d3802 netatalk -- arbitrary command execution in papd daemon
72cdf2ab-5b87-11dc-812d-0011098b2f36 lsh -- multiple vulnerabilities
72d8df84-ea6d-11da-8a53-00123ffe8333 cscope -- buffer overflow vulnerabilities
72da8af6-7c75-11d9-8cc5-000854d03344 enscript -- multiple vulnerabilities
72f21372-55e4-11db-a5ae-00508d6a62df torrentflux -- User-Agent XSS Vulnerability
72f35727-ce83-11e2-be04-005056a37f68 dns/bind9* -- A recursive resolver can be crashed by a query for a malformed zone
730db824-e216-11d8-9b0a-000347a4fa7d Mozilla / Firefox user interface spoofing vulnerability
73634294-0fa7-11e0-becc-0022156e8794 php -- open_basedir bypass
736e55bc-39bb-11de-a493-001b77d09812 cups -- remote code execution and DNS rebinding
738f8f9e-d661-11dd-a765-0030843d3802 mysql -- MyISAM table privileges security bypass vulnerability for symlinked paths
739329c8-d8f0-11dc-ac2f-0016d325a0ed ikiwiki -- javascript insertion via uris
739b94a4-838b-11de-938e-003048590f9e joomla15 -- com_mailto Timeout Issue
739bb51d-7e82-11d8-9645-0020ed76ef5a racoon security association deletion vulnerability
73ea0706-9c57-11d8-9366-0020ed76ef5a rsync path traversal issue
73ec1008-72f0-11dd-874b-0030843d3802 opera -- multiple vulnerabilities
73efb1b7-07ec-11e2-a391-000c29033c32 eperl -- Remote code execution
73f53712-d028-11db-8c07-0211d85f11fb ktorrent -- multiple vulnerabilities
741c3957-1d69-11d9-a804-0050fc56d258 icecast -- HTTP header overflow
741f8841-9c6b-11d9-9dbe-000a95bc6fae firefox -- arbitrary code execution from sidebar panel
742eb9e4-e3cb-4f5a-b94e-0e9a39420600 ruby-gems -- Algorithmic Complexity Vulnerability
7453c85d-7830-11dc-b4c8-0016179b2dd5 nagios-plugins -- Long Location Header Buffer Overflow Vulnerability
746ca1ac-21ec-11d9-9289-000c41e2cdad ifmail -- unsafe set-user-ID application
748aa89f-d529-11e1-82ab-001fd0af1a4c rubygem-activerecord -- multiple vulnerabilities
749b5587-2da1-11e3-b1a9-b499baab0cbe gnupg -- possible infinite recursion in the compressed packet parser
74a9541d-5d6c-11d8-80e3-0020ed76ef5a clamav remote denial-of-service
74b7403c-c4d5-11da-b2fb-000e0c2e438a mediawiki -- cross site scripting vulnerability
74bf1594-8493-11dd-bb64-0030843d3802 phpmyadmin -- Code execution vulnerability
74c86a29-81ef-11d9-a9e7-0001020eed82 bidwatcher -- format string vulnerability
74d06b67-d2cf-11d8-b479-02e0185c0b53 multiple vulnerabilities in ethereal
74ff10f6-520f-11db-8f1a-000a48049292 cscope -- Buffer Overflow Vulnerabilities
751823d4-f189-11de-9344-00248c9b4be7 drupal -- multiple cross-site scripting
75231c63-f6a2-499d-8e27-787773bda284 bugzilla -- multiple vulnerabilities
752ce039-5242-11df-9139-00242b513d7c vlc -- unintended code execution with specially crafted data
753f8185-5ba9-42a4-be02-3f55ee580093 phpMyAdmin -- XSS attack in database search
7557a2b1-5d63-11d8-80e3-0020ed76ef5a Apache-SSL optional client certificate vulnerability
755fa519-80a9-11dd-8de5-0030843d3802 neon -- NULL pointer dereference in Digest domain support
756db070-b9d4-11d9-ae81-000ae42e9b93 coppermine -- IP spoofing and XSS vulnerability
75770425-67a2-11d8-80e3-0020ed76ef5a SQL injection vulnerability in phpnuke
7580f00e-280c-11e0-b7c8-00215c6a37bb dokuwiki -- multiple privilege escalation vulnerabilities
759b8dfe-3972-11d9-a9e7-0001020eed82 Overflow error in fetch
75c24c1d-b688-11dd-88fd-001c2514716c dovecot -- ACL plugin bypass vulnerabilities
75e26236-ce9e-11e0-b26a-00215c6a37bb phpMyAdmin -- multiple XSS vulnerabilities
75f2382e-b586-11dd-95f9-00e0815b8da8 syslog-ng2 -- startup directory leakage in the chroot environment
762d1c6d-0722-11d9-b45d-000c41e2cdad apache -- apr_uri_parse IPv6 address handling vulnerability
76301302-1d59-11d9-814e-0001020eed82 xerces-c2 -- Attribute blowup denial-of-service
764344fb-8214-11e2-9273-902b343deec9 sudo -- Authentication bypass when clock is reset
76562594-1f19-11db-b7d4-0008743bf21a ruby -- multiple vulnerabilities
768cfe70-ca40-11df-aade-0050568f000c FreeBSD -- OPIE off-by-one stack overflow
76904dce-ccf3-11d8-babb-000854d03344 Pavuk HTTP Location header overflow
76adaab0-e4e3-11d9-b875-0001020eed82 ethereal -- multiple protocol dissectors vulnerabilities
76b597e4-e9c6-11df-9e10-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
76e0b133-6bfd-11d9-a5df-00065be4b5b6 newsfetch -- server response buffer overflow vulnerability
77420ebb-0cf4-11d9-8a8a-000c41e2cdad mysql -- heap buffer overflow with prepared statements
777d7b9e-ab02-11e3-841e-60a44c524f57 wemux -- read-only can be bypassed
779a2d55-8ba8-11db-81d5-00123ffe8333 evince -- Buffer Overflow Vulnerability
77b784bb-3dc6-11e4-b191-f0def16c5c1b nginx -- inject commands into SSL session vulnerability
77b9f9bc-7fdf-11df-8a8d-0008743bf21a opera -- Data URIs can be used to allow cross-site scripting
77bb0541-c1aa-11e3-a5ac-001b21614864 dbus-glib -- privledge escalation
77c14729-dc5e-11de-92ae-02e0184b8d35 libtool -- Library Search Path Privilege Escalation Issue
77cceaef-e9a4-11da-b9f4-00123ffe8333 coppermine -- File Inclusion Vulnerabilities
77e2e631-e742-11e3-9a25-5404a6a6412c mumble -- multiple vulnerabilities
78348ea2-ec91-11d8-b913-000c41e2cdad acroread uudecoder input validation error
7850a238-680a-11d9-a9e7-0001020eed82 cups-lpr -- lppasswd multiple vulnerabilities
787d21b9-ca38-11e2-9673-001e8c75030d devel/subversion -- fsfs repositories can be corrupted by newline characters in filenames
7884d56f-f7a1-11d8-9837-000c41e2cdad gnomevfs -- unsafe URI handling
78ad2525-9d0c-11db-a5f6-000c6ec775d9 opera -- multiple vulnerabilities
78c25ed7-f3f9-11e0-8b5c-b482fe3f522d OpenTTD -- Buffer overflows in savegame loading
78c39232-a345-11e1-9d81-d0df9acfd7e5 sympa -- Multiple Security Bypass Vulnerabilities
78cc8a46-3e56-11e1-89b4-001ec9578670 OpenSSL -- multiple vulnerabilities
78f456fd-9c87-11dd-a55e-00163e000016 linux-flashplugin -- multiple vulnerabilities
78f5606b-f9d1-11dd-b79c-0030843d3802 tor -- multiple vulnerabilites
79217c9b-e1d9-11d9-b875-0001020eed82 opera -- XMLHttpRequest security bypass
792bc222-c5d7-11db-9f82-000e0c2e438a libarchive -- Infinite loop in corrupt archives handling in libarchive
79356040-5da4-11e3-829e-00262d5ed8ee chromium -- multiple vulnerabilities
7943e521-f648-11e2-8607-3c970e169bc2 bind -- denial of service vulnerability
79630c0c-8dcc-45d0-9908-4087fe1d618c squirrelmail -- XSS and remote code injection vulnerabilities
79789daa-8af8-4e21-a47f-e8a645752bdb ruby -- Object taint bypassing in DL and Fiddle in Ruby
79818ef9-2d10-11e2-9160-00262d5ed8ee typo3 -- Multiple vulnerabilities in TYPO3 Core
79b616d0-66d1-11dc-b25f-02e0185f8d72 kdm -- passwordless login vulnerability
79c1154d-d5a5-11da-8098-00123ffe8333 cacti -- ADOdb "server.php" Insecure Test Script Security Issue
7a09a8df-ca41-11df-aade-0050568f000c FreeBSD -- Lost mbuf flag resulting in data corruption
7a1ab8d4-35c1-11de-9672-0030843d3802 drupal -- cross site scripting
7a282e49-95b6-11e2-8433-0800273fe665 dns/bind9* -- Malicious Regex Can Cause Memory Exhaustion
7a4f2aca-9d40-11da-8c1d-000e0c2e438a FreeBSD -- Local kernel memory disclosure
7a7c5853-10a3-11dd-8eb8-00163e000016 libxine -- array index vulnerability
7a921e9e-68b1-11d9-9e1e-c296ac722cb3 squid -- no sanity check of usernames in squid_ldap_auth
7a9d5dfe-c507-11d8-8898-000d6111a684 isc-dhcp3-server buffer overflow in logging mechanism
7af2fb85-8584-11e0-96b7-00300582f9fc ViewVC -- user-reachable override of cvsdb row limit
7b0208ff-3f65-4e16-8d4d-48fd9851f085 leafnode fetchnews denial-of-service triggered by missing header
7b55f5c2-c58b-11da-9110-00123ffe8333 phpmyadmin -- 'set_theme' Cross-Site Scripting
7b81fc47-239f-11d9-814e-0001020eed82 apache2 -- SSL remote DoS
7ba65bfd-2a40-11e1-b96e-00215af774f0 unbound -- denial of service vulnerabilities from nonstandard redirection and denial of existence
7bb127c1-a5aa-11db-9ddc-0011098b2f36 joomla -- multiple remote vulnerabilities
7be92050-a450-11e2-9898-001060e06fd4 libxml -- Integer overflow
7c0fecd6-f42f-11e1-b17b-000c2977ec30 mediawiki -- multiple vulnerabilities
7c188c55-0cb0-11d9-8a8a-000c41e2cdad mozilla -- NULL bytes in FTP URLs
7c492ea2-3566-11e0-8e81-0022190034c0 plone -- Remote Security Bypass
7c5bd5b8-d652-11dd-a765-0030843d3802 mplayer -- twinvq processing buffer overflow vulnerability
7c75d48c-429b-11db-afae-000c6ec775d9 linux-flashplugin7 -- arbitrary code execution vulnerabilities
7c769c89-53c2-11e1-8e52-00163e22ef61 glpi -- remote attack via crafted POST request
7c920bb7-4b5f-11e1-9f47-00e0815b8da8 sudo -- format string vulnerability
7ca2a709-103b-11dc-8e82-00001cd613f9 findutils -- GNU locate heap buffer overrun
7ccd4def-c1be-11e3-9d09-000c2980a9f3 OpenSSL -- Local Information Disclosure
7cf25a0c-d031-11e3-947b-00262d5ed8ee chromium -- multiple vulnerabilities
7d2336c2-4607-11e1-9f47-00e0815b8da8 spamdyke -- Buffer Overflow Vulnerabilities
7d239578-7ff2-11dd-8de5-0030843d3802 horde -- multiple vulnerabilities
7d2aac52-9c6b-11d9-99a7-000a95bc6fae mozilla -- heap buffer overflow in GIF image processing
7d52081f-2795-11da-bc01-000e0c2e438a squirrelmail -- _$POST variable handling allows for various attacks
7dbb7197-7b68-11dd-80ba-000bcdf0a03b FreeBSD -- nmount(2) local arbitrary code execution
7dfed67b-20aa-11e3-b8d8-0025905a4771 mozilla -- multiple vulnerabilities
7e4e5c53-a56c-11e0-b180-00216aa06fc2 phpmyadmin -- multiple vulnerabilities
7e580822-8cd8-11d9-8c81-000a95bc6fae postnuke -- cross-site scripting (XSS) vulnerabilities
7e61a839-b714-11e3-8195-001966155bea file -- out-of-bounds access in search rules with offsets from input file
7e69f00d-632a-11e0-9f3a-001d092480a4 isc-dhcp-client -- dhclient does not strip or escape shell meta-characters
7e97b288-c7ca-11d9-9e1e-c296ac722cb3 squid -- DNS lookup spoofing vulnerability
7edac52a-66cd-11e0-9398-5d45f3aa24f0 krb5 -- MITKRB5-SA-2011-003, KDC vulnerable to double-free when PKINIT enabled
7f13607b-6948-11d9-8937-00065be4b5b6 newspost -- server response buffer overflow vulnerability
7f3fdef7-51d2-11da-8e93-0010dc4afb40 p5-Mail-SpamAssassin -- long message header denial of service
7f448dc1-82ca-11e1-b393-20cf30e32f6d bugzilla Cross-Site Request Forgery
7f5ccb1d-439b-11e1-bc16-0023ae8e59f0 tomcat -- Denial of Service
7f6108d2-cea8-11e0-9d58-0800279895ea apache -- Range header DoS vulnerability
7f6dd1bd-7d99-11d9-a9e7-0001020eed82 ngircd -- buffer overflow vulnerability
7f8cecea-f199-11da-8422-00123ffe8333 MySQL -- SQL-injection security vulnerability
7fadc049-2ba0-11dc-9377-0016179b2dd5 wireshark -- Multiple problems
7fb9e739-0e6d-11e1-87cd-00235a5f2c9a kdeutils4 -- Directory traversal vulnerability
7fbfe159-3438-11d9-a9e7-0001020eed82 squirrelmail -- cross site scripting vulnerability
7fcf1727-be71-11db-b2ec-000c6ec775d9 php -- multiple vulnerabilities
7fe5b84a-78eb-11e2-8441-00e0814cab4e jenkins -- multiple vulnerabilities
800e8bd5-3acb-11dd-8842-001302a18722 xorg -- multiple vulnerabilities
8012a79d-5d21-11db-bb8d-00123ffe8333 clamav -- CHM unpacker and PE rebuilding vulnerabilities
8015600f-2c80-11e0-9cc1-00163e5bf4f9 maradns -- denial of service when resolving a long DNS hostname
805603a1-3e7a-11df-a5a1-0050568452ac dojo -- cross-site scripting and other vulnerabilities
80771b89-f57b-11e2-bf21-b499baab0cbe gnupg -- side channel attack on RSA secret keys
8091fcea-f35e-11d8-81b0-000347a4fa7d a2ps -- insecure command line argument handling
8092b820-1d6f-11dc-a0b2-001921ab2fa4 p5-Mail-SpamAssassin -- local user symlink-attack DoS vulnerability
80aa98e0-97b4-11de-b946-0030843d3802 dnsmasq -- TFTP server remote code injection vulnerability
80af2677-d6c0-11e2-8f5e-001966155bea tor -- guard discovery
80b6d6cc-c970-11df-bb18-0015587e2cc1 openx -- remote code execution vulnerability
80f13884-4d4c-11de-8811-0030843d3802 slim -- local disclosure of X authority magic cookie
810a5197-e0d9-11dc-891a-02061b08fc24 mozilla -- multiple vulnerabilities
810df820-3664-11e1-8fe3-00215c6a37bb WordPress -- cross site scripting vulnerability
