· 6 years ago · Dec 06, 2019, 08:36 PM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.teenidols4you.com ISP DigitalOcean, LLC
4Continent North America Flag
5US
6Country United States Country Code US
7Region New Jersey Local time 06 Dec 2019 13:50 EST
8City Clifton Postal Code 07014
9IP Address 45.55.35.220 Latitude 40.836
10 Longitude -74.14
11=======================================================================================================================================
12#######################################################################################################################################
13> www.teenidols4you.com
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: www.teenidols4you.com
19Address: 45.55.35.220
20>
21#######################################################################################################################################
22 Domain Name: TEENIDOLS4YOU.COM
23 Registry Domain ID: 27005273_DOMAIN_COM-VRSN
24 Registrar WHOIS Server: whois.softlayer.com
25 Registrar URL: http://www.softlayer.com
26 Updated Date: 2019-04-15T01:42:35Z
27 Creation Date: 2000-05-14T01:48:11Z
28 Registry Expiry Date: 2021-05-14T01:48:11Z
29 Registrar: Everyones Internet, Ltd. dba SoftLayer
30 Registrar IANA ID: 925
31 Registrar Abuse Contact Email:
32 Registrar Abuse Contact Phone:
33 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
34 Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
35 Name Server: NS-1439.AWSDNS-51.ORG
36 Name Server: NS-1843.AWSDNS-38.CO.UK
37 Name Server: NS-25.AWSDNS-03.COM
38 Name Server: NS-708.AWSDNS-24.NET
39 DNSSEC: unsigned
40#################################################################################################
41Domain Name: TEENIDOLS4YOU.COM
42Registry Domain ID: 27005273_DOMAIN_COM-VRSN
43Registrar WHOIS Server: whois.softlayer.com
44Registrar URL: http://www.softlayer.com
45Updated Date: 2019-04-15T01:42:35
46Creation Date: 2000-05-14T01:48:11
47Registrar Registration Expiration Date: 2021-05-14T01:48:11
48Registrar: Everyones Internet, LLC dba SoftLayer
49Registrar IANA ID: 925
50Reseller: SoftLayer
51Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
52Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
53Registry Registrant ID:
54################################################################################################
55[+] Target : www.teenidols4you.com
56
57[+] IP Address : 45.55.35.220
58
59[+] Headers :
60
61[+] Date : Fri, 06 Dec 2019 18:56:27 GMT
62[+] Server : Apache/2.2.15 (CentOS)
63[+] X-Powered-By : PHP/5.6.40
64[+] Set-Cookie : PHPSESSID=fvvrg7q0l85cav318vajiu8pq4; path=/
65[+] Cache-Control : max-age=0, no-cache, no-store, must-revalidate, post-check=0, pre-check=0
66[+] Pragma : no-cache
67[+] X-Mod-Pagespeed : 1.13.35.2-0
68[+] Vary : Accept-Encoding
69[+] Content-Encoding : gzip
70[+] Content-Length : 9392
71[+] Keep-Alive : timeout=4, max=100
72[+] Connection : Keep-Alive
73[+] Content-Type : text/html; charset=utf-8
74
75[+] SSL Certificate Information :
76
77[-] SSL is not Present on Target URL...Skipping...
78
79[+] Whois Lookup :
80
81[+] NIR : None
82[+] ASN Registry : arin
83[+] ASN : 14061
84[+] ASN CIDR : 45.55.32.0/19
85[+] ASN Country Code : US
86[+] ASN Date : 2015-02-05
87[+] ASN Description : DIGITALOCEAN-ASN - DigitalOcean, LLC, US
88[+] cidr : 45.55.0.0/16
89[+] name : DIGITALOCEAN-11
90[+] handle : NET-45-55-0-0-1
91[+] range : 45.55.0.0 - 45.55.255.255
92[+] description : DigitalOcean, LLC
93[+] country : US
94[+] state : NY
95[+] city : New York
96[+] address : 101 Ave of the Americas
9710th Floor
98[+] postal_code : 10013
99[+] emails : ['abuse@digitalocean.com', 'noc@digitalocean.com']
100[+] created : 2015-02-05
101[+] updated : 2015-02-05
102
103[+] Crawling Target...
104
105[+] Looking for robots.txt........[ Found ]
106[+] Extracting robots Links.......[ 14 ]
107[+] Looking for sitemap.xml.......[ Not Found ]
108[+] Extracting CSS Links..........[ 1 ]
109[+] Extracting Javascript Links...[ 3 ]
110[+] Extracting Internal Links.....[ 1 ]
111[+] Extracting External Links.....[ 1 ]
112[+] Extracting Images.............[ 92 ]
113
114[+] Total Links Extracted : 112
115
116[+] Dumping Links in /opt/FinalRecon/dumps/www.teenidols4you.com.dump
117[+] Completed!
118#################################################################################################
119[i] Scanning Site: http://www.teenidols4you.com
120
121
122
123B A S I C I N F O
124====================
125
126
127[+] Site Title: Teen Idols 4 You : Teen Entertainment News and Picture Galleries
128[+] IP address: 45.55.35.220
129[+] Web Server: Apache/2.2.15 (CentOS)
130[+] CMS: Could Not Detect
131[+] Cloudflare: Not Detected
132[+] Robots File: Found
133
134-------------[ contents ]----------------
135User-agent: *
136Disallow: /include/rate.php
137Disallow: /include/functions.php
138Disallow: /videos/Smarty
139Disallow: /videos/admin
140Disallow: /videos/bbclone
141Disallow: /videos/docs
142Disallow: /videos/email_template
143Disallow: /videos/include
144Disallow: /clink/
145Disallow: /reportcoms.php
146Disallow: /replycoms.php
147
148Sitemap: http://www.teenidols4you.com/sitemap_movie.xml
149Sitemap: http://www.teenidols4you.com/sitemap_idols.xml
150Sitemap: http://www.teenidols4you.com/sitemapindex.xml
151Sitemap: http://www.teenidols4you.com/sitemaps/sitemap_gal.xml
152Sitemap: http://teenidols4you.springboardplatform.com/storage/teenidols4you.com/sitemaps/1.xml.gz
153
154user-agent: AhrefsBot
155disallow: /
156
157user-agent: Yandex
158Disallow: /include/rate.php
159Disallow: /include/functions.php
160Disallow: /videos/Smarty
161Disallow: /videos/admin
162Disallow: /videos/bbclone
163Disallow: /videos/docs
164Disallow: /videos/email_template
165Disallow: /videos/include
166Disallow: /clink
167Disallow: /blink
168Disallow: /images
169Disallow: /reportcoms.php
170
171-----------[end of contents]-------------
172
173
174
175W H O I S L O O K U P
176========================
177
178 Domain Name: TEENIDOLS4YOU.COM
179 Registry Domain ID: 27005273_DOMAIN_COM-VRSN
180 Registrar WHOIS Server: whois.softlayer.com
181 Registrar URL: http://www.softlayer.com
182 Updated Date: 2019-04-15T01:42:35Z
183 Creation Date: 2000-05-14T01:48:11Z
184 Registry Expiry Date: 2021-05-14T01:48:11Z
185 Registrar: Everyones Internet, Ltd. dba SoftLayer
186 Registrar IANA ID: 925
187 Registrar Abuse Contact Email:
188 Registrar Abuse Contact Phone:
189 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
190 Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
191 Name Server: NS-1439.AWSDNS-51.ORG
192 Name Server: NS-1843.AWSDNS-38.CO.UK
193 Name Server: NS-25.AWSDNS-03.COM
194 Name Server: NS-708.AWSDNS-24.NET
195 DNSSEC: unsigned
196 URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
197>>> Last update of whois database: 2019-12-06T18:56:44Z <<<
198
199For more information on Whois status codes, please visit https://icann.org/epp
200
201
202
203The Registry database contains ONLY .COM, .NET, .EDU domains and
204Registrars.
