Missing CVE entries in VuXML

VuXML entryCVE'sLinks
1f826757-26be-11d9-ad2d-0050fc56d258CVE-2005-3345
http://www.pizzashack.org/rssh/security.shtml
3d0e724e-129b-11dc-9f79-0016179b2dd5CVE-2007-5728
http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063617.html
8c5205b4-11a0-11de-a964-0030843d3802CVE-2009-0914
CVE-2009-0915
http://www.opera.com/docs/changelogs/freebsd/964/
04104985-d846-11de-84e4-00215af774f0CVE-2009-4032
http://docs.cacti.net/#cross-site_scripting_fixes
15485ae8-9848-11dc-9e48-0016179b2dd5CVE-2007-6100
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2007-8
555ac165-2bee-11dd-bbdc-00e0815b8da8CVE-2008-2784
http://www.spamdyke.org/documentation/Changelog.txt
fb84d5dd-9528-11dd-9a00-001999392805CVE-2008-4694
CVE-2008-4695
http://www.opera.com/support/search/view/901/
http://www.opera.com/support/search/view/902/
7a1ab8d4-35c1-11de-9672-0030843d3802CVE-2009-1575
CVE-2009-1576
http://drupal.org/node/449078
0b628470-e9a6-11da-b9f4-00123ffe8333CVE-2006-2514
http://sourceforge.net/project/shownotes.php?group_id=89658&release_id=418266
b6939d5b-64a1-11d9-9106-000a95bc6faeCVE-2004-1475
CVE-2004-1476
http://xinehq.de/index.php/security/XSA-2004-4
666b8c9e-8212-11db-851e-0016179b2dd5CVE-2006-6174
http://sourceforge.net/forum/forum.php?forum_id=638868
f0fa19dd-c060-11dc-982e-001372fd0af2CVE-2008-0274
http://drupal.org/node/208565
78ad2525-9d0c-11db-a5f6-000c6ec775d9CVE-2007-0126
CVE-2007-0127
CVE-2007-0127
CVE-2007-0126
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=457
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=458
http://www.opera.com/support/search/supsearch.dml?index=851
http://www.opera.com/support/search/supsearch.dml?index=852
f1f163ce-9e09-11da-b410-000e0c2e438aCVE-2006-0648
http://phpicalendar.net/forums/viewtopic.php?t=396
e285a1f4-4568-11dd-ae96-0030843d3802CVE-2008-2960
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-4
0d4c31ac-cb91-11d8-8898-000d6111a684CVE-2004-2631
CVE-2004-2632
CVE-2004-2631
CVE-2004-2632
http://secunia.com/advisories/11974
http://eagle.kecapi.com/sec/fd/phpMyAdmin.html
622bc638-be27-11dd-a578-0030843d3802CVE-2008-5278
http://wordpress.org/development/2008/11/wordpress-265/
31952117-3d17-11d9-8818-008088034841CVE-2004-1011
http://security.e-matters.de/advisories/152004.html
26a08c77-32da-4dd7-a884-a76fc49aa824CVE-2005-4838
http://www.oliverkarow.de/research/jakarta556_xss.txt
d9b01c08-59b3-11de-828e-00e0815b8da8CVE-2009-2108
https://www.redhat.com/archives/fedora-security-list/2009-June/msg00000.html
6779e82f-b60b-11da-913d-000ae42e9b93CVE-2006-1225
CVE-2006-1228
CVE-2006-1226
CVE-2006-1227
http://drupal.org/node/53806
http://drupal.org/node/53805
http://drupal.org/node/53803
http://drupal.org/node/53796
c27bc173-d7aa-11db-b141-0016179b2dd5CVE-2007-1560
http://www.squid-cache.org/Advisories/SQUID-2007_1.txt
faca0843-6281-11da-8630-00123ffe8333CVE-2005-3973
CVE-2005-3975
http://drupal.org/files/sa-2005-007/advisory.txt
http://drupal.org/files/sa-2005-008/advisory.txt
0ab423e7-3822-11db-81e1-000e0c2e438aCVE-2006-4466
CVE-2006-4468
CVE-2006-4470
CVE-2006-4471
CVE-2006-4472
CVE-2006-4473
CVE-2006-4474
CVE-2006-4475