81313647-2d03-11d8-9355-0020ed76ef5a ElGamal sign+encrypt keys created by GnuPG can be compromised
815dbcf9-a2d6-11e3-8088-002590860428 file -- denial of service
816fdd8b-3d14-11d9-8818-008088034841 Cyrus IMAPd -- IMAPMAGICPLUS preauthentification overflow
81826d12-317a-11e2-9186-406186f3d89d weechat -- Arbitrary shell command execution via scripts
81d9dc0c-1988-11df-8e66-0019996bc1f7 squid -- Denial of Service vulnerability in HTCP
81da673e-dfe1-11e2-9389-08002798f6ff apache-xml-security-c -- heap overflow during XPointer evaluation
81f127a8-0038-11da-86bc-000e0c2e438a vim -- vulnerabilities in modeline handling: glob, expand
81f1fdc2-7ec7-11e3-a6c6-00163e1ed244 virtualbox-ose -- local vulnerability
81f866ad-41a4-11e3-a4af-0025905a4771 mozilla -- multiple vulnerabilities
81fc1076-1286-11e4-bebd-000c2980a9f3 tomcat -- multiple vulnerabilities
821afaa2-9e9a-11dc-a7e3-0016360406fa liveMedia -- DoS vulnerability
827bc2b7-95ed-11df-9160-00e0815b8da8 git -- buffer overflow vulnerability
82a41084-6ce7-11da-b90c-000e0c2e438a mantis -- "t_core_path" file inclusion vulnerability
82b55df8-4d5a-11de-8811-0030843d3802 openssl -- denial of service in DTLS implementation
82cfd919-8213-11e2-9273-902b343deec9 sudo -- Potential bypass of tty_tickets constraints
83119e27-5d7c-11d8-80e3-0020ed76ef5a nap allows arbitrary file access
831a6a66-79fa-11d9-a9e7-0001020eed82 ethereal -- multiple protocol dissectors vulnerabilities
832e9d75-5bfc-11d9-a9e7-0001020eed82 kdelibs3 -- konqueror FTP command injection vulnerability
8338a20f-9573-11d8-9366-0020ed76ef5a xchat remotely exploitable buffer overflow (Socks5)
83421018-b3ef-11da-a32d-000c6ec775d9 linux-flashplugin -- arbitrary code execution vulnerability
834591a9-c82f-11e0-897d-6c626dd55a41 mozilla -- multiple vulnerabilities
835256b8-46ed-11d9-8ce0-00065be4b5b6 mysql -- mysql_real_connect buffer overflow vulnerability
83574d5a-f828-11dd-9fdf-0050568452ac codeigniter -- arbitrary script execution in the new Form Validation class
83725c91-7c7e-11de-9672-00e0815b8da8 BIND -- Dynamic update message remote DoS
8375a73f-01bf-11da-bc08-0001020eed82 gnupg -- OpenPGP symmetric encryption vulnerability
837b9fb2-0595-11da-86bc-000e0c2e438a zlib -- buffer overflow vulnerability
83a418cc-2182-11e4-802c-20cf30e32f6d subversion -- several vulnerabilities
83d7d149-b965-11de-a515-0022156e8794 Enhanced cTorrent -- stack-based overflow
83f9e943-e664-11e1-a66d-080027ef73ec fetchmail -- two vulnerabilities in NTLM authentication
84065569-7fb4-11e2-9c5a-000d601460a4 otrs -- XSS vulnerability could lead to remote code execution
84203724-296b-11e4-bebd-000c2980a9f3 file -- buffer overruns and missing buffer size tests
84237895-8f39-11d8-8b29-0020ed76ef5a neon format string vulnerabilities
842bafdd-be2f-11dd-a578-0030843d3802 openoffice -- arbitrary code execution vulnerabilities
843a4641-9816-11e2-9c51-080027019be0 libxml2 -- cpu consumption Dos
8441957c-f9b4-11e0-a78a-bcaec565249c Xorg server -- two vulnerabilities in X server lock handling code
84479a62-ca5f-11d9-b772-000c29b00e99 fswiki -- XSS problem in file upload form
844cf3f5-9259-4b3e-ac9e-13ca17333ed7 ruby -- DoS vulnerability in REXML
84630f4a-cd8c-11da-b7b9-000c6ec775d9 mozilla -- multiple vulnerabilities
8471bb85-6fb0-11d8-873f-0020ed76ef5a GNU Anubis buffer overflows and format string vulnerabilities
847ade05-6717-11d8-b321-000a95bc6fae libxml2 stack buffer overflow in URI parsing
848539dc-0458-11df-8dd7-002170daae37 dokuwiki -- multiple vulnerabilities
84ab58cf-e4ac-11d8-9b0a-000347a4fa7d gnutls -- certificate chain verification DoS
84d3fbb2-e607-11db-8a32-000c76189c4c mcweject -- exploitable buffer overflow
85069fb6-e15b-11d9-83cf-0010dc5df42d razor-agents -- denial of service vulnerability
8514b6e7-6f0f-11dd-b3db-001c2514716c joomla -- flaw in the reset token validation
855cd9fa-c452-11da-8bff-000ae42e9b93 pubcookie-login-server -- cross site scripting vulnerability
856a6f84-8b30-11de-8062-00e0815b8da8 GnuTLS -- improper SSL certificate verification
8581189c-bd5f-11de-8709-0017a4cccfc6 Xpdf -- Multiple Vulnerabilities
85b0bbc8-a7a5-11dd-8283-001c2514716c phpmyadmin -- Cross-Site Scripting Vulnerability
85d76f02-5380-11d9-a9e7-0001020eed82 mplayer -- multiple vulnerabilities
85e19dff-e606-11d8-9b0a-000347a4fa7d ripMIME -- decoding bug allowing content filter bypass
85edfb6a-43a5-11d9-a9e7-0001020eed82 sudoscript -- signal delivery vulnerability
85f33a8d-492f-11e2-aa75-003067c2616f opera -- execution of arbitrary code
863f95d3-3df1-11dc-b3d3-0016179b2dd5 mutt -- buffer overflow vulnerability
86526ba4-53c8-11db-8f1a-000a48049292 phpbb -- NULL byte injection vulnerability
8665ebb9-2237-11da-978e-0001020eed82 firefox & mozilla -- buffer overflow vulnerability
8675efd5-e22c-11e1-a808-002354ed89bc sudosh -- buffer overflow
8685d412-8468-11df-8d45-001d7d9eb79a kvirc -- multiple vulnerabilities
8688d5cd-328c-11da-a263-0001020eed82 cfengine -- arbitrary file overwriting vulnerability
86a4d810-1884-11dd-a914-0016179b2dd5 mt-daapd -- integer overflow
86a98b57-fb8e-11d8-9343-000a95bc6fae krb5 -- double-free vulnerabilities
86ada694-8b30-11de-b9d0-000c6e274733 memcached -- memcached stats maps Information Disclosure Weakness
86b8b655-4d1a-11df-83fb-0015587e2cc1 krb5 -- KDC double free vulnerability
86baa0d4-c997-11e0-8a8e-00151735203a OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system
86c05550-12c1-11dd-bab7-0016179b2dd5 mksh -- TTY attachment privilege escalation
86cc5c6f-d2b4-11da-a672-000e0c2e438a crossfire-server -- denial of service and remote code execution vulnerability
87106b67-be13-11dd-a578-0030843d3802 cups -- potential buffer overflow in PNG reading code
87261557-a450-11e2-9898-001060e06fd4 FreeBSD -- Network ACL mishandling in mountd(8)
872623af-39ec-11dc-b8cc-000fea449b8a tomcat -- multiple vulnerabilities
872ae5be-29c0-11de-bdeb-0030843d3802 ziproxy -- multiple vulnerability
873a6542-5b8d-11da-b96e-000fb586ba73 horde -- Cross site scripting vulnerabilities in MIME viewers
877e918e-5362-11d9-96d4-00065be4b5b6 mpg123 -- playlist processing buffer overflow vulnerability
87917d6f-ba76-11de-bac2-001a4d563a0f django -- denial-of-service attack
879b0242-c5b6-11e0-abd1-0017f22d6707 dtc -- multiple vulnerabilities
87cc48fd-5fdd-11d8-80e3-0020ed76ef5a mnGoSearch buffer overflow in UdmDocToTextBuf()
8816bf3a-7929-11df-bcce-0018f3e2eb82 tiff -- Multiple integer overflows
88188a8c-eff6-11d9-8310-0001020eed82 phppgadmin -- "formLanguage" local file inclusion vulnerability
88260dfe-3d21-11dc-b3d3-0016179b2dd5 phpsysinfo -- url Cross-Site Scripting
882ef43b-901f-11d9-a22c-0001020eed82 phpmyadmin -- arbitrary file include and XSS vulnerabilities
884fced7-7f1c-11dd-a66a-0019666436c2 wordpress -- remote privilege escalation
888a0262-f0d9-11e3-ba0c-b4b52fce4ce8 mozilla -- multiple vulnerabilities
889061af-c427-11d9-ac59-02061b08fc24 gaim -- remote crash on some protocols
88ff90f2-6e43-11d9-8c87-000a95bc6fae mod_dosevasive -- insecure temporary file creation
8950ac62-1d30-11dd-9388-0211060005df qemu -- "drive_init()" Disk Format Security Bypass
89709e58-d497-11e3-a3d5-5453ed2e2b49 qt4-xml -- XML Entity Expansion Denial of Service
89db3b31-a4c3-11e3-978f-f0def16c5c1b nginx -- SPDY memory corruption
89ff45e3-1a57-11e4-bebd-000c2980a9f3 samba -- remote code execution
8a34d9e6-c662-11df-b2e1-001b2134ef46 linux-flashplugin -- remote code execution
8a3ece40-3315-11da-a263-0001020eed82 picasm -- buffer overflow vulnerability
8a5770b4-54b5-11db-a5ae-00508d6a62df mambo -- multiple SQL injection vulnerabilities
8a835235-ae84-11dc-a5f9-001a4d49522b wireshark -- multiple vulnerabilities
8ad1c404-3e78-11df-a5a1-0050568452ac Zend Framework -- security issues in bundled Dojo library
8aff07eb-1dbd-11e4-b6ba-3c970e169bc2 OpenSSL -- multiple vulnerabilities
8b0e94cc-b5cd-11d9-a788-0001020eed82 gaim -- AIM/ICQ remote denial of service vulnerability
8b491182-f842-11dd-94d9-0030843d3802 firefox -- multiple vulnerabilities
8b683bea-d49c-11da-a672-000e0c2e438a asterisk -- denial of service vulnerability, local system access
8b97d289-d8cf-11e2-a1f5-60a44c524f57 otrs -- information disclosure
8b986a05-4dbe-11e0-8b9a-02e0184b8d35 avahi -- denial of service
8be2e304-cce6-11da-a3b1-00123ffe8333 mailman -- Private Archive Script Cross-Site Scripting
8c1da77d-d3e9-11d9-8ffb-00061bc2ad93 xloadimage -- buffer overflow in FACES image handling
8c2ea875-9499-11df-8e32-000f20797ede mozilla -- multiple vulnerabilities
8c33b299-163b-11d9-ac1b-000d614f7fad getmail -- symlink vulnerability during maildir delivery
8c451386-dff3-11dd-a765-0030843d3802 mysql -- privilege escalation and overwrite of the system table information
8c5205b4-11a0-11de-a964-0030843d3802 opera -- multiple vulnerabilities
8c5ad0cf-ba37-11d9-837d-000e0c2e438a rsnapshot -- local privilege escalation
8c773d7f-6cbb-11e2-b242-c8600054b392 mysql/mariadb/percona server -- multiple vulnerabilities
8c83145d-2c95-11e1-89b4-001ec9578670 phpMyAdmin -- Multiple XSS
8c8fa44d-ad15-11e2-8cea-6805ca0b3d42 phpMyAdmin -- Multiple security vulnerabilities
8c93e997-30e0-11e0-b300-485d605f4717 wordpress -- SQL injection vulnerability
8c9b48d1-3715-11e3-a624-00262d8b701d dropbear -- exposure of sensitive information, DoS
8cbf4d65-af9a-11df-89b8-00151735203a bugzilla -- information disclosure, denial of service
8cfb6f42-d2b0-11da-a672-000e0c2e438a p5-DBI -- insecure temporary file creation vulnerability
8d03202c-6559-11e2-a389-00262d5ed8ee chromium -- multiple vulnerabilities
8d04cfbd-344d-11e0-8669-0025222482c5 mediawiki -- multiple vulnerabilities
8d075001-a9ce-11d8-9c6d-0020ed76ef5a neon date parsing vulnerability
8d10038e-515c-11df-83fb-0015587e2cc1 joomla -- multiple vulnerabilities
8d2c0ce1-08b6-11dd-94b4-0016d325a0ed ikiwiki -- cross site request forging
8d4ae57d-d2ab-11da-a672-000e0c2e438a xine -- multiple remote string vulnerabilities
8d823883-0ca9-11d9-8a8a-000c41e2cdad mozilla -- built-in CA certificates may be overridden
8dbf7894-a9a8-11d9-a788-0001020eed82 squid -- DoS on failed PUT/POST requests vulnerability
8dd9722c-8e97-11dc-b8f6-001c2514716c cups -- off-by-one buffer overflow
8defa0f9-ee8a-11e1-8bd8-0022156e8794 squidclamav -- Denial of Service
8e01ab5b-0949-11dc-8163-000e0c2e438a FreeBSD -- heap overflow in file(1)
8e02441d-d39c-11db-a6da-0003476f14d3 sql-ledger -- security bypass vulnerability
8e0e86ff-48b5-11e4-ab80-000c29f6ae42 rsyslog -- remote syslog PRI vulnerability
8e2e6ad8-1720-11d9-9fb9-00902788733b tor -- remote DoS and loss of anonymity
8e5e6d42-a0fa-11e3-b09a-080027f2d077 Python -- buffer overflow in socket.recvfrom_into()
8e8b8b94-7f1d-11dd-a66a-0019666436c2 rubygem-rails -- SQL injection vulnerability
8eabaad9-641f-11d9-92a7-000a95bc6fae hylafax -- unauthorized login vulnerability
8ecaaca2-cc07-11d8-858d-000d610a3b12 Linux binary compatibility mode input validation error
8efe93e2-ee62-11d9-8310-0001020eed82 zlib -- buffer overflow vulnerability
8f483746-d45d-11dd-84ec-001fc66e7203 roundcube -- remote execution of arbitrary code
8f5dd74b-2c61-11da-a263-0001020eed82 firefox & mozilla -- multiple vulnerabilities
8f86d8b5-6025-11d9-a9e7-0001020eed82 tiff -- tiffdump integer overflow vulnerability
8fc55043-cb1e-11df-9c1b-0011098ad87f horde-base -- XSS and CSRF vulnerabilities
8ff84335-a7da-11e2-b3f5-003067c2616f jasper -- buffer overflow
9003b500-31e3-11e3-b0d0-20cf30e32f6d mod_fcgid -- possible heap buffer overwrite
90064567-28b1-11db-844d-000c6ec775d9 rubygem-rails -- evaluation of ruby code
903654bd-1927-11dc-b8a0-02e0185f8d72 clamav -- multiple vulnerabilities
904d78b8-0f7e-11e4-8b71-5453ed2e2b49 qt4-imageformats, qt5-gui -- DoS vulnerability in the GIF image handler
9065b930-3d8b-11e3-bd1a-e840f2096bd0 gnutls -- denial of service
9082a85a-88ae-11d8-90d1-0020ed76ef5a jailed processes can attach to other jails
908f4cf2-1e8b-11e0-a587-001b77d09812 sudo -- local privilege escalation
90b27045-9530-11e3-9d09-000c2980a9f3 lighttpd -- multiple vulnerabilities