205
206
207
208
209G E O I P L O O K U P
210=========================
211
212[i] IP Address: 45.55.35.220
213[i] Country: United States
214[i] State: New Jersey
215[i] City: Clifton
216[i] Latitude: 40.8364
217[i] Longitude: -74.1403
218
219
220
221
222H T T P H E A D E R S
223=======================
224
225
226[i] HTTP/1.1 200 OK
227[i] Date: Fri, 06 Dec 2019 18:56:54 GMT
228[i] Server: Apache/2.2.15 (CentOS)
229[i] X-Powered-By: PHP/5.6.40
230[i] Set-Cookie: PHPSESSID=i8ipkg113bd39mc9tuadogcl40; path=/
231[i] Cache-Control: max-age=0, no-cache, no-store, must-revalidate, post-check=0, pre-check=0
232[i] Pragma: no-cache
233[i] X-Mod-Pagespeed: 1.13.35.2-0
234[i] Vary: Accept-Encoding
235[i] Content-Length: 49326
236[i] Connection: close
237[i] Content-Type: text/html; charset=utf-8
238
239
240
241
242D N S L O O K U P
243===================
244
245teenidols4you.com. 14439 IN A 45.55.35.220
246teenidols4you.com. 21599 IN NS ns-1439.awsdns-51.org.
247teenidols4you.com. 21599 IN NS ns-1843.awsdns-38.co.uk.
248teenidols4you.com. 21599 IN NS ns-25.awsdns-03.com.
249teenidols4you.com. 21599 IN NS ns-708.awsdns-24.net.
250teenidols4you.com. 14439 IN SOA ns-1843.awsdns-38.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
251teenidols4you.com. 21599 IN MX 10 mail.deadendmail.com.
252teenidols4you.com. 3599 IN TXT "brave-ledger-verification=c9cfb4eec7e83aaa73a5d6692265a984a32e64f2710027f35670ddba3c34ab2c"
253teenidols4you.com. 3599 IN TXT "v=spf1 ip4:45.55.35.220 -all"
254
255
256
257
258S U B N E T C A L C U L A T I O N
259====================================
260
261Address = 45.55.35.220
262Network = 45.55.35.220 / 32
263Netmask = 255.255.255.255
264Broadcast = not needed on Point-to-Point links
265Wildcard Mask = 0.0.0.0
266Hosts Bits = 0
267Max. Hosts = 1 (2^0 - 0)
268Host Range = { 45.55.35.220 - 45.55.35.220 }
269
270
271
272N M A P P O R T S C A N
273============================
274
275Starting Nmap 7.70 ( https://nmap.org ) at 2019-12-06 18:56 UTC
276Nmap scan report for teenidols4you.com (45.55.35.220)
277Host is up (0.0024s latency).
278
279PORT STATE SERVICE
28021/tcp closed ftp
28122/tcp closed ssh
28223/tcp closed telnet
28380/tcp open http
284110/tcp closed pop3
285143/tcp closed imap
286443/tcp closed https
2873389/tcp closed ms-wbt-server
288
289Nmap done: 1 IP address (1 host up) scanned in 0.16 seconds
290
291
292
293S U B - D O M A I N F I N D E R
294==================================
295
296
297[i] Total Subdomains Found : 2
298
299[+] Subdomain: statcount.teenidols4you.com
300[-] IP: 104.131.52.248
301
302[+] Subdomain: www.teenidols4you.com
303[-] IP: 45.55.35.220
304#################################################################################################
305[+] Starting At 2019-12-06 13:56:52.488742
306[+] Collecting Information On: http://www.teenidols4you.com/
307[#] Status: 200
308--------------------------------------------------
309[#] Web Server Detected: Apache/2.2.15 (CentOS)
310[#] X-Powered-By: PHP/5.6.40
311[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
312- Date: Fri, 06 Dec 2019 18:56:53 GMT
313- Server: Apache/2.2.15 (CentOS)
314- X-Powered-By: PHP/5.6.40
315- Set-Cookie: PHPSESSID=5ihujmn9rn1npv22fj9k4vapm3; path=/
316- Cache-Control: max-age=0, no-cache, no-store, must-revalidate, post-check=0, pre-check=0
317- Pragma: no-cache
318- X-Mod-Pagespeed: 1.13.35.2-0
319- Vary: Accept-Encoding
320- Content-Encoding: gzip
321- Content-Length: 9625
322- Keep-Alive: timeout=4, max=100
323- Connection: Keep-Alive
324- Content-Type: text/html; charset=utf-8
325--------------------------------------------------
326[#] Finding Location..!
327[#] status: success
328[#] country: United States
329[#] countryCode: US
330[#] region: NJ
331[#] regionName: New Jersey
332[#] city: Clifton
333[#] zip: 07014
334[#] lat: 40.8302
335[#] lon: -74.1299
336[#] timezone: America/New_York
337[#] isp: DigitalOcean, LLC
338[#] org: Digital Ocean
339[#] as: AS14061 DigitalOcean, LLC
340[#] query: 45.55.35.220
341--------------------------------------------------
342[x] Didn't Detect WAF Presence on: http://www.teenidols4you.com/
343--------------------------------------------------
344[#] Starting Reverse DNS
345[-] Failed ! Fail
346--------------------------------------------------
347[!] Scanning Open Port
348[#] 80/tcp open http
349[#] 3306/tcp open mysql
350--------------------------------------------------
351[+] Collecting Information Disclosure!
352[#] Detecting sitemap.xml file
353[-] sitemap.xml file not Found!?