http://www.joomla.org/content/view/1841/78/
02274fd9-6bc5-11d9-8edb-000a95bc6faeCVE-2005-0190
CVE-2005-0191
CVE-2005-0192
CVE-2005-0189
CVE-2005-0190
CVE-2005-0191
CVE-2005-0192
http://www.ngssoftware.com/advisories/real-02full.txt
http://www.ngssoftware.com/advisories/real-03full.txt
http://service.real.com/help/faq/security/040928_player/EN/
bdccd14b-5aac-11de-a438-003048590f9eCVE-2009-1938
CVE-2009-1939
CVE-2009-1940
http://www.joomla.org/announcements/release-news/5235-joomla-1511-security-release-now-available.html
97d45e95-3ffc-11da-a263-0001020eed82CVE-2005-3252
http://xforce.iss.net/xforce/alerts/id/207
2be7c122-0614-11db-9156-000e0c2e438aCVE-2006-3251
http://www.hashcash.org/source/CHANGELOG
100a9ed2-ee56-11dd-ab4f-0030843d3802CVE-2009-0414
http://archives.seul.org/or/announce/Jan-2009/msg00000.html
227475c2-09cb-11db-9156-000e0c2e438aCVE-2005-3912
CVE-2007-1276
CVE-2007-3156
CVE-2007-5066
CVE-2009-4568
http://www.webmin.com/security.html
70ae62b0-16b0-11dc-b803-0016179b2dd5CVE-2007-3152
CVE-2007-3153
http://cool.haxx.se/cvs.cgi/curl/ares/CHANGES?rev=HEAD&content-type=text/vnd.viewcvs-markup
fc9c217e-3791-11dc-bb1a-000fea449b8aCVE-2007-3948
CVE-2007-3947
CVE-2007-3949
CVE-2007-3950
http://trac.lighttpd.net/trac/ticket/1216
http://trac.lighttpd.net/trac/ticket/1232
http://trac.lighttpd.net/trac/ticket/1230
http://trac.lighttpd.net/trac/ticket/1263
296ecb59-0f6b-11df-8bab-0019996bc1f7CVE-2010-0308
http://www.squid-cache.org/Advisories/SQUID-2010_1.txt
6f736456-c060-11dc-982e-001372fd0af2CVE-2008-0273
http://drupal.org/node/208564
706c9eef-a077-11dd-b413-001372fd0af2CVE-2008-6170
http://drupal.org/node/324824
214e8e07-d369-11dd-b800-001b77d09812CVE-2008-5660
http://www.coresecurity.com/content/vinagre-format-string
d022754d-8839-11d9-aa18-0001020eed82CVE-2005-0578
http://www.mozilla.org/security/announce/mfsa2005-28.html
a77849a5-696f-11d9-ae49-000c41e2cdadCVE-2005-0142
https://bugzilla.mozilla.org/show_bug.cgi?id=251297
e31d44a2-21e3-11d9-9289-000c41e2cdadCVE-2004-2698
CVE-2004-2698
http://www.caughq.org/advisories/CAU-2004-0002.txt
http://imwheel.sourceforge.net/files/DEVELOPMENT.txt
debbb39c-fdb3-11d9-a30d-00b0d09acbfcCVE-2005-2409
http://people.freebsd.org/~niels/issues/nbsmtp-20050726.txt
81d9dc0c-1988-11df-8e66-0019996bc1f7CVE-2010-0639
http://www.squid-cache.org/Advisories/SQUID-2010_2.txt
eb5124a4-8a20-11db-b033-00123ffe8333CVE-2006-6405
CVE-2006-6406
CVE-2006-6407
CVE-2006-6408
CVE-2006-6409
CVE-2006-6481
http://www.quantenblog.net/security/virus-scanner-bypass
c110eda2-e995-11db-a944-0012f06707f0CVE-2005-1454
CVE-2005-1455
CVE-2005-4745
CVE-2007-2028
http://www.freeradius.org/security.html
c329712a-6b5b-11dd-9d79-001fc61c2a55CVE-2008-3655
CVE-2008-3656
CVE-2008-3905
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
1f935f61-075d-11db-822b-728b50d539a3CVE-2006-3480
CVE-2006-7009
CVE-2006-7010
http://www.joomla.org/content/view/1510/74/
c1ef9b33-72a6-11de-82ea-0030843d3802CVE-2009-2477
CVE-2009-2477
http://www.mozilla.org/security/announce/2009/mfsa2009-41.html
http://www.kb.cert.org/vuls/id/443060
f66e011d-13ff-11da-af41-0004614cc33dCVE-2005-2665