90ca3ba5-19e6-11e4-8616-001b3856973b gpgme -- heap-based buffer overflow in gpgsm status handler
90cc1494-10ac-11e1-b3ec-0024e830109b BIND -- Remote DOS
90d2e58f-b25a-11de-8c83-02e0185f8d72 FreeBSD -- kqueue pipe race conditions
90db9983-2f53-11dd-a0d8-0016d325a0ed ikiwiki -- cleartext passwords
910486d5-ba4d-11dd-8f23-0019666436c2 imlib2 -- XPM processing buffer overflow vulnerability
9168253c-5a6d-11d9-a9e7-0001020eed82 a2ps -- insecure temporary file creation
918f38cd-f71e-11e1-8bd8-0022156e8794 php5 -- header splitting attack via carriage-return character
91a2066b-5ab6-11de-bc9b-0030843d3802 cscope -- buffer overflow
91afa94c-c452-11da-8bff-000ae42e9b93 mod_pubcookie -- cross site scripting vulnerability
91be81e7-3fea-11e1-afc7-2c4138874f7d Multiple implementations -- DoS via hash algorithm collision
91c606fc-b5d0-11d9-a788-0001020eed82 mplayer & libxine -- MMS and Real RTSP buffer overflow vulnerabilities
91ecb546-b1e6-11e3-980f-20cf30e32f6d apache -- several vulnerabilities
91ed69f9-72c7-11dc-981a-001921ab2fa4 firebird -- multiple remote buffer overflow vulnerabilities
91f1adc7-b3e9-11d9-a788-0001020eed82 kdewebdev -- kommander untrusted code execution vulnerability
92140bc9-7bde-11da-8ec4-0002b3b60e4c bogofilter -- heap corruption through malformed input
92268205-1947-11d9-bc4a-000c41e2cdad cyrus-sasl -- dynamic library loading and set-user-ID applications
9227dcaf-827f-11dd-9cd7-0050568452ac twiki -- Arbitrary code execution in session files
922d2398-9e2d-11de-a998-0030843d3802 mozilla firefox -- multiple vulnerabilities
92442c4b-6f4a-11db-bd28-0012f06707f0 Imlib2 -- multiple image file processing vulnerabilities
927743d4-5ca9-11d9-a9e7-0001020eed82 up-imapproxy -- multiple vulnerabilities
92ca92c1-d859-11de-89f9-001517351c22 bugzilla -- information leak
92f30415-9935-11e2-ad4c-080027ef73ec OpenVPN -- potential side-channel/timing attack when comparing HMACs
92f86b93-923f-11dc-a2bf-02e081235dab net-snmp -- denial of service via GETBULK request
92fd40eb-c458-11da-9c79-00123ffe8333 samba -- Exposure of machine account credentials in winbind log files
9347d82d-9a66-11db-b271-000e35248ad7 w3m -- format string vulnerability
934b1de4-00d7-11da-bc08-0001020eed82 opera -- image dragging vulnerability
93688f8f-4935-11e1-89b4-001ec9578670 postfixadmin -- Multiple Vulnerabilities
937adf01-b64a-11dd-a55e-00163e000016 openfire -- multiple vulnerabilities
937d5911-5f16-11db-ae08-0008743bf21a drupal -- cross site request forgeries
938f357c-16dd-11d9-bc4a-000c41e2cdad bmon -- unsafe set-user-ID application
93ba13f8-5c41-11db-a5ae-00508d6a62df tkdiff -- temporary file symlink privilege escalation
93be487e-211f-11e1-89b4-001ec9578670 isc-dhcp-server -- Remote DoS
93d6162f-1153-11d9-bc4a-000c41e2cdad mozilla -- multiple heap buffer overflows
94234e00-be8a-11db-b2ec-000c6ec775d9 rar -- password prompt buffer overflow vulnerability
9448a82f-6878-11e1-865f-00e0814cab4e jenkins -- XSS vulnerability
947f4b14-1c89-11da-bc01-000e0c2e438a bind -- buffer overrun vulnerability
948921ad-afbc-11da-bad9-02e081235dab GnuPG does not detect injection of unsigned data
94976433-9c74-11e2-a9fc-d43d7e0c7c02 mozilla -- multiple vulnerabilities
949c470e-528f-11d9-ac20-00065be4b5b6 golddig -- local buffer overflow vulnerabilities
94b6264a-5140-11e3-8b22-f0def16c5c1b nginx -- Request line parsing vulnerability
94c0ac4f-9388-11e1-b242-00262d5ed8ee chromium -- multiple vulnerabilities
94edff42-d93d-11de-a434-0211d880e350 libvorbis -- multiple vulnerabilities
953911fe-51ef-11e2-8e34-0022156e8794 tomcat -- bypass of CSRF prevention filter
959d384d-6b59-11dd-9d79-001fc61c2a55 ruby -- DNS spoofing vulnerability
95a69d1a-52a5-11e2-a289-1c4bd681f0cf otrs -- XSS vulnerability in Firefox and Opera
95ee96f2-e488-11d9-bf22-080020c11455 linux-realplayer -- RealText parsing heap overflow
963413a5-bf50-11e3-a2d6-00262d5ed8ee chromium -- multiple vulnerabilities
964161cd-6715-11da-99f6-00123ffe8333 ffmpeg -- libavcodec buffer overflow vulnerability
96948a6a-e239-11d9-83cf-0010dc5df42d cacti -- potential SQL injection and cross site scripting attacks
96ba2dae-4ab0-11d8-96f2-0020ed76ef5a L2TP, ISAKMP, and RADIUS parsing vulnerabilities in tcpdump
96df5fd0-8900-11d9-aa18-0001020eed82 curl -- authentication buffer overflow vulnerability
96e776c7-e75c-11df-8f26-00151735203a OTRS -- Multiple XSS and denial of service vulnerabilities
96ed277b-60e0-11db-ad2d-0016179b2dd5 Serendipity -- XSS Vulnerabilities
96fdbf5b-2cfd-11d8-9355-0020ed76ef5a Mathopd buffer overflow
972697a7-9a42-11d9-a256-0001020eed82 kdelibs -- local DCOP denial of service vulnerability
972837fc-c304-11e3-8758-00262d5ed8ee ChaSen -- buffer overflow
9733c480-ebff-11e3-970b-206a8a720317 gnutls -- client-side memory corruption
9750cf22-216d-11da-bc01-000e0c2e438a unzip -- permission race vulnerability
978b0f76-122d-11e4-afe3-bc5ff4fb5e7b mozilla -- multiple vulnerabilities
97c22a94-5b8b-11e2-b131-000c299b62e1 nagios -- buffer overflow in history.cgi
97c3a452-6e36-11d9-8324-000a95bc6fae bugzilla -- cross-site scripting vulnerability
97d45e95-3ffc-11da-a263-0001020eed82 snort -- Back Orifice preprocessor buffer overflow vulnerability
97edf5ab-b319-11d9-837d-000e0c2e438a junkbuster -- heap corruption vulnerability and configuration modification vulnerability
97f09f2f-ca3f-11df-aade-0050568f000c FreeBSD -- ZFS ZIL playback with insecure permissions
9855ac8e-2aec-11db-a6e2-000e0c2e438a alsaplayer -- multiple vulnerabilities
985bfcf0-e1d7-11d9-b875-0001020eed82 opera -- redirection cross-site scripting vulnerability
985d4d6c-cfbd-11e3-a003-b4b52fce4ce8 mozilla -- multiple vulnerabilities
98690c45-0361-11e2-a391-000c29033c32 ImageMagick and GraphicsMagick -- DoS via specially crafted PNG file
98bd69c3-834b-11d8-a41f-0020ed76ef5a Courier mail services: remotely exploitable buffer overflows
98dd7788-3d13-11dc-b3d3-0016179b2dd5 drupal -- Cross site request forgeries
99015cf5-c4dd-11da-b2fb-000e0c2e438a mediawiki -- hardcoded placeholder string security bypass vulnerability
99021f88-ca3c-11df-be21-00e018aa7788 phpmyfaq -- cross site scripting vulnerabilities
990cf07e-6988-11d9-a9e7-0001020eed82 cups-base -- CUPS server remote DoS vulnerability
99230277-8fb4-11d8-8b29-0020ed76ef5a ident2 double byte buffer overflow
99858b7c-7ece-11df-a007-000f20797ede mozilla -- multiple vulnerabilities
99a5590c-857e-11e0-96b7-00300582f9fc Apache APR -- DoS vulnerabilities
99aef698-66ed-11e1-8288-00262d5ed8ee chromium -- multiple vulnerabilities
99b5cfa5-d3d2-11d9-8ffb-00061bc2ad93 yamt -- buffer overflow and directory traversal issues
9a035a56-eff0-11d9-8310-0001020eed82 ekg -- insecure temporary file creation
9a0a892e-05d8-11e3-ba09-000c29784fd1 lcms2 -- Null Pointer Dereference Denial of Service Vulnerability
9a57c607-3cab-11e3-b4d9-bcaec565249c xorg-server -- use after free
9a777c23-b310-11e0-832d-00215c6a37bb rsync -- incremental recursion memory corruption vulnerability
9a8fecef-92c0-11df-b140-0015f2db7bde vte -- Classic terminal title set+query attack
9ab3a22c-feb8-11e3-b938-5404a68ad561 mplayer -- potential buffer overrun when processing malicious lzo compressed input
9ac0f9c4-492b-11df-83fb-0015587e2cc1 krb5 -- multiple denial of service vulnerabilities
9aecb94c-c1ad-11e3-a5ac-001b21614864 cURL -- inappropriate GSSAPI delegation
9b037a0d-ef2c-11e2-b4a0-8c705af55518 gallery -- multiple vulnerabilities
9b2a5e88-02b8-11e2-92d1-000d601460a4 php5 -- Denial of Service in php_date_parse_tzfile()
9b4facec-6761-11da-99f6-00123ffe8333 curl -- URL buffer overflow vulnerability
9b7053fd-3ab5-11da-9484-00123ffe8333 phpmyadmin -- local file inclusion vulnerability
9b718b82-8ef5-11dc-8e42-001c2514716c gallery2 -- multiple vulnerabilities
9bad5ab1-f3f6-11e0-8b5c-b482fe3f522d OpenTTD -- Multiple buffer overflows in validation of external data
9bcfd7b6-bcda-11df-9a6a-0015f2db7bde webkit-gtk2 -- Multiple vulnabilities
9be819c6-4633-11d9-a9e7-0001020eed82 bnc -- remotely exploitable buffer overflow in getnickuserhost
9c00d446-8208-11dc-9283-0016179b2dd5 drupal --- multiple vulnerabilities
9c133aa0-12bd-11dd-bab7-0016179b2dd5 serendipity -- multiple cross site scripting vulnerabilities
9c1cea79-548a-11da-b53f-0004614cc33d phpSysInfo -- "register_globals" emulation layer overwrite vulnerability
9c2460a4-f6b1-11dd-94d9-0030843d3802 squid -- remote denial of service vulnerability
9c88d8a8-8372-11e2-a010-20cf30e32f6d apache22 -- several vulnerabilities
9ccfee39-3c3b-11df-9edc-000f20797ede mozilla -- multiple vulnerabilities
9cd52bc6-a213-11da-b410-000e0c2e438a abiword, koffice -- stack based buffer overflow vulnerabilities
9cfbca7f-efb7-11dc-be01-0211060005df qemu -- unchecked block read/write vulnerability
9d3020e4-a2c4-11dd-a9f9-0030843d3802 flyspray -- multiple vulnerabilities
9da3834b-6a50-11e1-91af-003067b2972c linux-flashplugin -- multiple vulnerabilities
9dd47fa3-9d53-11e3-b20f-00262d5ed8ee chromium -- multiple vulnerabilities
9dda3ff1-2b02-11db-a6e2-000e0c2e438a x11vnc -- authentication bypass vulnerability
9dde9dac-08f4-11e1-af36-003067b2972c caml-light -- insecure use of temporary files
9defb2d6-1404-11e4-8cae-20cf30e32f6d bugzilla -- Cross Site Request Forgery
9dfb63b8-8f36-11e2-b34d-000c2957946c www/mod_security -- NULL pointer dereference DoS
9f0a405e-4edd-11d9-a9e7-0001020eed82 phpmyadmin -- file disclosure vulnerability
9f14cb36-b6fc-11e0-a044-445c73746d79 opensaml2 -- unauthenticated login
9f581778-e3d4-11dc-bb89-000bcdc1757a coppermine -- multiple vulnerabilities
9f971cea-03f5-11e0-bf50-001a926c7637 krb5 -- unkeyed PAC checksum handling vulnerability
9fa1a0ac-b2e0-11e3-bb07-6cf0490a8c18 Joomla! -- Core - Multiple Vulnerabilities
9fae0f1f-df82-11d9-b875-0001020eed82 tcpdump -- infinite loops in protocol decoding
9fccad5a-7096-11d8-873f-0020ed76ef5a mpg123 vulnerabilities
9ff4c91e-328c-11d9-a9e7-0001020eed82 libxml -- remote buffer overflows
9fff8dc8-7aa7-11da-bf72-00123f589060 apache -- mod_imap cross-site scripting flaw
a02c9595-e018-11dd-a765-0030843d3802 pdfjam -- insecure temporary files
a04247f1-8d9c-11e1-93c7-00215c6a37bb Dokuwiki -- cross site scripting vulnerability
a04a3c13-4932-11df-83fb-0015587e2cc1 ejabberd -- queue overload denial of service vulnerability
a051a4ec-3aa1-4dd1-9bdc-a61eb5700153 leafnode fetchnews denial-of-service triggered by truncated transmission
a058d6fa-7325-11dc-ae10-0016179b2dd5 tcl/tk -- buffer overflow in ReadImage function
a0afb4b9-89a1-11dd-a65b-00163e000016 squirrelmail -- Session hijacking vulnerability
a0c65049-bddd-11e2-a0f6-001060e06fd4 linux-flashplugin -- multiple vulnerabilities
a0e92718-6603-11db-ab90-000e35fd8194 mysql -- database "case-sensitive" privilege escalation
a1050b8b-6db3-11e1-8b37-0011856a6e37 mozilla -- multiple vulnerabilities
a1126054-b57c-11dd-8892-0017319806e7 enscript -- arbitrary code execution vulnerability
a14dee30-e3d7-11e1-a084-50e5492bd3dc libcloud -- possible SSL MITM due to invalid regexp used to validate target server hostname
a163baff-3fe1-11d9-a9e7-0001020eed82 unarj -- long filename buffer overflow
a1d0911f-987a-11e1-a2ef-001fd0af1a4c node -- private information disclosure
a1ef3fc0-8ad0-11dc-9490-0016179b2dd5 dircproxy -- remote denial of service
a20082c3-6255-11d8-80e3-0020ed76ef5a metamail format string bugs and buffer overflows
a2074ac6-124c-11de-a964-0030843d3802 php-mbstring -- php mbstring buffer overflow vulnerability
a21037d5-2c38-11de-ab3b-0017a4cccfc6 xpdf -- multiple vulnerabilities
a264b1b0-5726-11e2-9483-14dae938ec40 moinmoin -- Multiple vulnerabilities
a268ef4a-0b35-11d9-8a8a-000c41e2cdad sudo -- sudoedit information disclosure
a2aa24fd-00d4-11da-bc08-0001020eed82 opera -- download dialog spoofing vulnerability
a2c4d3d5-4c7b-11df-83fb-0015587e2cc1 pidgin -- multiple remote denial of service vulnerabilities
a2d4a330-4d54-11de-8811-0030843d3802 wireshark -- PCNFSD Dissector Denial of Service Vulnerability
a2ff483f-a5c6-11e2-9601-000d601460a4 sieve-connect -- TLS hostname verification was not occurring