354[#] Detecting robots.txt file
355[!] robots.txt File Found: http://www.teenidols4you.com//robots.txt
356[#] Detecting GNU Mailman
357[-] GNU Mailman App Not Detected!?
358--------------------------------------------------
359[+] Crawling Url Parameter On: http://www.teenidols4you.com/
360--------------------------------------------------
361[#] Searching Html Form !
362[+] Html Form Discovered
363[#] action: http://www.teenidols4you.com/search.html
364[#] class: None
365[#] id: cse-search-box
366[#] method: None
367--------------------------------------------------
368[-] No DOM Paramter Found!?
369--------------------------------------------------
370[!] 14 Internal Dynamic Parameter Discovered
371[+] http://www.teenidols4you.com/?PageSpeed=noscript
372[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=jentzen-ramirez&foto=554&act=3751&mv=4&pic=910654
373[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=london-cheshire&foto=554&act=3721&mv=4&pic=910653
374[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910652
375[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
376[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=tyler-crumley&foto=554&act=3737&mv=4&pic=910650
377[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910649
378[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910648
379[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910647
380[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910646
381[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910645
382[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910644
383[+] http://www.teenidols4you.com///picture.html?g=Actors&pe=ryker-baloun&foto=554&act=3718&mv=4&pic=910643
384[+] http://www.teenidols4you.com///videos/page.php?p=1
385--------------------------------------------------
386[-] No external Dynamic Paramter Found!?
387--------------------------------------------------
388[!] 162 Internal links Discovered
389[+] http://m.teenidols4you.com
390[+] http://cdn.teenidols4you.com/favicon.ico
391[+] http://www.teenidols4you.com///
392[+] http://www.teenidols4you.com///news.html
393[+] http://www.teenidols4you.com///actor.html
394[+] http://www.teenidols4you.com///Singers.html
395[+] http://www.teenidols4you.com///shows/a.html
396[+] http://www.teenidols4you.com///top50/today
397[+] http://www.teenidols4you.com///videos/
398[+] http://www.teenidols4you.com///news/enews1168.html
399[+] http://www.teenidols4you.com///news/enews1168.html
400[+] http://www.teenidols4you.com///news/enews1168.html
401[+] http://www.teenidols4you.com///news/enews1157.html
402[+] http://www.teenidols4you.com///news/enews1156.html
403[+] http://www.teenidols4you.com///news/enews1155.html
404[+] http://www.teenidols4you.com///uploaded.html
405[+] http://www.teenidols4you.com///updates.html
406[+] http://www.teenidols4you.com///gallery/2972/aidan-gallagher.html
407[+] http://www.teenidols4you.com///picture/2972/4/aidan-gallagher.html
408[+] http://www.teenidols4you.com///gallery/3460/alex-ruygrok.html
409[+] http://www.teenidols4you.com///picture/3460/4/alex-ruygrok.html
410[+] http://www.teenidols4you.com///gallery/3604/anthony-rosenthal.html
411[+] http://www.teenidols4you.com///picture/3604/4/anthony-rosenthal.html
412[+] http://www.teenidols4you.com///gallery/3270/asher-angel.html
413[+] http://www.teenidols4you.com///picture/3270/4/asher-angel.html
414[+] http://www.teenidols4you.com///gallery/2924/august-maturo.html
415[+] http://www.teenidols4you.com///picture/2924/4/august-maturo.html
416[+] http://www.teenidols4you.com///gallery/3611/ayden-mekus.html
417[+] http://www.teenidols4you.com///picture/3611/4/ayden-mekus.html
418[+] http://www.teenidols4you.com///gallery/3437/blaze-freeman.html
419[+] http://www.teenidols4you.com///picture/3437/4/blaze-freeman.html
420[+] http://www.teenidols4you.com///gallery/3719/brayden-benson.html
421[+] http://www.teenidols4you.com///picture/3719/4/brayden-benson.html
422[+] http://www.teenidols4you.com///gallery/3620/caio-laranjeira.html
423[+] http://www.teenidols4you.com///picture/3620/4/caio-laranjeira.html
424[+] http://www.teenidols4you.com///gallery/3731/caleb-coffee.html
425[+] http://www.teenidols4you.com///picture/3731/4/caleb-coffee.html
426[+] http://www.teenidols4you.com///gallery/3546/cameron-cuffe.html
427[+] http://www.teenidols4you.com///picture/3546/4/cameron-cuffe.html
428[+] http://www.teenidols4you.com///gallery/3091/carson-lueders.html
429[+] http://www.teenidols4you.com///picture/3091/4/carson-lueders.html
430[+] http://www.teenidols4you.com///gallery/3654/carson-white.html
431[+] http://www.teenidols4you.com///picture/3654/4/carson-white.html
432[+] http://www.teenidols4you.com///gallery/3595/charlie-shotwell.html
433[+] http://www.teenidols4you.com///picture/3595/4/charlie-shotwell.html
434[+] http://www.teenidols4you.com///gallery/3594/christian-convery.html
435[+] http://www.teenidols4you.com///picture/3594/4/christian-convery.html
436[+] http://www.teenidols4you.com///gallery/3526/corbyn-besson.html
437[+] http://www.teenidols4you.com///picture/3526/4/corbyn-besson.html
438[+] http://www.teenidols4you.com///gallery/2741/david-mazou.html
439[+] http://www.teenidols4you.com///picture/2741/4/david-mazou.html
440[+] http://www.teenidols4you.com///gallery/2847/diego-velazquez.html
441[+] http://www.teenidols4you.com///picture/2847/4/diego-velazquez.html
442[+] http://www.teenidols4you.com///gallery/3617/dylan-lawson.html
443[+] http://www.teenidols4you.com///picture/3617/4/dylan-lawson.html
444[+] http://www.teenidols4you.com///gallery/3221/elias-harger.html
445[+] http://www.teenidols4you.com///picture/3221/4/elias-harger.html
446[+] http://www.teenidols4you.com///gallery/3267/ethan-wacker.html
447[+] http://www.teenidols4you.com///picture/3267/4/ethan-wacker.html
448[+] http://www.teenidols4you.com///gallery/3476/gavin-magnus.html
449[+] http://www.teenidols4you.com///picture/3476/4/gavin-magnus.html
450[+] http://www.teenidols4you.com///gallery/3065/hayden-summerall.html
451[+] http://www.teenidols4you.com///picture/3065/4/hayden-summerall.html
452[+] http://www.teenidols4you.com///gallery/3290/hudson-west.html
453[+] http://www.teenidols4you.com///picture/3290/4/hudson-west.html
454[+] http://www.teenidols4you.com///gallery/3116/hunter-payton.html
455[+] http://www.teenidols4you.com///picture/3116/4/hunter-payton.html
456[+] http://www.teenidols4you.com///gallery/3189/isaak-presley.html
457[+] http://www.teenidols4you.com///picture/3189/4/isaak-presley.html
458[+] http://www.teenidols4you.com///gallery/3562/izan-llunas.html
459[+] http://www.teenidols4you.com///picture/3562/4/izan-llunas.html