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0688.html
937adf01-b64a-11dd-a55e-00163e000016CVE-2008-6508
CVE-2008-6509
CVE-2008-6510
CVE-2008-6511
CVE-2008-1728
CVE-2008-6508
CVE-2009-1595
http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt
http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html
be927298-6f97-11de-b444-001372fd0af2CVE-2009-2372
CVE-2009-2373
CVE-2009-2374
CVE-2009-2372
CVE-2009-2373
CVE-2009-2374
http://drupal.org/node/507572
http://secunia.com/advisories/35681
c2fdb3bc-7d72-11da-b96e-000fb586ba73CVE-2006-0126
http://dist.schmorp.de/rxvt-unicode/Changes
a268ef4a-0b35-11d9-8a8a-000c41e2cdadCVE-2004-1689
http://www.sudo.ws/sudo/alerts/sudoedit.html
aed343b4-5480-11da-b579-001125afbed7CVE-2005-2628
CVE-2005-3591
CVE-2005-3591
http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html
http://secunia.com/advisories/17430/
ebeed063-b328-11de-b6a5-0030843d3802CVE-2009-3692
CVE-2009-3692
http://sunsolve.sun.com/search/document.do?assetkey=1-66-268188-1
http://secunia.com/advisories/36929
b0d61f73-0e11-11db-a47b-000c2957fdf1CVE-2005-3980
CVE-2005-4065
CVE-2005-4305
http://projects.edgewall.com/trac/wiki/ChangeLog
5039ae61-2c9f-11db-8401-000ae42e9b93CVE-2006-4232
CVE-2006-4233
http://www.globus.org/mail_archive/security-announce/2006/08/msg00000.html
http://www.globus.org/mail_archive/security-announce/2006/08/msg00001.html
69a20ce4-dfee-11dd-a765-0030843d3802CVE-2008-5514
http://www.washington.edu/imap/documentation/RELNOTES.html
739329c8-d8f0-11dc-ac2f-0016d325a0edCVE-2008-0808
http://ikiwiki.info/security/#index30h2
7fadc049-2ba0-11dc-9377-0016179b2dd5CVE-2007-3389
CVE-2007-3390
CVE-2007-3391
CVE-2007-3392
CVE-2007-3393
http://www.wireshark.org/security/wnpa-sec-2007-02.html
12d266b6-363f-11dc-b6c9-000c6ec775d9CVE-2007-3929
CVE-2007-4944
CVE-2007-3929
CVE-2007-4944
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=564
http://www.opera.com/support/search/view/861/
http://www.opera.com/support/search/view/862/
http://www.opera.com/docs/changelogs/freebsd/922/
c2e10368-77ab-11d8-b9e8-00e04ccb0a62CVE-2004-1765
CVE-2004-1765
http://www.s-quadra.com/advisories/Adv-20040315.txt
http://secunia.com/advisories/11138
77420ebb-0cf4-11d9-8a8a-000c41e2cdadCVE-2004-2149
http://bugs.mysql.com/bug.php?id=5194
f5c4d7f7-9f4b-11dd-bab1-001999392805CVE-2008-4725
CVE-2008-4725
CVE-2008-4697
CVE-2008-4698
http://www.opera.com/support/search/view/903/
http://www.opera.com/support/search/view/904/
http://www.opera.com/support/search/view/905/
e969e6cb-8911-11db-9d01-0016179b2dd5CVE-2006-6652
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051009.html
1cf00643-ed8a-11d9-8310-0001020eed82CVE-2005-2148
CVE-2005-2148
CVE-2005-2149
http://www.hardened-php.net/advisory-032005.php
http://www.hardened-php.net/advisory-042005.php
http://www.hardened-php.net/advisory-052005.php
1f9e2376-c52f-11dd-8cbc-00163e000016CVE-2008-5844
http://www.php.net/archive/2008.php#id2008-12-07-1
4451a4c9-c05e-11dc-982e-001372fd0af2CVE-2008-0272
http://drupal.org/node/208562
73ec1008-72f0-11dd-874b-0030843d3802CVE-2008-4195
CVE-2008-4197
CVE-2008-4198
CVE-2008-4200
http://www.opera.com/support/search/view/893/