a2ffb627-9c53-11d8-9366-0020ed76ef5a lha buffer overflows and path traversal issues
a30573dc-4893-11df-a5f9-001641aeabdf krb5 -- remote denial of service vulnerability
a30e5e44-5440-11d9-9e1e-c296ac722cb3 squid -- confusing results on empty acl declarations
a3314314-f731-11df-a757-0011098ad87f horde-base -- XSS: VCARD attachments vulnerability
a395397c-c7c8-11d9-9e1e-c296ac722cb3 squid -- possible abuse of cachemgr.cgi
a3c2dee5-cdb9-11e2-b9ce-080027019be0 telepathy-gabble -- TLS verification bypass
a413ed94-836e-11d9-a9e7-0001020eed82 putty -- pscp/psftp heap corruption vulnerabilities
a4372a68-652c-11e0-a25a-00151735203a OTRS -- Several XSS attacks possible
a4598875-ec91-11e1-8bd8-0022156e8794 rssh -- configuration restrictions bypass
a460035e-d111-11e1-aff7-001fd056c417 libjpeg-turbo -- heap-based buffer overflow
a467d0f9-8875-11dc-b3ba-0016179b2dd5 wordpress -- cross-site scripting
a4746a86-4c89-11df-83fb-0015587e2cc1 e107 -- code execution and XSS vulnerabilities
a47af810-3a17-11e1-a1be-00e0815b8da8 spamdyke -- STARTTLS Plaintext Injection Vulnerability
a4815970-c5cc-11d8-8898-000d6111a684 rssh -- file name disclosure bug
a4955b32-ed84-11d9-8310-0001020eed82 wordpress -- multiple vulnerabilities
a4a809d8-25c8-11e1-b531-00215c6a37bb opera -- multiple vulnerabilities
a4bd3039-9a48-11d9-a256-0001020eed82 xv -- filename handling format string vulnerability
a4c9e12d-88b7-11e3-8ada-10bf48e1088e socat -- buffer overflow with data from command line
a4d71e4c-7bf4-11e2-84cd-d43d7e0c7c02 drupal7 -- Denial of service
a4ed6632-5aa9-11e2-8fcb-c8600054b392 mozilla -- multiple vulnerabilities
a4f08579-516c-11e3-9b62-000c292e4fd8 samba -- ACLs are not checked on opening an alternate data stream on a file or directory
a4fd8f53-05eb-11d9-b45d-000c41e2cdad mozilla -- SOAPParameter integer overflow
a51ad838-2077-48b2-a136-e888a7db5f8d openvpn -- denial of service: client certificate validation can disconnect unrelated clients
a537b449-2b19-11e2-b339-90e6ba652cce DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust
a56a72bb-9f72-11d8-9585-0020ed76ef5a phpBB session table exhaustion
a5742055-300a-11d9-a9e7-0001020eed82 p5-Archive-Zip -- virus detection evasion
a592e991-a919-11e2-ade0-8c705af55518 roundcube -- arbitrary file disclosure vulnerability
a59afa47-c930-11dc-810c-0016179b2dd5 claws-mail -- insecure temporary file creation
a5b24a6b-c37c-11e2-addb-60a44c524f57 otrs -- information disclosure
a5eb760a-753c-11d9-a36f-000a95bc6fae perl -- vulnerabilities in PERLIO_DEBUG handling
a5f667db-7596-11dc-8b7a-0019b944b34e xfs -- multiple vulnerabilites
a63b15f9-97ff-11dc-9e48-0016179b2dd5 samba -- multiple vulnerabilities
a6427195-c2c7-11d9-89f7-02061b08fc24 mozilla -- privilege escalation via non-DOM property overrides
a6605f4b-4067-11de-b444-001372fd0af2 drupal -- cross-site scripting
a6713190-dfea-11dd-a765-0030843d3802 imap-uw -- local buffer overflow vulnerabilities
a6d9da4a-5d5e-11db-8faf-000c6ec775d9 nvidia-driver -- arbitrary root code execution vulnerability
a7062952-9023-11d9-a22c-0001020eed82 phpmyadmin -- information disclosure vulnerability
a7080c30-91a2-11dc-b2eb-00b0d07e6c7e mt-daapd -- denial of service vulnerability
a70966a1-ac22-11e3-8d04-00262d5ed8ee www/chromium -- multiple vulnerabities
a711de5c-05fa-11d9-a9b2-00061bc2ad93 samba3 DoS attack
a713c0f9-ec54-11d8-9440-000347a4fa7d ImageMagick png vulnerability fix
a736deab-5d7d-11d8-80e3-0020ed76ef5a CCE contains exploitable buffer overflows
a7706414-1be7-11e2-9aad-902b343deec9 Wireshark -- Multiple Vulnerabilities
a77849a5-696f-11d9-ae49-000c41e2cdad mozilla -- insecure permissions for some downloaded files
a78299e7-9ef3-11da-b410-000e0c2e438a libtomcrypt -- weak signature scheme with ECC keys
a7975581-ee26-11e1-8bd8-0022156e8794 inn -- plaintext command injection into encrypted channel
a7bfd423-484f-11d9-a9e7-0001020eed82 cscope -- symlink attack vulnerability
a7e0d783-131b-11d9-bc4a-000c41e2cdad mozilla -- users may be lured into bypassing security dialogs
a81161d2-790f-11e1-ac16-e0cb4e266481 phpMyAdmin -- Path disclosure due to missing verification of file presence
a813a219-d2d4-11da-a672-000e0c2e438a zgv, xzgv -- heap overflow vulnerability
a81746a1-c2c7-11d9-89f7-02061b08fc24 mozilla -- "Wrapped" javascript: urls bypass security checks
a83f25df-d775-11e0-8bf1-003067b2972c XSS issue in MantisBT
a851b305-1bc3-11e3-95b7-00e0814cab4e django -- multiple vulnerabilities
a863aa74-24be-11da-8882-000e0c33c2dc X11 server -- pixmap allocation vulnerability
a8674c14-83d7-11db-88d5-0012f06707f0 ruby -- cgi.rb library Denial of Service
a86f30e7-dce7-11da-bf3f-02e081235dab fswiki -- XSS vulnerability
a876df84-0fef-11db-ac96-000c6ec775d9 twiki -- multiple file extensions file upload vulnerability
a8818f7f-9182-11e2-9bdf-d48564727302 optipng -- use-after-free vulnerability
a8864f8f-aa9e-11e1-a284-0023ae8e59f0 databases/postgresql*-server -- crypt vulnerabilities
a89b76a7-f6bd-11dd-94d9-0030843d3802 amaya -- multiple buffer overflow vulnerabilities
a8af7d70-8007-11db-b280-0008743bf21a kronolith -- arbitrary local file inclusion vulnerability
a8d8713e-dc83-11da-a22b-000c6ec775d9 mysql50-server -- COM_TABLE_DUMP arbitrary code execution
a95092a6-f8f1-11e0-a7ea-00215c6a37bb asterisk -- remote crash vulnerability in SIP channel driver
a9c51caf-6603-11db-ab90-000e35fd8194 mysql -- database suid privilege escalation
aa4d3d73-ef17-11e1-b593-00269ef07d24 Calligra, KOffice -- input validation failure
aa4f86af-3172-11e2-ad21-20cf30e32f6d YUI JavaScript library -- JavaScript injection exploits in Flash components
aa5bc971-d635-11e0-b3cf-080027ef73ec nss/ca_root_nss -- fraudulent certificates issued by DigiNotar.nl
aa71daaa-9f8c-11e1-bd0a-0082a0c18826 pidgin-otr -- format string vulnerability
aa7764af-0b5e-4ddc-bc65-38ad697a484f rubygem-dragonfly -- arbitrary code execution
aab187d4-e0f3-11df-b1ea-001999392805 opera -- multiple vulnerabilities
ab1f515d-6b69-11e1-8288-00262d5ed8ee chromium -- Errant plug-in load and GPU process memory corruption
ab2575d6-39f0-11dc-b8cc-000fea449b8a tomcat -- XSS vulnerability in sample applications
ab8dbe98-6be4-11db-ae91-0012f06707f0 ruby -- cgi.rb library Denial of Service
ab9be2c8-ef91-11e0-ad5a-00215c6a37bb quagga -- multiple vulnerabilities
ab9c559e-115a-11d9-bc4a-000c41e2cdad mozilla -- BMP decoder vulnerabilities
abad20bf-c1b4-11e3-a5ac-001b21614864 OpenLDAP -- incorrect handling of NULL in certificate Common Name
abcacb5a-e7f1-11dd-afcd-00e0815b8da8 ipset-tools -- Denial of Service Vulnerabilities
abe47a5a-e23c-11d8-9b0a-000347a4fa7d Mozilla certificate spoofing
abeb9b64-ce50-11db-bc24-0016179b2dd5 mplayer -- DMO File Parsing Buffer Overflow Vulnerability
abef280d-d829-11e2-b71c-8c705af55518 FreeBSD -- Privilege escalation via mmap
ac4b9d18-67a9-11d8-80e3-0020ed76ef5a fetchmail -- denial-of-service vulnerability
ac619d06-3ef8-11d9-8741-c942c075aa41 jdk/jre -- Security Vulnerability With Java Plugin
aca0d7e0-e38a-11e1-999b-e0cb4e266481 phpMyAdmin -- Path disclosure due to missing library
acab2f88-7490-11e1-865f-00e0814cab4e Apache Traffic Server -- heap overflow vulnerability
acf80afa-c3ef-11dd-a721-0030843d3802 vlc -- arbitrary code execution in the RealMedia processor
ad08d14b-ca3d-11df-aade-0050568f000c FreeBSD -- Improper environment sanitization in rtld(1)
ad2f3337-26bf-11d9-9289-000c41e2cdad xpdf -- integer overflow vulnerabilities
ad4a00fa-0157-11dd-8bd3-001372ae3ab9 opera -- multiple vulnerabilities
ad4f6ca4-6720-11d8-9fb5-000a95bc6fae lbreakout2 vulnerability in environment variable handling
ad5e70bb-c429-11d9-ac59-02061b08fc24 gaim -- MSN remote DoS vulnerability
ad61657d-26b9-11d9-9289-000c41e2cdad gaim -- Content-Length header denial-of-service vulnerability
ad747a01-1fee-11e4-8ff1-f0def16c5c1b nginx -- inject commands into SSL session vulnerability
ad74a1bd-16d2-11d9-bc4a-000c41e2cdad php -- php_variables memory disclosure
ad9d2518-3471-4737-b60b-9a1f51023b28 mailman -- password disclosure
adcbdba2-4c27-11e3-9848-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
ae0e5835-3cad-11e0-b654-00215c6a37bb PivotX -- administrator password reset vulnerability
ae2fa87c-4bca-4138-8be1-67ce2a19b3a8 rubygem-actionpack -- Denial of Service
ae651a4b-0a42-11e3-ba52-00262d5ed8ee chromium -- multiple vulnerabilities
ae6ec9b8-2f43-4d02-8129-c6a3a53ef09d xview -- multiple buffer overflows in xv_parse_one
ae7124ff-547c-11db-8f1a-000a48049292 openldap -- slapd acl selfwrite Security Issue
ae7b7f65-05c7-11d9-b45d-000c41e2cdad webmin -- insecure temporary file creation at installation time
ae9fb0d7-c4dc-11da-b2fb-000e0c2e438a netpbm -- buffer overflow in pnmtopng
aeb962f6-ab8d-11e2-b3f5-003067c2616f tinc -- Buffer overflow
aecee357-739e-11e1-a883-001cc0a36e12 gnutls -- possible overflow/Denial of service vulnerabilities
aed343b4-5480-11da-b579-001125afbed7 Macromedia flash player -- swf file handling arbitrary code
aed44c4e-c067-11e1-b5e0-000c299b62e1 FreeBSD -- Privilege escalation when returning from kernel
af0296be-2455-11d8-82e5-0020ed76ef5a fetchmail -- address parsing vulnerability
af2745c0-c3e0-11dd-a721-0030843d3802 mantis -- php code execution vulnerability
af747389-42ba-11d9-bd37-00065be4b5b6 mod_access_referer -- null pointer dereference vulnerability
af8dba15-f4cc-11da-87a1-000c6ec775d9 dokuwiki -- spellchecker remote PHP code execution
af8e3a0c-5009-11dc-8a43-003048705d5a rsync -- off by one stack overflow
af9018b6-a4f5-11da-bb41-0011433a9404 squirrelmail -- multiple vulnerabilities
afdf500f-c1f6-11db-95c5-000c6ec775d9 snort -- DCE/RPC preprocessor vulnerability
b02c1d80-e1bb-11d9-b875-0001020eed82 trac -- file upload/download vulnerability
b060ee50-daba-11e3-99f2-bcaec565249c libXfont -- X Font Service Protocol and Font metadata file handling issues
b07f3254-f83a-11dd-85a4-ea653f0746ab pyblosxom -- atom flavor multiple XML injection vulnerabilities
b088bf48-da3b-11da-93e0-00123ffe8333 clamav -- Freshclam HTTP Header Buffer Overflow Vulnerability
b0911985-6e2a-11d9-9557-000a95bc6fae web browsers -- window injection vulnerabilities
b0d61f73-0e11-11db-a47b-000c2957fdf1 trac -- reStructuredText breach of privacy and denial of service vulnerability
b0e76877-67a8-11d8-80e3-0020ed76ef5a mailman denial-of-service vulnerability in MailCommandHandler
b0f3ab1f-1f3b-11e2-8fe9-0022156e8794 Exim -- remote code execution
b13414c9-50ba-11e0-975a-000c29cc39d3 hiawatha -- integer overflow in Content-Length header parsing
b162b218-c547-4ba2-ae31-6fdcb61bc763 puppet -- Unauthenticated Remote Code Execution Vulnerability
b168ddea-105a-11db-ac96-000c6ec775d9 samba -- memory exhaustion DoS in smbd
b1b5c125-2308-11dc-b91a-001921ab2fa4 evolution-data-server -- remote execution of arbitrary code vulnerability
b1bcab7d-1880-11dd-a914-0016179b2dd5 sdl_image -- buffer overflow vulnerabilities
b1ca65e6-5aaf-11de-bc9b-0030843d3802 pidgin -- multiple vulnerabilities
b1e8c810-01d0-11da-bc08-0001020eed82 sylpheed -- MIME-encoded file name buffer overflow vulnerability
b206dd82-ac67-11d9-a788-0001020eed82 openoffice -- DOC document heap overflow vulnerability
b21790a5-02fb-11dd-bd06-0017319806e7 powerdns-recursor -- DNS cache poisoning
b2383758-5f15-11db-ae08-0008743bf21a drupal -- multiple XSS vulnerabilities
b2571f88-a867-11dc-a6f0-00a0cce0781e smbftpd -- format string vulnerability
b2a1a3b5-ed95-11d9-8310-0001020eed82 net-snmp -- remote DoS vulnerability
b2a40507-5c88-11e0-9e85-00215af774f0 quagga -- two DoS vulnerabilities
b2cfb400-1df0-11d9-a859-0050fc56d258 icecast -- Cross-Site Scripting Vulnerability
b2d248ad-88f6-11d9-aa18-0001020eed82 cyrus-imapd -- multiple buffer overflow vulnerabilities
b2e6d1d6-1339-11d9-bc4a-000c41e2cdad mozilla -- scripting vulnerabilities
b2eaa7c2-e64a-11df-bc65-0022156e8794 Wireshark -- DoS in the BER-based dissectors
b2f09169-55af-11e0-9d6f-000f20797ede mozilla -- update to HTTPS certificate blacklist
b2ff68b2-9f29-11db-a4e4-0211d87675b7 mplayer -- buffer overflow in the code for RealMedia RTSP streams.