460[+] http://www.teenidols4you.com///gallery/3525/jack-avery.html
461[+] http://www.teenidols4you.com///picture/3525/4/jack-avery.html
462[+] http://www.teenidols4you.com///gallery/3183/jacob-tremblay.html
463[+] http://www.teenidols4you.com///picture/3183/4/jacob-tremblay.html
464[+] http://www.teenidols4you.com///gallery/3683/jake-getman.html
465[+] http://www.teenidols4you.com///picture/3683/4/jake-getman.html
466[+] http://www.teenidols4you.com///gallery/3747/jake-satow.html
467[+] http://www.teenidols4you.com///picture/3747/4/jake-satow.html
468[+] http://www.teenidols4you.com///gallery/3751/jentzen-ramirez.html
469[+] http://www.teenidols4you.com///picture/3751/4/jentzen-ramirez.html
470[+] http://www.teenidols4you.com///gallery/3238/jet-jurgensmeyer.html
471[+] http://www.teenidols4you.com///picture/3238/4/jet-jurgensmeyer.html
472[+] http://www.teenidols4you.com///gallery/2764/johnny-orlando.html
473[+] http://www.teenidols4you.com///picture/2764/4/johnny-orlando.html
474[+] http://www.teenidols4you.com///gallery/2755/joshua-rush.html
475[+] http://www.teenidols4you.com///picture/2755/4/joshua-rush.html
476[+] http://www.teenidols4you.com///gallery/3281/jt-church.html
477[+] http://www.teenidols4you.com///picture/3281/4/jt-church.html
478[+] http://www.teenidols4you.com///gallery/3698/julian-grey.html
479[+] http://www.teenidols4you.com///picture/3698/4/julian-grey.html
480[+] http://www.teenidols4you.com///gallery/3503/kyle-breitkopf.html
481[+] http://www.teenidols4you.com///picture/3503/4/kyle-breitkopf.html
482[+] http://www.teenidols4you.com///gallery/3721/london-cheshire.html
483[+] http://www.teenidols4you.com///picture/3721/4/london-cheshire.html
484[+] http://www.teenidols4you.com///gallery/3659/lucas-royalty.html
485[+] http://www.teenidols4you.com///picture/3659/4/lucas-royalty.html
486[+] http://www.teenidols4you.com///gallery/3475/luke-mullen.html
487[+] http://www.teenidols4you.com///gallery/3192/malachi-barton.html
488[+] http://www.teenidols4you.com///picture/3192/4/malachi-barton.html
489[+] http://www.teenidols4you.com///gallery/3616/melvin-mellbolm.html
490[+] http://www.teenidols4you.com///picture/3616/4/melvin-mellbolm.html
491[+] http://www.teenidols4you.com///gallery/3405/merrick-hanna.html
492[+] http://www.teenidols4you.com///picture/3405/4/merrick-hanna.html
493[+] http://www.teenidols4you.com///gallery/3628/nadav-jackson.html
494[+] http://www.teenidols4you.com///picture/3628/4/nadav-jackson.html
495[+] http://www.teenidols4you.com///gallery/2559/niall-horan.html
496[+] http://www.teenidols4you.com///picture/2559/4/niall-horan.html
497[+] http://www.teenidols4you.com///gallery/3032/nicolas-bechtel.html
498[+] http://www.teenidols4you.com///picture/3032/4/nicolas-bechtel.html
499[+] http://www.teenidols4you.com///gallery/2827/peyton-meyer.html
500[+] http://www.teenidols4you.com///picture/2827/4/peyton-meyer.html
501[+] http://www.teenidols4you.com///gallery/3665/pierce-pope.html
502[+] http://www.teenidols4you.com///picture/3665/4/pierce-pope.html
503[+] http://www.teenidols4you.com///gallery/3623/robert-levey.html
504[+] http://www.teenidols4you.com///picture/3623/4/robert-levey.html
505[+] http://www.teenidols4you.com///gallery/3514/romeo-beckham.html
506[+] http://www.teenidols4you.com///picture/3514/4/romeo-beckham.html
507[+] http://www.teenidols4you.com///gallery/3718/ryker-baloun.html
508[+] http://www.teenidols4you.com///picture/3718/4/ryker-baloun.html
509[+] http://www.teenidols4you.com///gallery/3678/sawyer-sharbino.html
510[+] http://www.teenidols4you.com///picture/3678/4/sawyer-sharbino.html
511[+] http://www.teenidols4you.com///gallery/3661/tim-luca-schmidt.html
512[+] http://www.teenidols4you.com///picture/3661/4/tim-luca-schmidt.html
513[+] http://www.teenidols4you.com///gallery/3451/timothee-chalamet.html
514[+] http://www.teenidols4you.com///picture/3451/4/timothee-chalamet.html
515[+] http://www.teenidols4you.com///gallery/2769/tom-holland.html
516[+] http://www.teenidols4you.com///picture/2769/4/tom-holland.html
517[+] http://www.teenidols4you.com///gallery/3737/tyler-crumley.html
518[+] http://www.teenidols4you.com///picture/3737/4/tyler-crumley.html
519[+] http://www.teenidols4you.com///gallery/3625/tyler-dryden.html
520[+] http://www.teenidols4you.com///picture/3625/4/tyler-dryden.html
521[+] http://www.teenidols4you.com///gallery/3724/walker-bryant.html
522[+] http://www.teenidols4you.com///picture/3724/4/walker-bryant.html
523[+] http://www.teenidols4you.com///gallery/3430/william-franklyn-miller.html
524[+] http://www.teenidols4you.com///gallery/3523/zach-herron.html
525[+] http://www.teenidols4you.com///picture/3523/4/zach-herron.html
526[+] http://www.teenidols4you.com///gallery/3452/zackary-arthur.html
527[+] http://www.teenidols4you.com///picture/3452/4/zackary-arthur.html
528[+] http://www.teenidols4you.com///top50/today
529[+] http://www.teenidols4you.com///gallery/1159/anahi.html
530[+] http://www.teenidols4you.com///gallery/3724/walker-bryant.html
531[+] http://www.teenidols4you.com///gallery/3595/charlie-shotwell.html
532[+] http://www.teenidols4you.com///gallery/3460/alex-ruygrok.html
533[+] http://www.teenidols4you.com///gallery/3731/caleb-coffee.html
534[+] http://www.teenidols4you.com///gallery/3267/ethan-wacker.html
535[+] http://www.teenidols4you.com///gallery/3754/nickolas-wolf.html
536[+] http://www.teenidols4you.com///gallery/3753/benjamin-wadsworth.html
537[+] http://www.teenidols4you.com///gallery/3752/liam-mcgill.html
538[+] http://www.teenidols4you.com///gallery/3751/jentzen-ramirez.html
539[+] http://www.teenidols4you.com///gallery/3750/luke-roessler.html
540[+] http://www.teenidols4you.com///gallery/3749/dylan-hartman.html
541[+] http://www.teenidols4you.com///birthdays.php
542[+] http://www.teenidols4you.com///gallery/2383/ryanwynott.html
543[+] http://www.teenidols4you.com///gallery/3548/jack-mcgraw.html
544[+] http://www.teenidols4you.com///gallery/2262/stefaniescott.html
545[+] http://www.teenidols4you.com///gallery/1149/tristanpuehse.html
546[+] http://www.teenidols4you.com///gallery/1148/nicpuehse.html
547[+] http://www.teenidols4you.com///gallery/3136/tanner-buchanan.html
548[+] http://www.teenidols4you.com///videos/pages/copyright.html
549[+] http://www.teenidols4you.com///privacy.html
550[+] http://cdn.teenidols4you.com/css/A.ffstyle3-2-min.css.pagespeed.cf.jfdSiDKV05.css
551--------------------------------------------------
552[!] 1 External links Discovered
553[#] https://buysellads.com/buy/detail/244057
554--------------------------------------------------
555[#] Mapping Subdomain..