http://www.opera.com/support/search/view/894/
http://www.opera.com/support/search/view/895/
http://www.opera.com/support/search/view/897/
09066828-2ef1-11dd-a0d8-0016d325a0edCVE-2008-0169
http://ikiwiki.info/security/#index33h2
31435fbc-ae73-11dc-a5f9-001a4d49522bCVE-2007-6454
http://aluigi.altervista.org/adv/peercasthof-adv.txt
c0fd7890-4346-11db-89cc-000ae42e9b93CVE-2006-4717
http://drupal.org/node/83064
12488805-6773-11dc-8be8-02e0185f8d72CVE-2007-4976
CVE-2007-4977
http://coppermine-gallery.net/forum/index.php?topic=46847.0
4aab7bcd-b294-11dc-a6f0-00a0cce0781eCVE-2007-6685
CVE-2007-6686
CVE-2007-6687
CVE-2007-6689
CVE-2007-6690
CVE-2007-6692
http://gallery.menalto.com/gallery_2.2.4_released
bec38383-e6cb-11de-bdd4-000c2930e89bCVE-2009-4786
CVE-2009-4787
CVE-2009-4788
http://www.pligg.com/blog/775/pligg-cms-1-0-3-release/
1d96305d-6ae6-11dd-91d5-000c29d47fd7CVE-2008-4437
https://bugzilla.mozilla.org/show_bug.cgi?id=437169
7f8cecea-f199-11da-8422-00123ffe8333CVE-2006-2753
http://lists.mysql.com/announce/364
b02c1d80-e1bb-11d9-b875-0001020eed82CVE-2005-2007
CVE-2005-2147
CVE-2005-3980
CVE-2005-4065
CVE-2005-4305
http://www.hardened-php.net/advisory-012005.php
http://projects.edgewall.com/trac/wiki/ChangeLog
74bf1594-8493-11dd-bb64-0030843d3802CVE-2008-4096
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-7
4f838b74-50a1-11de-b01f-001c2514716cCVE-2009-1960
http://bugs.splitbrain.org/index.php?do=details&task_id=1700
f7ba20aa-6b5a-11dd-9d79-001fc61c2a55CVE-2008-3655
CVE-2008-3656
CVE-2008-3905
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
e50b04e8-9c55-11d8-9366-0020ed76ef5aCVE-2004-1951
http://www.xinehq.de/index.php/security/XSA-2004-1
53e711ed-8972-11d9-9ff8-00306e01dda2CVE-2005-0603
CVE-2005-0614
http://www.phpbb.com/phpBB/viewtopic.php?t=267563
12efc567-9879-11dd-a5e7-0030843d3802CVE-2008-4791
CVE-2008-4792
CVE-2008-4793
http://drupal.org/node/318706
2fda6bd2-c53c-11de-b157-001999392805CVE-2009-3831
http://www.opera.com/support/kb/view/938/
ecedde1c-5128-11dd-a4e1-0030843d3802CVE-2008-3218
CVE-2008-3221
http://drupal.org/node/280571
4b09378e-addb-11dd-a578-0030843d3802CVE-2008-5032
CVE-2008-5036
CVE-2008-5032
http://www.videolan.org/security/sa0810.html
http://www.trapkit.de/advisories/TKADV2008-012.txt
5e7f58c3-b3f8-4258-aeb8-795e5e940ff8CVE-2003-0835
CVE-2004-0386
http://www.mplayerhq.hu/homepage/design6/news.html
2fbe16c2-cab6-11d9-9aed-000e0c2e438aCVE-2005-1454
CVE-2005-1455
http://www.gentoo.org/security/en/glsa/glsa-200505-13.xml
a8674c14-83d7-11db-88d5-0012f06707f0CVE-2006-6303
http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library/
f49ba347-2190-11dd-907c-001c2514716cCVE-2008-2302
http://www.djangoproject.com/weblog/2008/may/14/security/
9855ac8e-2aec-11db-a6e2-000e0c2e438aCVE-2006-4089
http://aluigi.altervista.org/adv/alsapbof-adv.txt
03d22656-2690-11de-8226-0030843d3802CVE-2009-1069
http://drupal.org/node/406520
9b7053fd-3ab5-11da-9484-00123ffe8333CVE-2005-3299
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4
0640198a-d117-11de-b667-0030843d3802CVE-2009-3890
CVE-2009-3891
http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/