b318dc8c-6756-11db-83c3-000c6ec775d9 screen -- combined UTF-8 characters vulnerability
b31a1088-460f-11de-a11a-0022156e8794 GnuTLS -- multiple vulnerabilities
b3435b68-9ee8-11e1-997c-002354ed89bc sudo -- netmask vulnerability
b3531fe1-2b03-11df-b6db-00248c9b4be7 drupal -- multiple vulnerabilities
b384cc5b-8d56-11e1-8d7b-003067b2972c wordpress -- multiple vulnerabilities
b39bdc06-ee42-11dc-8678-00a0cce0781e dovecot -- security hole in blocking passdbs
b3b8d491-0fbb-11e3-8c50-1c6f65c11ee6 cacti -- allow remote attackers to execute arbitrary SQL commands
b3cd00f7-c0c5-452d-87bc-086c5635333e mailman -- generated passwords are poor quality
b3fcb387-de4b-11e2-b1c6-0025905a4771 mozilla -- multiple vulnerabilities
b4023753-a4ba-11e3-bec2-00262d5ed8ee chromium -- multiple vulnerabilities
b4051b52-58fa-11e2-853b-00262d5ed8ee rubygem-rails -- SQL injection vulnerability
b428e6b3-926c-11e1-8d7b-003067b2972c portupgrade-devel -- lack of distfile checksums
b42e8c32-34f6-11dc-9bc9-001921ab2fa4 linux-flashplugin -- critical vulnerabilities
b43004b8-6a53-11df-bc7b-0245fb008c0b ziproxy -- atypical huge picture files vulnerability
b46f3a1e-a052-11de-a649-000c2955660f xapian-omega -- cross-site scripting vulnerability
b4892b5b-fb1c-11d9-96ba-00909925db3e egroupware -- multiple cross-site scripting (XSS) and SQL injection vulnerabilities
b4af3ede-36e9-11d9-a9e7-0001020eed82 twiki -- arbitrary shell command execution
b4d94fa0-6e38-11d9-9e1e-c296ac722cb3 squid -- possible cache-poisoning via malformed HTTP responses
b4f8be9e-56b2-11e1-9fb7-003067b2972c Python -- DoS via malformed XML-RPC / HTTP POST request
b50913ce-f4a7-11e1-b135-003067b2972c bitcoin -- denial of service
b50cbbc0-7fb2-11e2-9c5a-000d601460a4 otrs -- XSS vulnerability in Internet Explorer could lead to remote code execution
b58ff497-6977-11d9-ae49-000c41e2cdad tiff -- divide-by-zero denial-of-service
b5a49db7-72fc-11da-9827-021106004fd6 scponly -- local privilege escalation exploits
b5fc63ad-c4c3-11da-9699-00123ffe8333 dia -- XFig Import Plugin Buffer Overflow
b5ffaa2a-ee50-4498-af99-61bc1b163c00 leafnode -- denial of service vulnerability
b6069837-aadc-11df-82df-0015f2db7bde OpenTTD -- Denial of service (server) via infinite loop
b62c80c2-b81a-11da-bec5-00123ffe8333 heimdal -- Multiple vulnerabilities
b64481d9-eff4-11d9-8310-0001020eed82 pear-XML_RPC -- information disclosure vulnerabilities
b6612eee-df5f-11d9-b875-0001020eed82 gaim -- MSN Remote DoS vulnerability
b6939d5b-64a1-11d9-9106-000a95bc6fae libxine -- multiple vulnerabilities in VideoCD handling
b6beb137-9dc0-11e2-882f-20cf30e32f6d Subversion -- multiple vulnerabilities
b6c18956-5fa3-11db-ad2d-0016179b2dd5 plone -- unprotected MembershipTool methods
b6cad7f3-fb59-11d8-9837-000c41e2cdad ImageMagick -- BMP decoder buffer overflow
b6f6da57-680a-11dc-b350-001921ab2fa4 clamav -- multiple remote Denial of Service vulnerabilities
b72bad1c-20ed-11e3-be06-000c29ee3065 FreeBSD -- Cross-mount links between nullfs(5) mounts
b73335a5-3bbe-11dc-8e83-0016179b2dd5 libvorbis -- Multiple memory corruption flaws
b747b2a9-7be0-11da-8ec4-0002b3b60e4c bogofilter -- heap corruption through excessively long words
b74a8076-9b1f-11df-9f58-021e8c343e76 isolate -- local root exploit
b7a7576d-8e0a-11e3-9976-9c4e36909cc0 linux-flashplugin -- multiple vulnerabilities
b7cb488c-8349-11d8-a41f-0020ed76ef5a isakmpd payload handling denial-of-service vulnerabilities
b84a992a-12ab-11dd-bab7-0016179b2dd5 openfire -- unspecified denial of service
b8943e61-6e68-11d9-a9e7-0001020eed82 evolution -- arbitrary code execution vulnerability
b8ae4659-a0da-11e1-a294-bcaec565249c libxml2 -- An off-by-one out-of-bounds write by XPointer
b8e361b8-b7ff-11da-8414-0013d4a4a40e curl -- TFTP packet buffer overflow vulnerability
b8f0a391-7910-11e1-8a43-00262d5ed8ee chromium -- multiple vulnerabilities
b9044cc2-8aa5-11db-bd0d-00123ffe8333 wv2 -- Integer Overflow Vulnerability
b9077cc4-6d04-4bcb-a37a-9ceaebfdcc9e ganglia -- buffer overflow vulnerability
b91234e7-9a8b-11e1-b666-001636d274f3 NVIDIA UNIX driver -- access to arbitrary system memory
b9281fb9-61b2-11e0-b1ce-0019d1a7ece2 tinyproxy -- ACL lists ineffective when range is configured
b971d2a6-1670-11da-978e-0001020eed82 pcre -- regular expression buffer overflow
b975763f-5210-11db-8f1a-000a48049292 freetype -- LWFN Files Buffer Overflow Vulnerability
b9a347ac-8671-11e2-b73c-0019d18c446a typo3 -- Multiple vulnerabilities in TYPO3 Core
b9ec7fe3-a38a-11de-9c6b-003048818f40 bugzilla -- two SQL injections, sensitive data exposure
b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6 libsndfile -- PAF file processing integer overflow
ba005226-fb5b-11d8-9837-000c41e2cdad imlib2 -- BMP decoder buffer overflow
ba04a373-7d20-11e3-8992-00132034b086 nagios -- denial of service vulnerability
ba13dc13-340d-11d9-ac1b-000d614f7fad samba -- potential remote DoS vulnerability
ba51c2f7-5b43-11e1-8288-00262d5ed8ee plib -- remote code execution via buffer overflow
ba61ce15-8a7b-11df-87ec-0050569b2d21 redmine -- multiple vulnerabilities
ba73f494-65a8-11de-aef5-001c2514716c phpmyadmin -- XSS vulnerability
bad1b090-a7ca-11de-873f-0030843d3802 drupal -- multiple vulnerabilities
baece347-c489-11dd-a721-0030843d3802 wireshark -- SMTP Processing Denial of Service Vulnerability
baf37cd2-8351-11e1-894e-00215c6a37bb samba -- "root" credential remote code execution
baf74e0b-497a-11da-a4f4-0060084a00e5 fetchmail -- fetchmailconf local password exposure
bb0a8795-15dc-11df-bf0a-002170daae37 wireshark -- LWRES vulnerability
bb33981a-7ac6-11da-bf72-00123f589060 perl, webmin, usermin -- perl format string integer wrap vulnerability
bb389137-21fb-11e1-89b4-001ec9578670 asterisk -- Multiple Vulnerabilities
bb4e9a44-dff2-11dd-a765-0030843d3802 mysql -- renaming of arbitrary tables by authenticated users
bb99f803-5fde-11d9-b721-00065be4b5b6 helvis -- information leak vulnerabilities
bbd5f486-24f1-11e1-95bc-080027ef73ec PuTTY -- Password vulnerability
bc20510f-4dd4-11dd-93e7-0211d880e350 poppler -- uninitialized pointer
bc4a7efa-7d9a-11d9-a9e7-0001020eed82 ngircd -- format string vulnerability
bc6a7e79-e111-11dd-afcd-00e0815b8da8 cgiwrap -- XSS Vulnerability
bce1f76d-82d0-11de-88ea-001a4d49522b subversion -- heap overflow vulnerability
bcee3989-d106-4f60-948f-835375634710 varnish -- Varnish HTTP Request Parsing Denial of Service
bcf27002-94c3-11d9-a9e0-0001020eed82 grip -- CDDB response multiple matches buffer overflow vulnerability
bd2ef267-4485-11e4-b0b7-00262d5ed8ee chromium -- RSA signature malleability in NSS
bd579366-5290-11d9-ac20-00065be4b5b6 greed -- insecure GRX file processing
bd60922b-fb8d-11d8-a13e-000a95bc6fae krb5 -- ASN.1 decoder denial-of-service vulnerability
bd730827-dfe0-11dd-a765-0030843d3802 libcdaudio -- remote buffer overflow and code execution
bd760627-3493-11e0-8103-00215c6a37bb django -- multiple vulnerabilities
bd9fc2bf-5ffe-11d9-a11a-000a95bc6fae vim -- vulnerabilities in modeline handling
bdab0acd-d4cd-11e1-8a1c-14dae9ebcf89 php -- potential overflow in _php_stream_scandir
bdad9ada-8a52-11d9-9e53-000a95bc6fae lighttpd -- script source disclosure vulnerability
bdccd14b-5aac-11de-a438-003048590f9e joomla -- multiple vulnerabilities
bdd1537b-354c-11d9-a9e7-0001020eed82 sudo -- privilege escalation with bash scripts
bdd48858-9656-11e2-a9a8-00262d5ed8ee chromium -- multiple vulnerabilities
bdec8dc2-0b3b-11e1-b722-001cc0476564 gnutls -- client session resumption vulnerability
be3dfe33-410b-11e0-9e02-00215c6a37bb openldap -- two security bypass vulnerabilities
be4b0529-dbaf-11dc-9791-000ea6702141 clamav -- ClamAV libclamav PE File Integer Overflow Vulnerability
be4ccb7b-c48b-11da-ae12-0002b3b60e4c openvpn -- LD_PRELOAD code execution on client through malicious or compromised server
be5421ab-1b56-11e4-a767-5453ed2e2b49 krfb -- Possible Denial of Service or code execution via integer overflow
be543d74-539a-11d9-a9e7-0001020eed82 ecartis -- unauthorised access to admin interface
be77eff6-ca91-11e0-aea3-00215c6a37bb rubygem-rails -- multiple vulnerabilities
be927298-6f97-11de-b444-001372fd0af2 drupal -- multiple vulnerabilities
beab40bf-c1ca-4d2b-ad46-2f14bac8a968 Ruby Activemodel Gem -- Circumvention of attr_protected
beb6f4a8-add5-11de-8b55-0030843d3802 mybb -- multiple vulnerabilities
bec38383-e6cb-11de-bdd4-000c2930e89b pligg -- Cross-Site Scripting and Cross-Site Request Forgery
bf171509-68dd-11e0-afe6-0003ba02bf30 rt -- multiple vulnerabilities
bf2e7483-d3fa-440d-8c6e-8f1f2f018818 linux_base -- vulnerabilities in Red Hat 7.1 libraries
bf7912f5-c1a8-11e3-a5ac-001b21614864 nas -- multiple vulnerabilities
bfb36941-84fa-11d8-a41f-0020ed76ef5a Incorrect cross-realm trust handling in Heimdal
bfbbd505-3bd6-409c-8c67-445d3635cf4b xli -- integer overflows in image size calculations
bfd6eef4-8c94-11dc-8c55-001c2514716c pcre -- arbitrary code execution
bfda39de-7467-11d9-9e1e-c296ac722cb3 squid -- correct handling of oversized HTTP reply headers
bfdbc7ec-9c3f-11e0-9bec-6c626dd55a41 Samba -- Denial of service - memory corruption
bfe218a5-4218-11de-b67a-0030843d3802 moinmoin -- cross-site scripting vulnerabilities
bfe9c75e-5028-11e0-b2d2-00215c6a37bb asterisk -- Multiple Vulnerabilities
bfecf7c1-af47-11e1-9580-4061862b8c22 mozilla -- multiple vulnerabilities
c01170bf-4990-11da-a1b8-000854d03344 lynx -- remote buffer overflow
c0171f59-ea8a-11da-be02-000c6ec775d9 frontpage -- cross site scripting vulnerability
c01a25f5-8f20-11da-8c1d-000e0c2e438a texindex -- temporary file privilege escalation
c0869649-5a0c-11df-942d-0015587e2cc1 piwik -- cross site scripting vulnerability
c0a269d5-3d16-11d9-8818-008088034841 Cyrus IMAPd -- FETCH command out of bounds memory corruption
c0c31b27-bff3-11e3-9d09-000c2980a9f3 openafs -- Denial of Service
c0ef849e-84ac-11e3-bec4-9c4e36909cc0 linux-flashplugin -- multiple vulnerabilities
c0f122e2-3897-11e3-a084-3c970e169bc2 pycrypto -- PRNG reseed race condition
c0fd7890-4346-11db-89cc-000ae42e9b93 drupal-pubcookie -- authentication may be bypassed
c110eda2-e995-11db-a944-0012f06707f0 freeradius -- EAP-TTLS Tunnel Memory Leak Remote DOS Vulnerability
c115271d-602b-11dc-898c-001921ab2fa4 apache -- multiple vulnerabilities
c14aa48c-5ab7-11de-bc9b-0030843d3802 cscope -- multiple buffer overflows
c175d72f-3773-11df-8bb8-0211d880e350 gtar -- buffer overflow in rmt client
c1d97a8b-05ed-11d9-b45d-000c41e2cdad mozilla -- POP client heap overflow
c1e5f35e-f93d-11e1-b07f-00235a5f2c9a emacs -- remote code execution vulnerability
c1ef9b33-72a6-11de-82ea-0030843d3802 mozilla -- corrupt JIT state after deep return from native function
c223b00d-e272-11df-8e32-000f20797ede mozilla -- Heap buffer overflow mixing document.write and DOM insertion
c27bc173-d7aa-11db-b141-0016179b2dd5 Squid -- TRACE method handling denial of service
c28ee9cd-916e-4dcf-8ed3-e97e5846db6c typo3 -- Cross-Site Scripting Vulnerability in TYPO3 Core
c28f4705-043f-11da-bc08-0001020eed82 proftpd -- format string vulnerabilities
c2c8c84b-e734-11e3-9a25-5404a6a6412c mumble -- NULL pointer dereference and heap-based buffer overflow
c2e10368-77ab-11d8-b9e8-00e04ccb0a62 ModSecurity for Apache 2.x remote off-by-one overflow
c2eac2b5-9a7d-11df-8e32-000f20797ede firefox -- Dangling pointer crash regression from plugin parameter array fix
c2fdb3bc-7d72-11da-b96e-000fb586ba73 rxvt-unicode -- restore permissions on tty devices
c329712a-6b5b-11dd-9d79-001fc61c2a55 ruby -- multiple vulnerabilities in safe level
c37de843-488e-11e2-a5c9-0019996bc1f7 squid -- denial of service
c389d06d-ee57-11db-bd51-0016179b2dd5 claws-mail -- APOP vulnerability
c3aba586-ea77-11dd-9d1e-000bcdc1757a openfire -- multiple vulnerabilities
c418d472-6bd1-11d9-93ca-000a95bc6fae perl -- File::Path insecure file/directory permissions
c444c8b7-7169-11de-9ab7-000c29a67389 isc-dhcp-client -- Stack overflow vulnerability
c480eb5e-7f00-11d8-868e-000347dd607f ezbounce remote format string vulnerability
c4892644-f8c6-11e3-9f45-6805ca0b3d42 phpMyAdmin -- two XSS vulnerabilities due to unescaped db/table names
c4b025bb-f05d-11d8-9837-000c41e2cdad tnftpd -- remotely exploitable vulnerability
c4b7badf-24ca-11d8-82e5-0020ed76ef5a Buffer overflows in libmcrypt
c4ba95b2-39ce-11dd-98c9-00163e000016 moinmoin -- superuser privilege escalation
c4d412c8-f4d1-11e2-b86c-000c295229d5 openafs -- single-DES cell-wide key brute force vulnerability
c4f067b9-dc4a-11df-8e32-000f20797ede mozilla -- multiple vulnerabilities
c4f31e16-6e33-11dd-8eb7-0011098ad87f cdf3 -- Buffer overflow vulnerability
c5519420-cec2-11d8-8898-000d6111a684 "Content-Type" XSS vulnerability affecting other webmail systems
c551ae17-7f00-11d8-868e-000347dd607f multiple vulnerabilities in phpBB
c55f9ed0-56a7-11da-a3f0-00123ffe8333 phpmyadmin -- HTTP Response Splitting vulnerability
c5af0747-1262-11de-a964-0030843d3802 libsndfile -- CAF processing integer overflow vulnerability
c5c17ead-8f23-11da-8c1d-000e0c2e438a cvsbug -- race condition
c611be81-fbc2-11da-9156-000e0c2e438a sendmail -- Incorrect multipart message handling
c61ca9cb-64c3-11dd-954d-006097bcc5f4 openvpn-devel -- arbitrary code execution
c623f058-10e7-11e0-becc-0022156e8794 php-filter -- Denial of Service
c62dc69f-05c8-11d9-b45d-000c41e2cdad openoffice -- document disclosure
c651c898-e90d-11e1-b230-0024e830109b libotr -- buffer overflows
c6521b04-314b-11e1-9cf4-5404a67eef98 lighttpd -- remote DoS in HTTP authentication
c6b9aee8-3071-11da-af18-000ae4641456 phpmyfaq -- SQL injection, takeover, path disclosure, remote code execution
c6fbd447-59ed-11e0-8d04-0015f2db7bde gdm -- privilege escalation vulnerability
c702944a-db0f-11dd-aa56-000bcdf0a03b FreeBSD -- netgraph / bluetooth privilege escalation
c72a2494-c08b-11e2-bb21-083e8ed0f47b plib -- stack-based buffer overflow