556[!] Found 3 Subdomain
557- m.teenidols4you.com
558- statcount.teenidols4you.com
559- www.teenidols4you.com
560--------------------------------------------------
561[!] Done At 2019-12-06 13:57:12.775865
562#################################################################################################
563[INFO] ------TARGET info------
564[*] TARGET: http://www.teenidols4you.com/
565[*] TARGET IP: 45.55.35.220
566[INFO] NO load balancer detected for www.teenidols4you.com...
567[*] DNS servers: ns-1843.awsdns-38.co.uk.
568[*] TARGET server: Apache/2.2.15 (CentOS)
569[*] CC: US
570[*] Country: United States
571[*] RegionCode: NJ
572[*] RegionName: New Jersey
573[*] City: Clifton
574[*] ASN: AS14061
575[*] BGP_PREFIX: 45.55.32.0/19
576[*] ISP: DIGITALOCEAN-ASN - DigitalOcean, LLC, US
577[INFO] DNS enumeration:
578[*] cdn.teenidols4you.com teenidols.thegalacticstudio.netdna-cdn.com. 94.31.29.248
579[*] m.teenidols4you.com 45.55.35.220
580[INFO] Possible abuse mails are:
581[*] abuse@digitalocean.com
582[*] abuse@teenidols4you.com
583[*] abuse@www.teenidols4you.com
584[INFO] NO PAC (Proxy Auto Configuration) file FOUND
585[ALERT] robots.txt file FOUND in http://www.teenidols4you.com/robots.txt
586[INFO] Checking for HTTP status codes recursively from http://www.teenidols4you.com/robots.txt
587[INFO] Status code Folders
588[*] 200 http://www.teenidols4you.com/include/functions.php
589[*] 200 http://www.teenidols4you.com/include/rate.php
590[*] 200 http://www.teenidols4you.com/replycoms.php
591[*] 200 http://www.teenidols4you.com/reportcoms.php
592[*] 200 http://www.teenidols4you.com/videos/admin
593[*] 200 http://www.teenidols4you.com/videos/email_template
594[*] 200 http://www.teenidols4you.com/videos/include
595[*] 200 http://www.teenidols4you.com/videos/Smarty
596[INFO] Starting FUZZing in http://www.teenidols4you.com/FUzZzZzZzZz...
597[INFO] Status code Folders
598[ALERT] Look in the source code. It may contain passwords
599[INFO] Links found from http://www.teenidols4you.com/ http://45.55.35.220/:
600[*] http://m.teenidols4you.com/
601[*] http://m.teenidols4you.com/actor.html
602[*] http://m.teenidols4you.com/Actors.html
603[*] http://m.teenidols4you.com/birthdays.php
604[*] http://m.teenidols4you.com/contact.php
605[*] http://m.teenidols4you.com/copyright.php
606[*] http://m.teenidols4you.com/gallery/1148/nicpuehse.html
607[*] http://m.teenidols4you.com/gallery/1149/tristanpuehse.html
608[*] http://m.teenidols4you.com/gallery/1159/anahi.html
609[*] http://m.teenidols4you.com/gallery/2262/stefaniescott.html
610[*] http://m.teenidols4you.com/gallery/2383/ryanwynott.html
611[*] http://m.teenidols4you.com/gallery/2559/niall-horan.html
612[*] http://m.teenidols4you.com/gallery/2741/david-mazou.html
613[*] http://m.teenidols4you.com/gallery/2755/joshua-rush.html
614[*] http://m.teenidols4you.com/gallery/2764/johnny-orlando.html
615[*] http://m.teenidols4you.com/gallery/2769/tom-holland.html
616[*] http://m.teenidols4you.com/gallery/2827/peyton-meyer.html
617[*] http://m.teenidols4you.com/gallery/2847/diego-velazquez.html
618[*] http://m.teenidols4you.com/gallery/2924/august-maturo.html
619[*] http://m.teenidols4you.com/gallery/2972/aidan-gallagher.html
620[*] http://m.teenidols4you.com/gallery/3032/nicolas-bechtel.html
621[*] http://m.teenidols4you.com/gallery/3065/hayden-summerall.html
622[*] http://m.teenidols4you.com/gallery/3091/carson-lueders.html
623[*] http://m.teenidols4you.com/gallery/3116/hunter-payton.html
624[*] http://m.teenidols4you.com/gallery/3183/jacob-tremblay.html
625[*] http://m.teenidols4you.com/gallery/3189/isaak-presley.html
626[*] http://m.teenidols4you.com/gallery/3192/malachi-barton.html
627[*] http://m.teenidols4you.com/gallery/3221/elias-harger.html
628[*] http://m.teenidols4you.com/gallery/3238/jet-jurgensmeyer.html
629[*] http://m.teenidols4you.com/gallery/3267/ethan-wacker.html
630[*] http://m.teenidols4you.com/gallery/3270/asher-angel.html
631[*] http://m.teenidols4you.com/gallery/3281/jt-church.html
632[*] http://m.teenidols4you.com/gallery/3290/hudson-west.html
633[*] http://m.teenidols4you.com/gallery/3405/merrick-hanna.html
634[*] http://m.teenidols4you.com/gallery/3430/william-franklyn-miller.html
635[*] http://m.teenidols4you.com/gallery/3437/blaze-freeman.html
636[*] http://m.teenidols4you.com/gallery/3451/timothee-chalamet.html
637[*] http://m.teenidols4you.com/gallery/3452/zackary-arthur.html
638[*] http://m.teenidols4you.com/gallery/3460/alex-ruygrok.html
639[*] http://m.teenidols4you.com/gallery/3475/luke-mullen.html
640[*] http://m.teenidols4you.com/gallery/3476/gavin-magnus.html
641[*] http://m.teenidols4you.com/gallery/3503/kyle-breitkopf.html
642[*] http://m.teenidols4you.com/gallery/3514/romeo-beckham.html
643[*] http://m.teenidols4you.com/gallery/3523/zach-herron.html
644[*] http://m.teenidols4you.com/gallery/3525/jack-avery.html
645[*] http://m.teenidols4you.com/gallery/3526/corbyn-besson.html
646[*] http://m.teenidols4you.com/gallery/3546/cameron-cuffe.html
647[*] http://m.teenidols4you.com/gallery/3548/jack-mcgraw.html
648[*] http://m.teenidols4you.com/gallery/3562/izan-llunas.html
649[*] http://m.teenidols4you.com/gallery/3594/christian-convery.html
650[*] http://m.teenidols4you.com/gallery/3595/charlie-shotwell.html
651[*] http://m.teenidols4you.com/gallery/3604/anthony-rosenthal.html