5d51d245-00ca-11da-bc08-0001020eed82CVE-2005-2360
CVE-2005-2361
CVE-2005-2362
CVE-2005-2363
CVE-2005-2364
CVE-2005-2365
CVE-2005-2366
CVE-2005-2367
http://www.ethereal.com/appnotes/enpa-sa-00020.html
6a33477e-3a9c-11d9-84ad-000c6e8f12efCVE-2004-1055
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-3
d4bd4046-93a6-11d9-8378-000bdb1444a4CVE-2006-0126
http://dist.schmorp.de/rxvt-unicode/Changes
96948a6a-e239-11d9-83cf-0010dc5df42dCVE-2005-1524
CVE-2005-1525
CVE-2005-1526
http://www.cacti.net/release_notes_0_8_6e.php
84ab58cf-e4ac-11d8-9b0a-000347a4fa7dCVE-2004-2531
CVE-2004-2531
http://www.hornik.sk/SA/SA-20040802.txt
http://secunia.com/advisories/12156
8e8b8b94-7f1d-11dd-a66a-0019666436c2CVE-2008-4094
http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1
498a8731-7cfc-11dc-96e6-0012f06707f0CVE-2007-5589
CVE-2007-5589
http://www.digitrustgroup.com/advisories/TDG-advisory071015a.html
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2007-6
fba75b43-c588-11da-9110-00123ffe8333CVE-2006-1678
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-1
609c790e-ce0a-11dd-a721-0030843d3802CVE-2008-6533
http://drupal.org/node/345441
c55f9ed0-56a7-11da-a3f0-00123ffe8333CVE-2005-3621
CVE-2005-3622
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6
http://www.fitsec.com/advisories/FS-05-02.txt
f4b95430-51d8-11da-8e93-0010dc4afb40CVE-2005-3334
http://lostmon.blogspot.com/2005/10/flyspray-bug-killer-multiple-variable.html
0e30e802-a9db-11dd-93a2-000bcdf0a03bCVE-2008-4794
http://www.opera.com/support/search/view/906/
229577a8-0936-11db-bf72-00046151137eCVE-2006-3388
CVE-2006-3388
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-4
http://securitynews.ir/advisories/phpmyadmin281.txt
848539dc-0458-11df-8dd7-002170daae37CVE-2010-0287
CVE-2010-0288
CVE-2010-0289
http://bugs.splitbrain.org/index.php?do=details&task_id=1847
http://bugs.splitbrain.org/index.php?do=details&task_id=1853
e3e30d99-58a8-4a3f-8059-a8b7cd59b881CVE-2009-1596
http://www.igniterealtime.org/issues/browse/JM-1532
3d8d3548-9d02-11db-a541-000ae42e9b93CVE-2007-0136
http://drupal.org/files/sa-2007-001/advisory.txt
44e5f5bd-4d76-11da-bf37-000fb586ba73CVE-2005-4154
http://pear.php.net/advisory-20051104.txt
23afd91f-676b-11da-99f6-00123ffe8333CVE-2005-4079
CVE-2005-4079
CVE-2005-4079
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-9
http://www.hardened-php.net/advisory_252005.110.html
http://secunia.com/advisories/17925/
ba73f494-65a8-11de-aef5-001c2514716cCVE-2009-2284
http://www.phpmyadmin.net/home_page/security/PMASA-2009-5.php
2d2dcbb4-906c-11dc-a951-0016179b2dd5CVE-2007-5976
CVE-2007-5977
CVE-2007-5977
http://www.digitrustgroup.com/advisories/tdg-advisory071108a.html
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2007-7
d9867f50-54d0-11dc-b80b-0016179b2dd5CVE-2007-2958
http://secunia.com/secunia_research/2007-70/advisory/
ad61657d-26b9-11d9-9289-000c41e2cdadCVE-2004-2589
http://gaim.sourceforge.net/security/?id=6
12b7286f-16a2-11dc-b803-0016179b2dd5CVE-2007-3156
http://www.webmin.com/changes-1.350.html
1e8031be-4258-11de-b67a-0030843d3802CVE-2008-7068
http://securityreason.com/achievement_securityalert/58