c73305ae-8cd7-11d9-9873-000a95bc6fae realplayer -- remote heap overflow
c7526a14-c4dc-11da-9699-00123ffe8333 mplayer -- Multiple integer overflows
c7705712-92e6-11d8-8b29-0020ed76ef5a TCP denial-of-service attacks against long lived connections
c79eb109-a754-45d7-b552-a42099eb2265 Ruby -- Denial of Service and Unsafe Object Creation Vulnerability in JSON
c7b5d72b-886a-11e3-9533-60a44c524f57 otrs -- multiple vulnerabilities
c7c09579-b466-11da-82d0-0050bf27ba24 horde -- "url" disclosure of sensitive information vulnerability
c7cad0f0-671a-11d8-bdeb-000a95bc6fae Darwin Streaming Server denial-of-service vulnerability
c7ccc33f-7d31-11d9-a9e7-0001020eed82 mailman -- directory traversal vulnerability
c7fa3618-d5ff-11e1-90a2-000c299b62e1 isc-dhcp -- multiple vulnerabilities
c80a3d93-8632-11e1-a374-14dae9ebcf89 phpmyfaq -- Remote PHP Code Execution Vulnerability
c84dc9ad-41f7-11dd-a4f9-00163e000016 apache -- multiple vulnerabilities
c87aa2d2-c3c4-11de-ab08-000f20797ede mozilla -- multiple vulnerabilities
c89a3ebb-ae07-11dd-b4b2-001f3c8eabeb trac -- potential DOS vulnerability
c8c31c41-49ed-11df-83fb-0015587e2cc1 curl -- libcurl buffer overflow vulnerability
c8c927e5-2891-11e0-8f26-00151735203a bugzilla -- multiple serious vulnerabilities
c905298c-2274-11db-896e-000ae42e9b93 drupal -- XSS vulnerability
c906e0a4-efa6-11e1-8fbf-001b77d09812 roundcube -- cross-site scripting in HTML email messages
c9263916-006f-11df-94cb-0050568452ac Zend Framework -- multiple vulnerabilities
c93e4d41-75c5-11dc-b903-0016179b2dd5 jdk/jre -- Applet Caching May Allow Network Access Restrictions to be Circumvented
c97219b6-843d-11e2-b131-000c299b62e1 stunnel -- Remote Code Execution
c97d7a37-2233-11df-96dd-001b2134ef46 openoffice.org -- multiple vulnerabilities
c9a6ae4a-df8b-11df-9573-00262d5ed8ee monotone -- remote denial of service in default setup
c9c14242-6843-11dc-82b6-02e0185f8d72 mediawiki -- cross site scripting vulnerability
c9d2e361-32fb-11db-a6e2-000e0c2e438a sppp -- buffer overflow vulnerability
ca0841ff-1254-11de-a964-0030843d3802 proftpd -- multiple sql injection vulnerabilities
ca44b64c-4453-11e4-9ea1-c485083ca99c Flash player -- Multiple security vulnerabilities in www/linux-*-flashplugin11
ca4d63fb-f15c-11e2-b183-20cf30e32f6d apache24 -- several vulnerabilities
ca543e06-207a-11d9-814e-0001020eed82 cacti -- SQL injection
ca5d3272-59e3-11e2-853b-00262d5ed8ee rubygem-rails -- multiple vulnerabilities
ca6c8f35-0a5f-11d9-ad6f-00061bc2ad93 apache -- heap overflow in mod_proxy
ca8e56d5-e856-11dc-b5af-0017319806e7 ghostscript -- zseticcspace() function buffer overflow vulnerability
ca9ce879-5ebb-11d9-a01c-0050569f0001 exim -- two buffer overflow vulnerabilities
cacaffbc-5e64-11d8-80e3-0020ed76ef5a GNU libtool insecure temporary file handling
cad045c0-81a5-11d8-9645-0020ed76ef5a zebra/quagga denial of service vulnerability
cae01d7b-110d-11df-955a-00219b0fc4d8 apache -- Prevent chunk-size integer overflow on platforms where sizeof(int) < sizeof(long)
cb252f01-7c43-11e3-b0a6-005056a37f68 bind -- denial of service vulnerability
cb470368-94d2-11d9-a9e0-0001020eed82 ethereal -- multiple protocol dissectors vulnerabilities
cb6c6c29-9c4f-11d8-9366-0020ed76ef5a proftpd IP address access control list breakage
cbfde1cd-87eb-11d9-aa18-0001020eed82 mozilla -- arbitrary code execution vulnerability
cc0fb686-6550-11d8-80e3-0020ed76ef5a file disclosure in phpMyAdmin
cc3bfec6-56cd-11e0-9668-001fd0d616cf php -- crash on crafted tag in exif
cc47fafe-f823-11dd-94d9-0030843d3802 typo3 -- cross-site scripting and information disclosure
cc4ce06b-e01c-11d9-a8bd-000cf18bbe54 p5-Mail-SpamAssassin -- denial of service vulnerability
cc627e6c-3b89-11e4-b629-6805ca0b3d42 phpMyAdmin -- XSRF/CSRF due to DOM based XSS in the micro history feature
cc9043cf-7f7a-426e-b2cc-8d1980618113 ruby -- Heap Overflow in Floating Point Parsing
cca97f5f-7435-11db-91de-0008743bf21a proftpd -- Remote Code Execution Vulnerability
ccd325d2-fa08-11d9-bc08-0001020eed82 isc-dhcpd -- format string vulnerabilities
ccd698df-8e20-11d8-90d1-0020ed76ef5a racoon remote denial of service vulnerability (ISAKMP header length field)
ccefac3e-2aed-11e3-af10-000c29789cb5 polarssl -- Timing attack against protected RSA-CRT implementation
cd286cc5-b762-11d9-bfb7-000c6ec775d9 ImageMagick -- ReadPNMImage() heap overflow vulnerability
cd68ff50-362b-11e0-ad36-00215c6a37bb phpMyAdmin -- multiple vulnerabilities
cd7e260a-6bff-11d9-a5df-00065be4b5b6 newsgrab -- insecure file and directory creation
cda566a0-2df0-4eb0-b70e-ed7a6fb0ab3c puppet27 and puppet -- multiple vulnerabilities
cdc4ff0e-d736-11e1-8221-e0cb4e266481 p5-RT-Authen-ExternalAuth -- privilege escalation
cddde37a-39b5-11dc-b3da-001921ab2fa4 dokuwiki -- XSS vulnerability in spellchecker backend
cdeb34e6-d00d-11e0-987e-00215c6a37bb stunnel -- heap corruption vulnerability
cdf14b68-3ff9-11d9-8405-00065be4b5b6 Open DC Hub -- remote buffer overflow vulnerability
cdf18ed9-7f4a-11d8-9645-0020ed76ef5a multiple vulnerabilities in ethereal
cdf450fc-db52-11e3-a9fc-00262d5ed8ee chromium -- multiple vulnerabilities
ce109fd4-67f3-11d9-a9e7-0001020eed82 mysql-scripts -- mysqlaccess insecure temporary file creation
ce29ce1d-971a-11dd-ab7e-001c2514716c cups -- multiple vulnerabilities
ce2f2ade-e7df-11dc-a701-000bcdc1757a phpmyadmin -- SQL injection vulnerability
ce46b93a-80f2-11d8-9645-0020ed76ef5a Buffer overflows and format string bugs in Emil
ce4b3af8-0b7c-11e1-846b-00235409fd3e libxml -- Multiple use-after-free vulnerabilities
ce502902-ca39-11e2-9673-001e8c75030d devel/subversion -- svnserve remotely triggerable DoS
ce680f0a-eea6-11e1-8bd8-0022156e8794 squidclamav -- cross-site scripting in default virus warning pages
ce6ac624-aec8-11d9-a788-0001020eed82 firefox -- PLUGINSPAGE privileged javascript execution
ce6ce2f8-34ac-11e0-8103-00215c6a37bb awstats -- arbitrary commands execution vulnerability
ce82bfeb-d276-11e1-92c6-14dae938ec40 dns/nsd -- DoS vulnerability from non-standard DNS packet
ce84e136-e2f6-11e1-a8ca-00262d5ed8ee chromium -- multiple vulnerabilities
cebed39d-9e6f-11e2-b3f5-003067c2616f opera -- moderately severe issue
cf0fb426-3f96-11d8-b096-0020ed76ef5a ProFTPD ASCII translation bug resulting in remote root compromise
cf3b9a96-f7bb-11da-9156-000e0c2e438a smbfs -- chroot escape
cf484358-b5d6-11dc-8de0-001c2514716c dovecot -- Specific LDAP + auth cache configuration may mix up user logins
cf495fd4-fdcd-11dd-9a86-0050568452ac Zend Framework -- Local File Inclusion vulnerability in Zend_View::render()
cf86c644-cb6c-11db-8e9d-000c6ec775d9 mod_jk -- long URL stack overflow vulnerability
cf91c1e4-2b6d-11de-931b-00e0815b8da8 ejabberd -- cross-site scripting vulnerability
cf96cd8d-48fb-11e0-98a6-0050569b2d21 redmine -- XSS vulnerability
cfe17ca6-6858-4805-ba1d-a60a61ec9b4d phpBB IP address spoofing
d01d10c7-de2d-11e0-b215-00215c6a37bb django -- multiple vulnerabilities
d022754d-8839-11d9-aa18-0001020eed82 mozilla -- insecure temporary directory vulnerability
d177d9f9-e317-11d9-8088-00123f0f7307 nwclient -- multiple vulnerabilities
d1bbc235-c0c9-45cd-8d2d-c1b8fd22e616 imap-uw -- authentication bypass when CRAM-MD5 is enabled
d1c39c8e-05ab-4739-870f-765490fa2052 openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients
d1ce8a4f-c235-11dd-8cbc-00163e000016 squirrelmail -- Cross site scripting vulnerability
d1dfc4c7-8791-11e3-a371-6805ca0b3d42 rt42 -- denial-of-service attack via the email gateway
d1f5e12a-fd5a-11e3-a108-080027ef73ec LZO -- potential buffer overrun when processing malicious input data
d2073237-5b52-11e3-80f7-c86000cbc6ec OpenTTD -- Denial of service using forcefully crashed aircrafts
d2102505-f03d-11d8-81b0-000347a4fa7d cvs -- numerous vulnerabilities
d226626c-857f-11e0-95cc-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
d23119df-335d-11e2-b64c-c8600054b392 mozilla -- multiple vulnerabilities
d29dc506-8aa6-11db-bd0d-00123ffe8333 wv -- Multiple Integer Overflow Vulnerabilities
d2a43243-087b-11db-bc36-0008743bf21a mutt -- Remote Buffer Overflow Vulnerability
d2a892b9-2605-11e4-9da0-00a0986f28c4 PHP multiple vulnerabilities
d2b48d30-ea97-11db-a802-000fea2763ce lighttpd -- Remote DOS in CRLF parsing
d2b80c7c-3aae-11da-9484-00123ffe8333 zope -- expose RestructuredText functionality to untrusted users
d2b8a963-3d59-11dc-b3d3-0016179b2dd5 p5-Net-DNS -- multiple Vulnerabilities
d2c2952d-85a1-11dc-bfff-003048705d5a py-django -- denial of service vulnerability
d3324c55-3f11-11e4-ad16-001999f8d30b squid -- Buffer overflow in SNMP processing
d337b206-200f-11dc-a197-0011098b2f36 xpcd -- buffer overflow
d3527663-4ccb-11db-b48d-00508d6a62df eyeOS -- multiple XSS security bugs
d371b627-6ed5-11d9-bd18-000a95bc6fae zhcon -- unauthorized file access
d38e1810-9ef7-11da-b410-000e0c2e438a tor -- malicious tor server can locate a hidden service
d3921810-3c80-11e1-97e8-00215c6a37bb php -- multiple vulnerabilities
d3e96508-056b-4259-88ad-50dc8d1978a6 Ruby -- XSS exploit of RDoc documentation generated by rdoc
d42e5b66-6ea0-11df-9c8d-00e0815b8da8 sudo -- Secure path vulnerability
d47e9d19-5016-11d9-9b5f-0050569f0001 php -- multiple vulnerabilities
d4a358d3-e09a-11dd-a765-0030843d3802 nagios -- web interface privilege escalation vulnerability
d4a7054a-6d96-11d9-a9e7-0001020eed82 yamt -- arbitrary command execution vulnerability
d4bd4046-93a6-11d9-8378-000bdb1444a4 rxvt-unicode -- buffer overflow vulnerability
d4c70df5-335d-11da-9c70-0040f42d58c6 weex -- remote format string vulnerability
d51a7e6e-c546-11d9-9aed-000e0c2e438a cdrdao -- unspecified privilege escalation vulnerability
d560b346-08a2-11e0-bcca-0050568452ac YUI JavaScript library -- JavaScript injection exploits in Flash components
d5e0317e-5e45-11e2-a113-c48508086173 java 7.x -- security manager bypass
d5e1aac8-db0b-11dd-ae30-001cc0377035 xterm -- DECRQSS remote command execution vulnerability
d60199df-7fb3-11e2-9c5a-000d601460a4 otrs -- XSS vulnerability in Firefox and Opera could lead to remote code execution
d656296b-33ff-11d9-a9e7-0001020eed82 ruby -- CGI DoS
d67b517d-8214-11de-88ea-001a4d49522b bugzilla -- product name information leak
d6b092bd-61e1-11da-b64c-0001020eed82 opera -- multiple vulnerabilities
d71da236-9a94-11dd-8f42-001c2514716c libxml2 -- two vulnerabilities
d754b7d2-b6a7-11df-826c-e464a695cb21 wget -- multiple HTTP client download filename vulnerability
d79fc873-b5f9-11e0-89b4-001ec9578670 phpmyadmin -- multiple vulnerabilities
d7a43ee6-d2d5-11e2-9894-002590082ac6 owncloud -- Multiple security vulnerabilities
d7af61c8-2cc0-11d8-9355-0020ed76ef5a lftp HTML parsing vulnerability
d7c1d00d-9d2e-11da-8c1d-000e0c2e438a ipfw -- IP fragment denial of service
d7cd5015-08c9-11da-bc08-0001020eed82 gforge -- XSS and email flood vulnerabilities
d7dbd2db-599c-11e1-a2fb-14dae9ebcf89 mozilla -- heap-buffer overflow
d846af5b-00f4-11e2-b6d0-00e0814cab4e jenkins -- multiple vulnerabilities
d864a0a7-6f27-11dd-acfe-00104b9e1a4a gnutls -- "gnutls_handshake()" Denial of Service
d8769838-8814-11d8-90d1-0020ed76ef5a racoon fails to verify signature during Phase 1
d881d254-70c6-11e2-862d-080027a5ec9a libexif -- multiple remote vulnerabilities
d8c901ff-0f0f-11e1-902b-20cf30e32f6d Apache 1.3 -- mod_proxy reverse proxy exposure
d8e1aadd-ee68-11d9-8310-0001020eed82 clamav -- cabinet file handling DoS vulnerability
d8e55d65-81d6-11d9-a9e7-0001020eed82 opera -- kfmclient exec command execution vulnerability
d8fbf13a-6215-11db-a59e-0211d85f11fb kdelibs -- integer overflow in khtml
d9307a41-c4d7-11da-b2fb-000e0c2e438a zoo -- stack based buffer overflow
d9405748-1342-11dc-a35c-001485ab073e mod_jk -- information disclosure
d944719e-42f4-4864-89ed-f045b541919f gtar -- Directory traversal vulnerability
d9649816-5e0d-11e3-8d23-3c970e169bc2 drupal -- multiple vulnerabilities
d9867f50-54d0-11dc-b80b-0016179b2dd5 claws-mail -- POP3 Format String Vulnerability
d9b01c08-59b3-11de-828e-00e0815b8da8 git -- denial of service vulnerability
d9dbe6e8-84da-11e3-98bd-080027f2d077 varnish -- DoS vulnerability in Varnish HTTP cache
d9dc2697-dadf-11da-912f-00123ffe8333 phpwebftp -- "language" Local File Inclusion
da185955-5738-11de-b857-000f20797ede mozilla -- multiple vulnerabilities
da317bc9-59a6-11e1-bc16-0023ae8e59f0 piwik -- xss and click-jacking issues
da3d381b-0ee6-11e0-becc-0022156e8794 pecl-phar -- format string vulnerability
da4b89ad-b28f-11e3-99ca-f0def16c5c1b nginx-devel -- SPDY heap buffer overflow
da5c4072-8082-11dd-9c8c-001c2514716c clamav -- CHM Processing Denial of Service
da690355-1159-11d9-bc4a-000c41e2cdad mozilla -- vCard stack buffer overflow
da6f265b-8f3d-11d8-8b29-0020ed76ef5a kdepim exploitable buffer overflow in VCF reader
da9e6438-bfc0-11d8-b00e-000347a4fa7d MoinMoin administrative group name privilege escalation vulnerability
dade3316-9d31-11da-8c1d-000e0c2e438a IEEE 802.11 -- buffer overflow
daf045d7-b211-11dd-a987-000c29ca8953 net-snmp -- DoS for SNMP agent via crafted GETBULK request
daf0a339-9850-11e2-879e-d43d7e0c7c02 asterisk -- multiple vulnerabilities
db0c4b00-a24c-11e2-9601-000d601460a4 rubygem-rails -- multiple vulnerabilities
db1d3340-e83b-11e1-999b-e0cb4e266481 phpMyAdmin -- Multiple XSS in Table operations, Database structure, Trigger and Visualize GIS data pages
db449245-870d-11dc-a3ec-001921ab2fa4 openldap -- multiple remote denial of service vulnerabilities
dba5d1c9-9f29-11e1-b511-003067c2616f OpenSSL -- DTLS and TLS 1.1, 1.2 denial of service
dbdac023-80e1-11e2-9a29-001060e06fd4 linux-flashplugin -- multiple vulnerabilities
dbf338d0-dce5-11e1-b655-14dae9ebcf89 mozilla -- multiple vulnerabilities
dc8741b9-c5d5-11e0-8a8e-00151735203a bugzilla -- multiple vulnerabilities
dc8c08c7-1e7c-11db-88cf-000c6ec775d9 apache -- mod_rewrite buffer overflow vulnerability
dc930435-d59f-11da-8098-00123ffe8333 amaya -- Attribute Value Buffer Overflow Vulnerabilities