652[*] http://m.teenidols4you.com/gallery/3611/ayden-mekus.html
653[*] http://m.teenidols4you.com/gallery/3616/melvin-mellbolm.html
654[*] http://m.teenidols4you.com/gallery/3617/dylan-lawson.html
655[*] http://m.teenidols4you.com/gallery/3620/caio-laranjeira.html
656[*] http://m.teenidols4you.com/gallery/3623/robert-levey.html
657[*] http://m.teenidols4you.com/gallery/3625/tyler-dryden.html
658[*] http://m.teenidols4you.com/gallery/3628/nadav-jackson.html
659[*] http://m.teenidols4you.com/gallery/3654/carson-white.html
660[*] http://m.teenidols4you.com/gallery/3659/lucas-royalty.html
661[*] http://m.teenidols4you.com/gallery/3661/tim-luca-schmidt.html
662[*] http://m.teenidols4you.com/gallery/3665/pierce-pope.html
663[*] http://m.teenidols4you.com/gallery/3678/sawyer-sharbino.html
664[*] http://m.teenidols4you.com/gallery/3683/jake-getman.html
665[*] http://m.teenidols4you.com/gallery/3698/julian-grey.html
666[*] http://m.teenidols4you.com/gallery/3718/ryker-baloun.html
667[*] http://m.teenidols4you.com/gallery/3719/brayden-benson.html
668[*] http://m.teenidols4you.com/gallery/3721/london-cheshire.html
669[*] http://m.teenidols4you.com/gallery/3724/walker-bryant.html
670[*] http://m.teenidols4you.com/gallery/3731/caleb-coffee.html
671[*] http://m.teenidols4you.com/gallery/3737/tyler-crumley.html
672[*] http://m.teenidols4you.com/gallery/3747/jake-satow.html
673[*] http://m.teenidols4you.com/gallery/3750/luke-roessler.html
674[*] http://m.teenidols4you.com/gallery/3751/jentzen-ramirez.html
675[*] http://m.teenidols4you.com/gallery/3752/liam-mcgill.html
676[*] http://m.teenidols4you.com/gallery/3753/benjamin-wadsworth.html
677[*] http://m.teenidols4you.com/gallery/3754/nickolas-wolf.html
678[*] http://m.teenidols4you.com/news/enews1152.html
679[*] http://m.teenidols4you.com/news/enews1153.html
680[*] http://m.teenidols4you.com/news/enews1154.html
681[*] http://m.teenidols4you.com/news/enews1155.html
682[*] http://m.teenidols4you.com/news/enews1156.html
683[*] http://m.teenidols4you.com/news/enews1157.html
684[*] http://m.teenidols4you.com/news/enews1168.html
685[*] http://m.teenidols4you.com/news.html
686[*] http://m.teenidols4you.com/picture/2559/4/niall-horan.html
687[*] http://m.teenidols4you.com/picture/2741/4/david-mazou.html
688[*] http://m.teenidols4you.com/picture/2755/4/joshua-rush.html
689[*] http://m.teenidols4you.com/picture/2764/4/johnny-orlando.html
690[*] http://m.teenidols4you.com/picture/2769/4/tom-holland.html
691[*] http://m.teenidols4you.com/picture/2827/4/peyton-meyer.html
692[*] http://m.teenidols4you.com/picture/2847/4/diego-velazquez.html
693[*] http://m.teenidols4you.com/picture/2924/4/august-maturo.html
694[*] http://m.teenidols4you.com/picture/2972/4/aidan-gallagher.html
695[*] http://m.teenidols4you.com/picture/3032/4/nicolas-bechtel.html
696[*] http://m.teenidols4you.com/picture/3065/4/hayden-summerall.html
697[*] http://m.teenidols4you.com/picture/3091/4/carson-lueders.html
698[*] http://m.teenidols4you.com/picture/3116/4/hunter-payton.html
699[*] http://m.teenidols4you.com/picture/3183/4/jacob-tremblay.html
700[*] http://m.teenidols4you.com/picture/3189/4/isaak-presley.html
701[*] http://m.teenidols4you.com/picture/3192/4/malachi-barton.html
702[*] http://m.teenidols4you.com/picture/3221/4/elias-harger.html
703[*] http://m.teenidols4you.com/picture/3238/4/jet-jurgensmeyer.html
704[*] http://m.teenidols4you.com/picture/3267/4/ethan-wacker.html
705[*] http://m.teenidols4you.com/picture/3270/4/asher-angel.html
706[*] http://m.teenidols4you.com/picture/3281/4/jt-church.html
707[*] http://m.teenidols4you.com/picture/3290/4/hudson-west.html
708[*] http://m.teenidols4you.com/picture/3405/4/merrick-hanna.html
709[*] http://m.teenidols4you.com/picture/3437/4/blaze-freeman.html
710[*] http://m.teenidols4you.com/picture/3451/4/timothee-chalamet.html
711[*] http://m.teenidols4you.com/picture/3452/4/zackary-arthur.html
712[*] http://m.teenidols4you.com/picture/3460/4/alex-ruygrok.html
713[*] http://m.teenidols4you.com/picture/3476/4/gavin-magnus.html
714[*] http://m.teenidols4you.com/picture/3503/4/kyle-breitkopf.html
715[*] http://m.teenidols4you.com/picture/3514/4/romeo-beckham.html
716[*] http://m.teenidols4you.com/picture/3523/4/zach-herron.html
717[*] http://m.teenidols4you.com/picture/3525/4/jack-avery.html
718[*] http://m.teenidols4you.com/picture/3526/4/corbyn-besson.html
719[*] http://m.teenidols4you.com/picture/3546/4/cameron-cuffe.html
720[*] http://m.teenidols4you.com/picture/3562/4/izan-llunas.html
721[*] http://m.teenidols4you.com/picture/3594/4/christian-convery.html
722[*] http://m.teenidols4you.com/picture/3595/4/charlie-shotwell.html
723[*] http://m.teenidols4you.com/picture/3604/4/anthony-rosenthal.html
724[*] http://m.teenidols4you.com/picture/3611/4/ayden-mekus.html
725[*] http://m.teenidols4you.com/picture/3616/4/melvin-mellbolm.html
726[*] http://m.teenidols4you.com/picture/3617/4/dylan-lawson.html
727[*] http://m.teenidols4you.com/picture/3620/4/caio-laranjeira.html
728[*] http://m.teenidols4you.com/picture/3623/4/robert-levey.html
729[*] http://m.teenidols4you.com/picture/3625/4/tyler-dryden.html
730[*] http://m.teenidols4you.com/picture/3628/4/nadav-jackson.html
731[*] http://m.teenidols4you.com/picture/3654/4/carson-white.html