cc47fafe-f823-11dd-94d9-0030843d3802CVE-2009-0815
CVE-2009-0816
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/
a6713190-dfea-11dd-a765-0030843d3802CVE-2008-5514
http://www.washington.edu/imap/documentation/RELNOTES.html
2c25e762-6bb9-11d9-93db-000a95bc6faeCVE-2004-2592
CVE-2004-2593
CVE-2004-2595
CVE-2004-2596
CVE-2004-2598
CVE-2004-2599
http://secur1ty.net/advisories/001
7128fb45-2633-11dc-94da-0016179b2dd5CVE-2007-3316
CVE-2007-3467
CVE-2007-3468
http://www.isecpartners.com/advisories/2007-001-vlc.txt
3f4ac724-fa8b-11d9-afcf-0060084a00e5CVE-2005-2335
http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt
0f51f2c9-8956-11dd-a6fe-0030843d3802CVE-2008-4242
CVE-2008-4247
http://bugs.proftpd.org/show_bug.cgi?id=3115
b5a49db7-72fc-11da-9827-021106004fd6CVE-2005-4532
http://sublimation.org/scponly/#relnotes
18a14baa-5ee5-11db-ae08-0008743bf21aCVE-2006-5449
http://lists.horde.org/archives/announce/2006/000296.html
f3017ce1-32a4-11d9-a9e7-0001020eed82CVE-2004-1484
CVE-2004-1484
http://www.dest-unreach.org/socat/advisory/socat-adv-1.html
http://www.nosystem.com.ar/advisories/advisory-07.txt
77c14729-dc5e-11de-92ae-02e0184b8d35CVE-2009-3736
http://lists.gnu.org/archive/html/libtool/2009-11/msg00059.html
d2a43243-087b-11db-bc36-0008743bf21aCVE-2006-3242
http://dev.mutt.org/cgi-bin/gitweb.cgi?p=mutt/.git;a=commit;h=dc0272b749f0e2b102973b7ac43dbd3908507540
4872d9a7-4128-11dc-bdb0-0016179b2dd5CVE-2007-4188
CVE-2007-4189
CVE-2007-4190
CVE-2007-5577
http://www.joomla.org/content/view/3677/1/
632c98be-aad2-4af2-849f-41a6862afd6aCVE-2007-1942
CVE-2007-1943
CVE-2007-1946
CVE-2007-1948
http://ifsec.blogspot.com/2007/04/several-windows-image-viewers.html
54f72962-c7ba-11dd-a721-0030843d3802CVE-2008-5621
CVE-2008-5621
http://www.phpmyadmin.net/home_page/security/PMASA-2008-10.php
http://www.milw0rm.com/exploits/7382
cdf14b68-3ff9-11d9-8405-00065be4b5b6CVE-2004-1127
http://www.gentoo.org/security/en/glsa/glsa-200411-37.xml
85e19dff-e606-11d8-9b0a-000347a4fa7dCVE-2004-2619
CVE-2004-2619
CVE-2004-2619
CVE-2004-2619
http://www.osvdb.org/8287
http://www.pldaniels.com/ripmime/CHANGELOG
http://secunia.com/advisories/12201
http://xforce.iss.net/xforce/xfdb/16867
fcbf56dd-e667-11de-920a-00248c9b4be7CVE-2009-4137
http://piwik.org/blog/2009/12/piwik-response-to-shocking-news-in-php-exploitation/
19518d22-2d05-11d9-8943-0050fc56d258CVE-2004-1008
http://www.gentoo.org/security/en/glsa/glsa-200410-29.xml
62e0fbe5-5798-11de-bb78-001cc0377035CVE-2009-1904
http://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal/
87917d6f-ba76-11de-bac2-001a4d563a0fCVE-2009-3695
http://www.djangoproject.com/weblog/2009/oct/09/security/
6596bb80-d026-11d9-9aed-000e0c2e438aCVE-2005-1751
http://www.zataz.net/adviso/shtool-05252005.txt
c3aba586-ea77-11dd-9d1e-000bcdc1757aCVE-2009-0496
CVE-2009-0497
http://www.coresecurity.com/content/openfire-multiple-vulnerabilities
5a5422fd-7e1a-11d9-a9e7-0001020eed82CVE-2005-0428
CVE-2005-0428
http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21
http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17
ad4a00fa-0157-11dd-8bd3-001372ae3ab9CVE-2008-1761
CVE-2008-1762