dc96ac1f-86b1-11e0-9e85-00215af774f0 Unbound -- an empty error packet handling assertion failure
dc9f8335-2b3b-11e0-a91b-00e0815b8da8 isc-dhcp-server -- DHCPv6 crash
dca0a345-ed81-11d9-8310-0001020eed82 wordpress -- multiple vulnerabilities
dd116b19-64b3-11e3-868f-0025905a4771 mozilla -- multiple vulnerabilities
dd698b76-42f7-11e1-a1b6-14dae9ebcf89 asterisk -- SRTP Video Remote Crash Vulnerability
dd7aa4f1-102f-11d9-8a8a-000c41e2cdad php -- memory_limit related vulnerability
dd8f2394-fd08-11de-b425-00215c6a37bb powerdns-recursor -- multiple vulnerabilities
dd943fbb-d0fe-11df-95a8-00219b0fc4d8 apr -- multiple vunerabilities
de16b056-132e-11d9-bc4a-000c41e2cdad samba -- remote file disclosure
de2bc01f-dc44-11e1-9f4d-002354ed89bc Apache -- Insecure LD_LIBRARY_PATH handling
de2fab2d-0a37-11dc-aae2-00304881ac9a FreeType 2 -- Heap overflow vulnerability
de4d4110-ebce-11dc-ae14-0016179b2dd5 mplayer -- multiple vulnerabilities
de6d8290-aef7-11e1-898f-14dae938ec40 mail/sympa* -- Multiple vulnerabilities in Sympa archive management
dea7df85-d96c-11dc-9bfc-000e0c092e7a cacti -- Multiple security vulnerabilities have been discovered
debbb39c-fdb3-11d9-a30d-00b0d09acbfc nbsmtp -- format string vulnerability
dee44ba9-08ab-11e2-a044-d0df9acfd7e5 OpenX -- SQL injection vulnerability
defce068-39aa-11de-a493-001b77d09812 wireshark -- multiple vulnerabilities
df333ede-a8ce-11d8-9c6d-0020ed76ef5a URI handler vulnerabilities in several browsers
df428c01-ed91-11e2-9466-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
df4a7d21-4b17-11dc-9fc2-001372ae3ab9 opera -- Vulnerability in javascript handling
df7754c0-2294-11e4-b505-000c6e25e3e9 chromium -- multiple vulnerabilities
dfb71c00-9d44-11da-8c1d-000e0c2e438a FreeBSD -- Infinite loop in SACK handling
dfc1daa8-61de-11da-b64c-0001020eed82 opera -- command line URL shell command injection
dfd92cb2-7d48-11e2-ad48-00262d5ed8ee chromium -- multiple vulnerabilities
dfe40cff-9c3f-11e0-9bec-6c626dd55a41 mozilla -- multiple vulnerabilities
e0070221-2dd8-11d9-a9e7-0001020eed82 wzdftpd -- remote DoS
e02c572f-2af0-11e2-bb44-003067b2972c weechat -- Crash or freeze when decoding IRC colors in strings
e02e6a4e-6b26-11df-96b2-0015587e2cc1 cacti -- multiple vulnerabilities
e050119b-3856-11df-b2b2-002170daae37 postgresql -- bitsubstr overflow
e08c596e-cb28-11df-9c1b-0011098ad87f horde-gollem -- XSS vulnerability
e0a969e4-a512-11e1-90b4-e0cb4e266481 RT -- Multiple Vulnerabilities
e0b342a1-d2ae-11da-a672-000e0c2e438a wordpress -- full path disclosure
e1156e90-7ad6-11de-b26a-0048543d60ce squid -- several remote denial of service vulnerabilities
e11955ca-187c-11e2-be36-00215af774f0 xinetd -- attackers can bypass access restrictions if tcpmux-servers service enabled
e135f0c9-375f-11e3-80b7-20cf30e32f6d bugzilla -- multiple vulnerabilities
e15f2356-9139-11de-8f42-001aa0166822 apache22 -- several vulnerabilities
e16293f0-26b7-11d9-9289-000c41e2cdad gaim -- heap overflow exploitable by malicious GroupWise server
e177c410-1943-11e0-9d1c-000c29ba66d2 mediawiki -- Clickjacking vulnerabilities
e190ca65-3636-11dc-a697-000c6ec775d9 mozilla -- multiple vulnerabilities
e19e74a4-a712-11df-b234-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
e1aa3bdd-839a-4a77-8617-cca439a8f9fc rubygem-ruby_parser -- insecure tmp file usage
e1f99d59-81aa-4662-bf62-c1076f5016c8 py-graphite-web -- Multiple vulnerabilities
e21c7c7a-0116-11e3-9e83-3c970e169bc2 samba -- denial of service vulnerability
e2476979-da74-11da-a67b-0013d4a4a40e firefox -- denial of service vulnerability
e24797af-803d-11dc-b787-003048705d5a firefox -- OnUnload Javascript browser entrapment vulnerability
e25566d5-6d3f-11d8-83a4-000a95bc6fae multiple buffer overflows in xboing
e27a1af3-8d21-11e0-a45d-001e8c75030d Subversion -- multiple vulnerabilities
e27ca763-4721-11e0-bdc4-001e8c75030d subversion -- remote HTTP DoS vulnerability
e285a1f4-4568-11dd-ae96-0030843d3802 phpmyadmin -- Cross Site Scripting Vulnerabilities
e289f7fd-88ac-11d8-90d1-0020ed76ef5a many out-of-sequence TCP packets denial-of-service
e2a92664-1d60-11db-88cf-000c6ec775d9 mozilla -- multiple vulnerabilities
e2e8d374-2e40-11db-b683-0008743bf21a horde -- Phishing and Cross-Site Scripting Vulnerabilities
e319da0b-a228-11da-b410-000e0c2e438a gedit -- format string vulnerability
e31d44a2-21e3-11d9-9289-000c41e2cdad imwheel -- insecure handling of PID file
e3244a7b-5603-11e3-878d-20cf30e32f6d subversion -- multiple vulnerabilities
e329550b-54f7-11db-a5ae-00508d6a62df php -- _ecalloc Integer Overflow Vulnerability
e34d0c2e-9efb-11da-b410-000e0c2e438a rssh -- privilege escalation vulnerability
e39caf05-2d6f-11df-aec2-000c29ba66d2 egroupware -- two vulnerabilities
e3cf89f0-53da-11d9-92b7-ceadd4ac2edd phpbb -- arbitrary command execution and other vulnerabilities
e3e266e9-5473-11d9-a9e7-0001020eed82 xpdf -- buffer overflow vulnerability
e3e30d99-58a8-4a3f-8059-a8b7cd59b881 openfire -- Openfire No Password Changes Security Bypass
e3e788aa-e9fd-11e2-a96e-60a44c524f57 otrs -- Sql Injection + Xss Issue
e3f0374a-7ad6-11e2-84cd-d43d7e0c7c02 mozilla -- multiple vulnerabilities
e3f64457-cccd-11e2-af76-206a8a720317 krb5 -- UDP ping-pong vulnerability in the kpasswd (password changing) service. [CVE-2002-2443]
e3ff776b-2ba6-11e1-93c6-0011856a6e37 mozilla -- multiple vulnerabilities
e44fe906-df27-11e0-a333-001cc0a36e12 phpMyAdmin -- multiple XSS vulnerabilities
e454ca2f-f88d-11e0-b566-00163e01a509 PivotX -- Remote File Inclusion Vulnerability of TimThumb
e465159c-4817-11e1-89b4-001ec9578670 mpack -- Information disclosure
e480ccb2-6bc8-11d9-8dbe-000a95bc6fae fcron -- multiple vulnerabilities
e4833927-86e5-11e0-a6b4-000a5e1e33c6 Erlang -- ssh library uses a weak random number generator
e4c62abd-5065-11db-a5ae-00508d6a62df tikiwiki -- multiple vulnerabilities
e4dac715-c818-11df-a92c-0015587e2cc1 squid -- Denial of service vulnerability in request handling
e4fcf020-0447-11e0-becc-0022156e8794 exim -- local privilege escalation
e500b9bf-ca3e-11df-aade-0050568f000c FreeBSD -- BIND named(8) cache poisoning with DNSSEC validation
e5090d2a-dbbe-11df-82f8-0015f2db7bde Webkit-gtk2 -- Multiple Vulnabilities
e50a7476-bb2d-11da-b2fb-000e0c2e438a ipsec -- reply attack vulnerability
e50b04e8-9c55-11d8-9366-0020ed76ef5a xine-lib arbitrary file overwrite
e51d5b1a-4638-11e1-9f47-00e0815b8da8 FreeBSD -- pam_ssh() does not validate service names
e5414d0c-2ade-11e3-821d-00262d5ed8ee chromium -- multiple vulnerabilities
e546c7ce-ce46-11db-bc24-0016179b2dd5 trac -- cross site scripting vulnerability
e55f948f-d729-11e0-abd1-0017f22d6707 security/cfs -- buffer overflow
e595e170-6771-11dc-8be8-02e0185f8d72 openoffice -- arbitrary command execution vulnerability
e5a9de5f-c6bc-11dc-b9f1-00a0cce0781e IRC Services-- Denial of Service Vulnerability
e5afdf63-1746-11da-978e-0001020eed82 evolution -- remote format string vulnerabilities
e5d29309-e0db-11dc-97b2-001c2514716c openldap -- modrdn Denial of Service vulnerability
e5e2883d-ceb9-11d8-8898-000d6111a684 MySQL authentication bypass / buffer overflow
e60d9e65-3f6b-11e4-ad16-001999f8d30b asterisk -- Remotely triggered crash
e6161b65-1187-11e2-afe3-00262d5ed8ee chromium -- multiple vulnerabilities
e6296105-449b-11db-ba89-000c6ec775d9 mozilla -- multiple vulnerabilities
e62ab2af-4df4-11e3-b0cf-00262d5ed8ee chromium -- multiple memory corruption issues
e65ad1bf-0d8b-11da-90d0-00304823c0d3 pear-XML_RPC -- remote PHP code injection vulnerability
e666498a-852a-11e0-8f78-080027ef73ec Opera -- code injection vulnerability through broken frameset handling
e66a6e2f-b0d5-11e2-9164-0016e6dcb562 FreeBSD -- NFS remote denial of service
e6839625-fdfa-11e2-9430-20cf30e32f6d typo3 -- Multiple vulnerabilities in TYPO3 Core
e69ba632-326f-11d9-b5b7-000854d03344 ez-ipupdate -- format string vulnerability
e6a7636a-02d0-11e4-88b6-080027671656 dbus -- multiple vulnabilities
e6f0edd8-0b40-11d9-8a8a-000c41e2cdad gnu-radius -- SNMP-related denial-of-service
e72fd82b-fa01-11d9-bc08-0001020eed82 dnrd -- remote buffer and stack overflow vulnerabilities
e77befb5-f3f9-11e0-8b5c-b482fe3f522d OpenTTD -- Denial of service via improperly validated commands
e79876e4-5061-11db-a5ae-00508d6a62df punbb -- NULL byte injection vulnerability
e7bb3885-da40-11e3-9ecb-2c4138874f7d libxml2 -- lack of end-of-document check DoS
e7bc5600-eaa0-11de-bd9c-00215c6a37bb postgresql -- multiple vulnerabilities
e7d91a3c-a7c9-11df-870c-00242b513d7c vlc -- invalid id3v2 tags may lead to invalid memory dereferencing
e7fd27b2-3ae9-11e1-8b5c-00262d5ed8ee torcs -- untrusted local library loading
e811aaf1-f015-11d8-876f-00902714cc7c Ruby insecure file permissions in the CGI session management
e848a92f-0e7d-11de-92de-000bcdc1757a epiphany -- untrusted search path vulnerability
e86fbb5f-0d04-11da-bc08-0001020eed82 awstats -- arbitrary code execution vulnerability
e879ca68-e01b-11d9-a8bd-000cf18bbe54 squirrelmail -- Several cross site scripting vulnerabilities
e8a6a16d-e498-11dc-bb89-000bcdc1757a libxine -- buffer overflow vulnerability
e8d4800f-1547-11d9-90a3-00010327614a distcc -- incorrect parsing of IP access control rules
e92d8f6b-a1c0-11db-9ddc-0011098b2f36 sircd -- remote operator privilege escalation vulnerability
e936d612-253f-11da-bc01-000e0c2e438a apache -- Certificate Revocation List (CRL) off-by-one vulnerability
e93bc5b0-bb2e-11da-b2fb-000e0c2e438a OPIE -- arbitrary password change
e94cb43d-0c4a-11db-9016-0050bf27ba24 horde -- various problems in dereferrer
e969e6cb-8911-11db-9d01-0016179b2dd5 tnftpd -- Remote root Exploit
e9ecaceb-db0d-11dd-aa56-000bcdf0a03b FreeBSD -- Cross-site request forgery in ftpd(8)
e9f9d232-0cb2-11d9-8a8a-000c41e2cdad mozilla -- security icon spoofing
e9fca207-e399-11de-881e-001aa0166822 expat2 -- buffer over-read and crash
ea09c5df-4362-11db-81e1-000e0c2e438a php -- multiple vulnerabilities
ea0f45e2-6c4b-11e2-98d9-003067c2616f opera -- execution of arbitrary code
ea2411a4-08e8-11de-b88a-0022157515b2 pngcrush -- libpng Uninitialised Pointer Arrays Vulnerability
ea2ddc49-3e8e-11e1-8095-5404a67eef98 ffmpeg -- multiple vulnerabilities
eab8c3bd-e50c-11de-9cd0-001a926c7637 ruby -- heap overflow vulnerability
eae8e3cf-9dfe-11e2-ac7f-001fd056c417 otrs -- Information disclosure and Data manipulation
eb12ebee-b7af-11e1-b5e0-000c299b62e1 clamav -- multiple vulnerabilities
eb29a575-3381-11da-8340-000e0c2e438a qpopper -- multiple privilege escalation vulnerabilities
eb426e82-ab68-11e3-9d09-000c2980a9f3 mutt -- denial of service, potential remote code execution
eb5124a4-8a20-11db-b033-00123ffe8333 clamav -- Multipart Nestings Denial of Service
eb9212f7-526b-11de-bbf2-001b77d09812 apr -- multiple vulnerabilities
eba70db4-6640-11e1-98af-00262d8b701d dropbear -- arbitrary code execution
eba9aa94-549c-11e1-b6b7-0011856a6e37 mozilla -- use after free in nsXBLDocumentInfo::ReadPrototypeBindings
ebd877b9-7ef4-4375-b1fd-c67780581898 ruby -- Hostname check bypassing vulnerability in SSL client
ebdf65c7-2ca6-11d8-9355-0020ed76ef5a qpopper format string vulnerability
ebeed063-b328-11de-b6a5-0030843d3802 virtualbox -- privilege escalation
ebffe27a-f48c-11d8-9837-000c41e2cdad qt -- image loader vulnerabilities
ec09baa3-a9f5-11d9-a788-0001020eed82 gaim -- remote DoS on receiving certain messages over IRC
ec255bd8-02c6-11e2-92d1-000d601460a4 php5-sqlite -- open_basedir bypass
ec2f2ff5-f710-11da-9156-000e0c2e438a freeradius -- multiple vulnerabilities
ec34d0c2-1799-11e2-b4ab-000c29033c32 Zend Framework -- Multiple vulnerabilities via XXE injection
ec41c3e2-129c-11dd-bab7-0016179b2dd5 python -- Integer Signedness Error in zlib Module
ec89dc70-2515-11e2-8eda-000a5e1e33c6 webmin -- potential XSS attack via real name field
ec8f449f-40ed-11df-9edc-000f20797ede firefox -- Re-use of freed object due to scope confusion
eca6195a-c233-11d9-804c-02061b08fc24 mozilla -- code execution via javascript: IconURL vulnerability
ecad44b9-e663-11dd-afcd-00e0815b8da8 git -- gitweb privilege escalation
ecea9e92-0be5-4931-88da-8772d044972a mcollective -- cert valication issue
ecedde1c-5128-11dd-a4e1-0030843d3802 drupal -- multiple vulnerabilities
ecf68408-a9f5-11d9-a788-0001020eed82 gaim -- jabber remote crash
ed124f8c-82a2-11db-b46b-0012f06707f0 libmusicbrainz -- multiple buffer overflow vulnerabilities
ed1d404d-2784-11d9-b954-000bdb1444a4 horde -- cross-site scripting vulnerability in help window
ed529baa-21c6-11db-b625-02e081235dab gnupg -- 2 more possible memory allocation attacks
ed536336-1c57-11e1-86f4-e0cb4e266481 phpMyAdmin -- Multiple XSS
ed7fa1b4-ff59-11df-9759-080027284eaa proftpd -- Compromised source packages backdoor
eda151d8-4638-11e1-9f47-00e0815b8da8 FreeBSD -- pam_ssh improperly grants access when user account has unencrypted SSH private keys
edabe438-542f-11db-a5ae-00508d6a62df php -- open_basedir Race Condition Vulnerability
edd201a5-8fc3-11e2-b131-000c299b62e1 piwigo -- CSRF/Path Traversal
edef3f2f-82cf-11df-bcce-0018f3e2eb82 png -- libpng decompression buffer overflow
edf47177-fe3f-11e0-a207-0014a5e3cda6 phpLDAPadmin -- Remote PHP code injection vulnerability
edf61c61-0f07-11d9-8393-000103ccf9d6 php -- strip_tags cross-site scripting vulnerability
ee23aa09-a175-11de-96c0-0011098ad87f horde-base -- multiple vulnerabilities
ee68923d-f2f5-11e1-8014-00262d5ed8ee chromium -- multiple vulnerabilities
ee6b5956-6a89-11da-b96e-000fb586ba73 nag -- Cross site scripting vulnerabilities in several of the tasklist name and task data fields
ee6fa2bd-406a-11dd-936a-0015af872849 php -- input validation error in safe_mode
eeae6cce-d05c-11d9-9aed-000e0c2e438a mysql-server -- insecure temporary file creation
eeb1c128-33e7-11d9-a9e7-0001020eed82 ImageMagick -- EXIF parser buffer overflow
eeebd55d-6a88-11da-b96e-000fb586ba73 turba -- Cross site scripting vulnerabilities in several of the address book name and contact data fields