732[*] http://m.teenidols4you.com/picture/3659/4/lucas-royalty.html
733[*] http://m.teenidols4you.com/picture/3661/4/tim-luca-schmidt.html
734[*] http://m.teenidols4you.com/picture/3665/4/pierce-pope.html
735[*] http://m.teenidols4you.com/picture/3678/4/sawyer-sharbino.html
736[*] http://m.teenidols4you.com/picture/3683/4/jake-getman.html
737[*] http://m.teenidols4you.com/picture/3698/4/julian-grey.html
738[*] http://m.teenidols4you.com/picture/3718/4/ryker-baloun.html
739[*] http://m.teenidols4you.com/picture/3719/4/brayden-benson.html
740[*] http://m.teenidols4you.com/picture/3721/4/london-cheshire.html
741[*] http://m.teenidols4you.com/picture/3724/4/walker-bryant.html
742[*] http://m.teenidols4you.com/picture/3731/4/caleb-coffee.html
743[*] http://m.teenidols4you.com/picture/3737/4/tyler-crumley.html
744[*] http://m.teenidols4you.com/picture/3747/4/jake-satow.html
745[*] http://m.teenidols4you.com/picture/3751/4/jentzen-ramirez.html
746[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=caleb-coffee&foto=554&act=3731&mv=4&pic=910639
747[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=caleb-coffee&foto=554&act=3731&mv=4&pic=910640
748[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=caleb-coffee&foto=554&act=3731&mv=4&pic=910641
749[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=caleb-coffee&foto=554&act=3731&mv=4&pic=910642
750[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=jentzen-ramirez&foto=554&act=3751&mv=4&pic=910654
751[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=johnny-orlando&foto=554&act=2764&mv=4&pic=910637
752[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=london-cheshire&foto=554&act=3721&mv=4&pic=910653
753[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910644
754[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910645
755[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910646
756[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
757[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910652
758[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=niall-horan&foto=554&act=2559&mv=4&pic=910638
759[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=ryker-baloun&foto=554&act=3718&mv=4&pic=910643
760[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=tyler-crumley&foto=554&act=3737&mv=4&pic=910650
761[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910647
762[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910648
763[*] http://m.teenidols4you.com/picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910649
764[*] http://m.teenidols4you.com/privacy.php
765[*] http://m.teenidols4you.com/Singers.html
766[*] http://m.teenidols4you.com/terms.php
767[*] http://m.teenidols4you.com/top50/today
768[*] http://m.teenidols4you.com/updates.html
769[*] http://m.teenidols4you.com/uploaded.php
770[*] http://www.teenidols4you.com/?prefer_full_site=true
771cut: intervalle de champ incorrecte
772Saisissez « cut --help » pour plus d'informations.
773[INFO] Shodan detected the following opened ports on 45.55.35.220:
774[*] 123
775[*] 3306
776[*] 80
777[INFO] ------VirusTotal SECTION------
778[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
779[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
780[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
781[INFO] ------Alexa Rank SECTION------
782[INFO] Percent of Visitors Rank in Country:
783[INFO] Percent of Search Traffic:
784[INFO] Percent of Unique Visits:
785[INFO] Total Sites Linking In:
786[*] Total Sites
787[INFO] Useful links related to www.teenidols4you.com - 45.55.35.220:
788[*] https://www.virustotal.com/pt/ip-address/45.55.35.220/information/
789[*] https://www.hybrid-analysis.com/search?host=45.55.35.220
790[*] https://www.shodan.io/host/45.55.35.220
791[*] https://www.senderbase.org/lookup/?search_string=45.55.35.220
792[*] https://www.alienvault.com/open-threat-exchange/ip/45.55.35.220
793[*] http://pastebin.com/search?q=45.55.35.220
794[*] http://urlquery.net/search.php?q=45.55.35.220
795[*] http://www.alexa.com/siteinfo/www.teenidols4you.com
796[*] http://www.google.com/safebrowsing/diagnostic?site=www.teenidols4you.com
797[*] https://censys.io/ipv4/45.55.35.220
798[*] https://www.abuseipdb.com/check/45.55.35.220
799[*] https://urlscan.io/search/#45.55.35.220
800[*] https://github.com/search?q=45.55.35.220&type=Code
801[INFO] Useful links related to AS14061 - 45.55.32.0/19:
802[*] http://www.google.com/safebrowsing/diagnostic?site=AS:14061
803[*] https://www.senderbase.org/lookup/?search_string=45.55.32.0/19
804[*] http://bgp.he.net/AS14061
805[*] https://stat.ripe.net/AS14061
806[INFO] Date: 06/12/19 | Time: 13:59:49
807[INFO] Total time: 2 minute(s) and 52 second(s)
808##################################################################################################
809Trying "teenidols4you.com"
810;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17413
811;; flags: qr rd ra; QUERY: 1, ANSWER: 9, AUTHORITY: 4, ADDITIONAL: 1
812
813;; QUESTION SECTION:
814;teenidols4you.com. IN ANY
815
816;; ANSWER SECTION:
817teenidols4you.com. 5 IN TXT "v=spf1 ip4:45.55.35.220 -all"
818teenidols4you.com. 5 IN TXT "brave-ledger-verification=c9cfb4eec7e83aaa73a5d6692265a984a32e64f2710027f35670ddba3c34ab2c"
819teenidols4you.com. 5 IN MX 10 mail.deadendmail.com.