http://www.opera.com/support/search/view/881/
http://www.opera.com/support/search/view/882/
30c560ff-e0df-11dc-891a-02061b08fc24CVE-2008-1080
CVE-2008-1081
http://www.opera.com/support/search/view/877/
http://www.opera.com/support/search/view/879/
e94cb43d-0c4a-11db-9016-0050bf27ba24CVE-2006-3548
http://lists.horde.org/archives/announce/2006/000288.html
4e306850-811f-11de-8a67-000c29a67389CVE-2009-3051
http://silcnet.org/docs/changelog/SILC%20Client%201.1.8
ce2f2ade-e7df-11dc-a701-000bcdc1757aCVE-2008-1149
http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-1
12b7b4cf-1d53-11d9-814e-0001020eed82CVE-2004-1584
http://wordpress.org/development/2004/10/wp-121/
207f8ff3-f697-11d8-81b0-000347a4fa7dCVE-2004-0826
http://xforce.iss.net/xforce/alerts/id/180
f6f19735-9245-4918-8a60-87948ebb4907CVE-2009-0599
CVE-2009-0600
CVE-2009-0601
http://www.wireshark.org/security/wnpa-sec-2009-01.html
a2d4a330-4d54-11de-8811-0030843d3802CVE-2009-1829
http://www.wireshark.org/security/wnpa-sec-2009-03.html
00784d6e-f4ce-11da-87a1-000c6ec775d9CVE-2006-2842
http://www.squirrelmail.org/security/issue/2006-06-01
2df297a2-dc74-11da-a22b-000c6ec775d9CVE-2006-2237
CVE-2006-2237
CVE-2006-2644
http://awstats.sourceforge.net/awstats_security_news.php
http://www.osreviews.net/reviews/comm/awstats
f8d3689e-6770-11dc-8be8-02e0185f8d72CVE-2007-5038
http://www.bugzilla.org/security/3.0.1/
fb672330-02db-11dd-bd06-0017319806e7CVE-2008-1614
http://lists.marsching.biz/pipermail/suphp/2008-March/001750.html
c4f31e16-6e33-11dd-8eb7-0011098ad87fCVE-2008-2080
http://cdf.gsfc.nasa.gov/CDF32_buffer_overflow.html
113cd7e9-a4e2-11de-84af-001195e39404CVE-2009-4664
http://www.fwbuilder.org/docs/firewall_builder_release_notes.html#3.0.7
66657bd5-ac92-11dd-b541-001f3b19d541CVE-2008-3949
http://lists.gnu.org/archive/html/emacs-devel/2008-09/msg00215.html
1a0e4cc6-29bf-11de-bdeb-0030843d3802CVE-2009-1285
http://www.phpmyadmin.net/home_page/security/PMASA-2009-4.php
751823d4-f189-11de-9344-00248c9b4be7CVE-2009-4370
http://drupal.org/node/661586
2430e9c3-8741-11de-938e-003048590f9eCVE-2009-2762
CVE-2009-2762
http://wordpress.org/development/2009/08/2-8-4-security-release/
http://www.milw0rm.com/exploits/9410
6b575419-14cf-11df-a628-001517351c22CVE-2010-0438
http://otrs.org/advisory/OSA-2010-01-en/
964161cd-6715-11da-99f6-00123ffe8333CVE-2005-4048
http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558
400d9d22-d6c5-11da-a14b-00123ffe8333CVE-2005-3980
CVE-2005-4065
CVE-2005-4305
http://projects.edgewall.com/trac/wiki/ChangeLog
070b5b22-6d74-11dd-aa18-0030843d3802CVE-2008-3740
CVE-2008-3741
CVE-2008-3742
CVE-2008-3743
CVE-2008-3744
CVE-2008-3745
http://drupal.org/node/295053
6431c4db-deb4-11de-9078-0030843d3802CVE-2009-0689
CVE-2009-4071
http://www.opera.com/support/kb/view/942/
http://www.opera.com/support/kb/view/941/
8d2c0ce1-08b6-11dd-94b4-0016d325a0edCVE-2008-0165
http://ikiwiki.info/security/#index31h2
884fced7-7f1c-11dd-a66a-0019666436c2CVE-2008-4107
http://wordpress.org/development/2008/09/wordpress-262/
06f9174f-190f-11de-b2f0-001c2514716cCVE-2009-1151
http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php