eef56761-11eb-11e1-bb94-001c140104d4 hiawatha -- memory leak in PreventSQLi routine
ef253f8b-0727-11d9-b45d-000c41e2cdad xpm -- image decoding vulnerabilities
ef2ffb03-f2b0-11db-ad25-0010b5a0a860 mod_perl -- remote DoS in PATH_INFO parsing
ef3306fc-8f9b-11db-ab33-000e0c2e438a bind9 -- Denial of Service in named(8)
ef410571-a541-11d9-a788-0001020eed82 wu-ftpd -- remote globbing DoS vulnerability
ef417da3-1640-11e2-999b-e0cb4e266481 phpMyAdmin -- Multiple XSS due to unescaped HTML output in Trigger, Procedure and Event pages and Fetching the version information from a non-SSL site is vulnerable to a MITM attack
efa1344b-5477-11d9-a9e7-0001020eed82 ethereal -- multiple vulnerabilities
efa663eb-8754-11e3-9a47-00163e1ed244 strongswan -- multiple DoS vulnerabilities
efaa4071-b700-11e2-b1b9-f0def16c5c1b nginx -- multiple vulnerabilities
efc4819b-0b2d-11d9-bfe1-000bdb1444a4 imp3 -- XSS hole in the HTML viewer
efdd0edc-da3d-11e3-9ecb-2c4138874f7d libxml2 -- entity substitution DoS
f01292a0-db3c-11e1-a84b-00e0814cab4e django -- multiple vulnerabilities
f04cc5cb-2d0b-11d8-beaf-000a95c4d922 bind8 negative cache poison attack
f08e2c15-ffc9-11e0-b0f3-bcaec565249c cacti -- Multiple vulnabilites
f0db930b-496b-11d9-bf86-0050569f0001 squid -- possible information disclosure
f0f97b94-3f95-11de-a3fd-0030843d3802 ghostscript -- buffer overflow vulnerability
f0fa19dd-c060-11dc-982e-001372fd0af2 drupal -- cross site scripting (register_globals)
f109b02f-f5a4-11e3-82e9-00a098b18457 asterisk -- multiple vulnerabilities
f113bbeb-e3ac-11dc-bb89-000bcdc1757a moinmoin -- multiple vulnerabilities
f115f693-36b2-11e2-a633-902b343deec9 FreeBSD -- Insufficient message length validation for EAP-TLS messages
f11b219a-44b6-11d9-ae2f-021106004fd6 rssh & scponly -- arbitrary command execution
f11d3b22-88c6-11da-a7b2-0060084a00e5 fetchmail -- crash when bouncing a message
f1331504-8849-11df-89b8-00151735203a bugzilla -- information disclosure
f14ad681-5b88-11dc-812d-0011098b2f36 rkhunter -- insecure temporary file creation
f154a3c7-f7f4-11df-b617-00e0815b8da8 isc-dhcp-server -- Empty link-address denial of service
f1892066-0e74-11de-92de-000bcdc1757a apache -- Cross-site scripting vulnerability
f1c4d133-e6d3-11db-99ea-0060084a00e5 fetchmail -- insecure APOP authentication
f1e0164e-b67b-11dd-a55e-00163e000016 libxml2 -- multiple vulnerabilities
f1f163ce-9e09-11da-b410-000e0c2e438a phpicalendar -- file disclosure vulnerability
f1f6f6da-9d2f-11dc-9114-001c2514716c firefox -- multiple remote unspecified memory corruption vulnerabilities
f235fe7a-b9ca-11db-bf0f-0013720b182d samba -- potential Denial of Service bug in smbd
f241641e-f5ea-11d9-a6db-000d608ed240 drupal -- PHP code execution vulnerabilities
f29fea8f-b19f-11dd-a55e-00163e000016 mozilla -- multiple vulnerabilities
f2b43905-3545-11e0-8e81-0022190034c0 openoffice.org -- Multiple vulnerabilities
f2d5e56e-67eb-11d9-a9e7-0001020eed82 unrtf -- buffer overflow vulnerability
f2d6a5e1-26b9-11d9-9289-000c41e2cdad gaim -- MSN denial-of-service vulnerabilities
f3017ce1-32a4-11d9-a9e7-0001020eed82 socat -- format string vulnerability
f3148a05-0fa7-11e0-becc-0022156e8794 php -- corruption of $GLOBALS and $this variables via extract() method
f358de71-bf64-11dc-928b-0016179b2dd5 maradns -- CNAME record resource rotation denial of service
f38c87a5-4a3e-11da-8ba2-0004614cc33d base -- PHP SQL injection vulnerability
f3d24aee-e5ad-11e2-b183-20cf30e32f6d apache22 -- several vulnerabilities
f3d3f621-38d8-11d9-8fff-000c6e8f12ef smbd -- buffer-overrun vulnerability
f3eec2b5-8cd8-11d9-8066-000a95bc6fae postnuke -- SQL injection vulnerabilities
f4428842-a583-4a4c-89b7-297c3459a1c3 bogofilter -- RFC 2047 decoder denial-of-service vulnerability
f45c0049-be72-11e1-a284-0023ae8e59f0 pycrypto -- vulnerable ElGamal key generation
f46c4c6a-ba25-11e1-806a-001143cd36d8 joomla -- Privilege Escalation
f47f2746-12c5-11dd-bab7-0016179b2dd5 mailman -- script insertion vulnerability
f49ba347-2190-11dd-907c-001c2514716c django -- XSS vulnerability
f4a0212f-f797-11e2-9bb9-6805ca0b3d42 phpMyAdmin -- multiple vulnerabilities
f4af098d-d921-11da-ad4a-00123ffe8333 jabberd -- SASL Negotiation Denial of Service Vulnerability
f4b95430-51d8-11da-8e93-0010dc4afb40 flyspray -- cross-site scripting vulnerabilities
f4ff7434-9505-11db-9ddc-0011098b2f36 plone -- user can masquerade as a group
f524d8e0-3d83-11e2-807a-080027ef73ec bogofilter -- heap corruption by invalid base64 input
f54584bc-7d2b-11e2-9bd1-206a8a720317 krb5 -- null pointer dereference in the KDC PKINIT code [CVE-2013-1415]
f56390a4-4638-11e1-9f47-00e0815b8da8 FreeBSD -- Buffer overflow in handling of UNIX socket addresses
f599dfc4-3ec2-11e2-8ae1-001a8056d0b5 tomcat -- bypass of security constraints
f59dda75-5ff4-11de-a13e-00e0815b8da8 tor-devel -- DNS resolution vulnerabiliity
f5a76faf-244c-11dd-b143-0211d880e350 libvorbis -- various security issues
f5b29ec0-71f9-11dc-8c6a-00304881ac9a ImageMagick -- multiple vulnerabilities
f5c4d7f7-9f4b-11dd-bab1-001999392805 opera -- multiple vulnerabilities
f5c58fc1-49c0-11dd-b0ba-00163e000016 py-pylons -- Path traversal bug
f5e52bf5-fc77-11db-8163-000e0c2e438a php -- multiple vulnerabilities
f5f00804-a03b-11e1-a284-0023ae8e59f0 inspircd -- buffer overflow
f6377f08-12a7-11dd-bab7-0016179b2dd5 php -- integer overflow vulnerability
f63bf080-619d-11e1-91af-003067b2972c linux-flashplugin -- multiple vulnerabilities
f6429c24-4fc9-11df-83fb-0015587e2cc1 moodle -- multiple vulnerabilities
f6447303-9ec9-11da-b410-000e0c2e438a heartbeat -- insecure temporary file creation vulnerability
f645aa90-a3e8-11e3-a422-3c970e169bc2 gnutls -- multiple certificate verification issues
f650d5b8-ae62-11d9-a788-0001020eed82 mozilla -- privilege escalation via DOM property overrides
f6680c03-0bd8-11d9-8a8a-000c41e2cdad tiff -- RLE decoder heap overflows
f66e011d-13ff-11da-af41-0004614cc33d elm -- remote buffer overflow in Expires header
f6bff909-4a26-11db-a4cc-000a48049292 libmms -- stack-based buffer overflow
f6eb2279-ca3f-11df-aade-0050568f000c FreeBSD -- Insufficient environment sanitization in jail(8)
f6f19735-9245-4918-8a60-87948ebb4907 wireshark -- multiple vulnerabilities
f70d09cb-0c46-11db-aac7-000c6ec775d9 mambo -- SQL injection vulnerabilities
f70f8860-e8ee-11d9-b875-0001020eed82 kernel -- ipfw packet matching errors with address tables
f74dc01b-0e83-11da-bc08-0001020eed82 acroread -- plug-in buffer overflow vulnerability
f755545e-6fcd-11d9-abec-00061bd2d56f xpdf -- makeFileKey2() buffer overflow vulnerability
f762ccbb-baed-11dc-a302-000102cc8983 linux-realplayer -- multiple vulnerabilities
f7809d9e-6af0-11e2-8e32-080027d768d3 poweradmin -- multiple XSS vulnerabilities
f7a3b18c-624c-4703-9756-b6b27429e5b0 leafnode denial-of-service triggered by article request
f7ba20aa-6b5a-11dd-9d79-001fc61c2a55 ruby -- DoS vulnerability in WEBrick
f7c87a8a-55d5-11e2-a255-c8600054b392 asterisk -- multiple vulnerabilities
f7d838f2-9039-11e0-a051-080027ef73ec fetchmail -- STARTTLS denial of service
f7e8d2ca-410e-40b2-8748-3abd021e44a9 xtrlock -- X display locking bypass
f7eb0b23-7099-11da-a15c-0060084a00e5 fetchmail -- null pointer dereference in multidrop mode with headerless email
f82c85d8-1c6e-11df-abb2-000f20797ede mozilla -- multiple vulnerabilities
f8536143-9bc4-11d9-b8b3-000a95bc6fae sylpheed -- buffer overflow in header processing
f8551668-de09-4d7b-9720-f1360929df07 tcpdump ISAKMP payload handling remote denial-of-service
f866d2af-bbba-11df-8a8d-0008743bf21a vim6 -- heap-based overflow while parsing shell metacharacters
f8a913cc-1322-11e3-8ffa-20cf30e32f6d svnserve is vulnerable to a local privilege escalation vulnerability via symlink attack.
f8b0f83c-8bb3-11dc-bffa-0016179b2dd5 gftp -- multiple vulnerabilities
f8d3689e-6770-11dc-8be8-02e0185f8d72 bugzilla -- "createmailregexp" security bypass vulnerability
f900bda8-0472-11db-bbf7-000c6ec775d9 gnupg -- user id integer overflow vulnerability
f9258873-2ee2-11e0-afcd-0015f2db7bde vlc -- Insufficient input validation in MKV demuxer
f927e06c-1109-11e4-b090-20cf30e32f6d apache22 -- several vulnerabilities
f92e1bbc-5e18-11d9-839a-0050da134090 tnftp -- mget does not check for directory escapes
f93be979-a992-11d8-aecc-000d610a3b12 cvs pserver remote heap buffer overflow
f94befcd-1289-11e2-a25e-525400272390 gitolite -- path traversal vulnerability
f95a9005-88ae-11d8-90d1-0020ed76ef5a shmat reference counting bug
f969bad7-46fc-11e3-b6ee-00269ee29e57 Quassel IRC -- SQL injection vulnerability
f9810c43-87a5-11e3-9214-00262d5ed8ee chromium -- multiple vulnerabilities
f98dea27-d687-11dd-abd1-0050568452ac twiki -- multiple vulnerabilities
f9e3e60b-e650-11d8-9b0a-000347a4fa7d libpng stack-based buffer overflow and other code concerns
f9e96930-e6df-11dc-8c6a-00304881ac9a pcre -- buffer overflow vulnerability
fa2f386f-4814-11e1-89b4-001ec9578670 acroread9 -- Multiple Vulnerabilities
fa708908-a8c7-11dc-b41d-000fb5066b20 drupal -- SQL injection vulnerability
faca0843-6281-11da-8630-00123ffe8333 drupal -- multiple vulnerabilities
fb03b1c6-8a8a-11d9-81f7-02023f003c9f uim -- privilege escalation vulnerability
fb25333d-442f-11e4-98f3-5453ed2e2b49 krfb -- Multiple security issues in bundled libvncserver
fb521119-9bc4-11d8-9366-0020ed76ef5a pound remotely exploitable vulnerability
fb5e227e-b8c6-11d8-b88c-000d610a3b12 jailed processes can manipulate host routing tables
fb672330-02db-11dd-bd06-0017319806e7 suphp -- multiple local privilege escalation vulnerabilities
fb84d5dd-9528-11dd-9a00-001999392805 opera -- multiple vulnerabilities
fb911e31-8ceb-11dd-bb29-000c6e274733 lighttpd -- multiple vulnerabilities
fba75b43-c588-11da-9110-00123ffe8333 phpmyadmin -- XSS vulnerabilities
fbb01289-2645-11e4-bc44-6805ca0b3d42 phpMyAdmin -- XSS vulnerabilities
fbc8413f-2f7a-11de-9a3f-001b77d09812 FreeBSD -- remotely exploitable crash in OpenSSL
fbd7aa81-2cc1-11dd-8cfb-00e0815b8da8 Nagios -- Cross Site Scripting Vulnerability
fc07c9ca-22ce-11d9-814e-0001020eed82 phpmyadmin -- remote command execution vulnerability
fc28df92-b233-11e3-99ca-f0def16c5c1b nginx -- SPDY heap buffer overflow
fc4d0ae8-3fa3-11de-a3fd-0030843d3802 moinmoin -- multiple cross site scripting vulnerabilities
fc5231b6-c066-11e1-b5e0-000c299b62e1 FreeBSD -- Incorrect handling of zero-length RDATA fields in named(8)
fc55e396-6deb-11df-8b8e-000c29ba66d2 mediawiki -- two security vulnerabilities
fc7e6a42-6012-11d9-a9e7-0001020eed82 tiff -- directory entry count integer overflow vulnerability
fc99c736-3499-11d9-98a7-0090962cff2a gnats -- format string vulnerability
fc9c217e-3791-11dc-bb1a-000fea449b8a lighttpd -- multiple vulnerabilities
fc9e73b2-8685-11dd-bb64-0030843d3802 gallery -- multiple vulnerabilities
fcb90eb0-2ace-11db-a6e2-000e0c2e438a mysql -- format string vulnerability
fcba5764-506a-11db-a5ae-00508d6a62df dokuwiki -- multiple vulnerabilities
fcbf56dd-e667-11de-920a-00248c9b4be7 piwik -- php code execution
fcc39d22-5777-11df-bf33-001a92771ec2 redmine -- multiple vulnerabilities
fce67546-d2e7-11e2-a9bf-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
fcfdabb7-f14d-4e61-a7d5-cfefb4b99b15 Ruby Rack Gem -- Multiple Issues
fd2bf3b5-1001-11e3-ba94-0025905a4771 asterisk -- multiple vulnerabilities
fd376b8b-41e1-11d8-b096-0020ed76ef5a Buffer overflow in INN control message handling
fd5f305d-2d3d-11e4-aa3d-00262d5ed8ee chromium -- multiple vulnerabilities
fd64188d-a71d-11e0-89b4-001ec9578670 BIND -- Remote DoS against authoritative and recursive servers
fd8bac56-c444-11e1-864b-001cc0877741 phpList -- SQL injection and XSS vulnerability
fdad8a87-7f94-11d9-a9e7-0001020eed82 awstats -- arbitrary command execution
fdd1c316-5a3d-11e1-8d3e-e0cb4e266481 phpMyAdmin -- XSS in replication setup
fde53204-7ea6-11d8-9645-0020ed76ef5a insecure temporary file creation in xine-check, xine-bugreport
fe1976c2-5317-11e1-9e99-00262d5ed8ee chromium -- multiple vulnerabilities
fe2b6597-c9a4-11dc-8da8-0008a18a9961 xorg -- multiple vulnerabilities
fe4c84fc-bdb5-11da-b7d4-00123ffe8333 linux-realplayer -- heap overflow
fe83eb5b-55e1-11db-a5ae-00508d6a62df python -- buffer overrun in repr() for unicode strings
fe853666-56ce-11e0-9668-001fd0d616cf php -- ZipArchive segfault with FL_UNCHANGED on empty archive
fe903533-ff96-4c7a-bd3e-4d40efa71897 gforge -- directory traversal vulnerability
fe971a0f-1246-11dd-bab7-0016179b2dd5 phpmyadmin -- Shared Host Information Disclosure
fee7e059-acec-11dc-807f-001b246e4fdf ganglia-webfrontend -- XSS vulnerabilities
fee94342-4638-11e1-9f47-00e0815b8da8 FreeBSD -- errors handling corrupt compress file in compress(1) and gzip(1)
fefd93d8-8af5-11db-9d01-0016179b2dd5 tdiary -- injection vulnerability
ff00f2ce-c54c-11d8-b708-00061bc2ad93 XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0
ff304c35-fb5b-11dc-91c1-00e0815b8da8 silc -- pkcs_decode buffer overflow
ff6519ad-18e5-11df-9bdd-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
ff65eecb-91e4-11dc-bd6c-0016179b2dd5 flac -- media file processing integer overflow vulnerabilities
ff8b419a-0ffa-11e0-becc-0022156e8794 Drupal Views plugin -- cross-site scripting
ff922811-c096-11e1-b0f4-00262d5ed8ee chromium -- multiple vulnerabilities
ff98087f-0a8f-11e4-b00b-5453ed2e2b49 postfixadmin -- SQL injection vulnerability
ffa7c6e4-bb29-11e3-8136-60a44c524f57 otrs -- Clickjacking issue
ffb82d3a-610f-11da-8823-00123ffe8333 mambo -- "register_globals" emulation layer overwrite vulnerability
ffba6ab0-90b5-11dc-9835-003048705d5a plone -- unsafe data interpreted as pickles
ffcbd42d-a8c5-11dc-bec2-02e0185f8d72 samba -- buffer overflow vulnerability
fffa9257-3c17-11db-86ab-00123ffe8333 mailman -- Multiple Vulnerabilities
fffacc93-16cb-11d9-bc4a-000c41e2cdad xv -- exploitable buffer overflows