820teenidols4you.com. 5 IN SOA ns-1843.awsdns-38.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
821teenidols4you.com. 5 IN A 45.55.35.220
822teenidols4you.com. 5 IN NS ns-708.awsdns-24.net.
823teenidols4you.com. 5 IN NS ns-25.awsdns-03.com.
824teenidols4you.com. 5 IN NS ns-1843.awsdns-38.co.uk.
825teenidols4you.com. 5 IN NS ns-1439.awsdns-51.org.
826
827;; AUTHORITY SECTION:
828teenidols4you.com. 30829 IN NS ns-1843.awsdns-38.co.uk.
829teenidols4you.com. 30829 IN NS ns-708.awsdns-24.net.
830teenidols4you.com. 30829 IN NS ns-1439.awsdns-51.org.
831teenidols4you.com. 30829 IN NS ns-25.awsdns-03.com.
832
833;; ADDITIONAL SECTION:
834ns-25.awsdns-03.com. 11532 IN A 205.251.192.25
835
836Received 497 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 96 ms
837#################################################################################################
838; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace teenidols4you.com any
839;; global options: +cmd
840. 84028 IN NS j.root-servers.net.
841. 84028 IN NS f.root-servers.net.
842. 84028 IN NS h.root-servers.net.
843. 84028 IN NS l.root-servers.net.
844. 84028 IN NS i.root-servers.net.
845. 84028 IN NS d.root-servers.net.
846. 84028 IN NS m.root-servers.net.
847. 84028 IN NS e.root-servers.net.
848. 84028 IN NS k.root-servers.net.
849. 84028 IN NS a.root-servers.net.
850. 84028 IN NS b.root-servers.net.
851. 84028 IN NS g.root-servers.net.
852. 84028 IN NS c.root-servers.net.
853. 84028 IN RRSIG NS 8 0 518400 20191219050000 20191206040000 22545 . M8YFLxu+nyFIEyqDVDnPl8V1dhsgzhfaucnDmLAQ0Vbnopnz9t0Wh1Z+ 7CRwWFhgXQrYEK4zVzgUQVG54XIAdif/kgzMV01l3hKKJMnyutq7Kp1g CZVdAVnRjmVWm5vk59MoztW6stpN5NmezlUWYOJtLMqJH3VsduzllwiD xZQu5DM/tJrDrQWEWsFhgSrGJhHkoftJIPBbvbnc2QiLZYAzo+ihXdBw Epp4tpOgyCRtFKHab3Zhg0ZR/2lHM/iqYlBcT/B0XVgajCQWGaIkODXm 6H8C/8q8E0+WaejJ/SqmQhJWNCPkQezeR/3cz9CfjrICfhONjkwtM4/J 6LCy7w==
854;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 324 ms
855
856com. 172800 IN NS a.gtld-servers.net.
857com. 172800 IN NS b.gtld-servers.net.
858com. 172800 IN NS c.gtld-servers.net.
859com. 172800 IN NS d.gtld-servers.net.
860com. 172800 IN NS e.gtld-servers.net.
861com. 172800 IN NS f.gtld-servers.net.
862com. 172800 IN NS g.gtld-servers.net.
863com. 172800 IN NS h.gtld-servers.net.
864com. 172800 IN NS i.gtld-servers.net.
865com. 172800 IN NS j.gtld-servers.net.
866com. 172800 IN NS k.gtld-servers.net.
867com. 172800 IN NS l.gtld-servers.net.
868com. 172800 IN NS m.gtld-servers.net.
869com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
870com. 86400 IN RRSIG DS 8 1 86400 20191219050000 20191206040000 22545 . OBLBMAKPWdA9vtl+G+51COaZLcCCWqZZHqV/EgOTAVGNDx4JrinTOynB eY2PHFjv4VbzRhjZxic7LH3gVJhO0T7nu+VygYvL2jshHIP+1uc15fzl 42PgBvJEVVV2FZoMDoS72wJ10jK/dN2PfhPfXTrK42XqGDa253opx2W2 +aTcu4YsXCbEjn7z2wg5LguHcsFX56zhYONsnH2UWtCAQCQhBH64M/NL CweHmJNTEjvhBQOATGB66vuhkgn5v9EpBwRSH/MG6klVj6KOfcpHpbAj GKjazHo3A7l4e5EkVYXNhDPF2bI3/thcplNFkGDvuAAfrftfnvddZWgB beBOGg==
871;; Received 1177 bytes from 2001:500:9f::42#53(l.root-servers.net) in 46 ms
872
873teenidols4you.com. 172800 IN NS ns-25.awsdns-03.com.
874teenidols4you.com. 172800 IN NS ns-708.awsdns-24.net.
875teenidols4you.com. 172800 IN NS ns-1843.awsdns-38.co.uk.
876teenidols4you.com. 172800 IN NS ns-1439.awsdns-51.org.
877CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
878CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20191213054807 20191206043807 12163 com. NjRosY9LtJZsqeG+g+/JAi8jqB/0KYSqvkI/a4KEUM8atk25ERfJ+69Y WLKQDc048p4OC4TFn/R+Z73M3Xo1uAp0QSiBOzQXasVb0RvXKJOIfDyy mIMQh9IJGXXBMNgrbCG1AaN4DyU4uTxi6nIsoOc58h1FYov7seLt9ezy waw1r5UbrRg6J7xML7Ge/yui3VffXOYoeitCRJZkeTvcGg==
8794K03HH891I2G5NE4GR3F18F0861JBQ70.com. 86400 IN NSEC3 1 1 0 - 4K04V0G4N9JT65MU98F0D2C4Q5C8C8U5 NS DS RRSIG
8804K03HH891I2G5NE4GR3F18F0861JBQ70.com. 86400 IN RRSIG NSEC3 8 2 86400 20191210065724 20191203054724 12163 com. JAgbW0fGLSAtkmkIxNQnNjiqUKiMA3JL7eVa/HyG59RfpsmET2Z0BS04 yCi3QiuzOewIcQvQOwRfRT552BgyeBUHiYIavvJZmmaKRCRaGm1RTkgl sdI5H9ZEK+HTO6mh9Ii1gfX1uWKCiMEX0Lfmt7ING9vzwebycQwVIvfA 7bwfbUEkdMRkb+AWdqOIzcBXfkk0Dnq2gG4hQ8lmuVKkbw==
881;; Received 747 bytes from 2001:500:d937::30#53(l.gtld-servers.net) in 71 ms
882
883teenidols4you.com. 14440 IN A 45.55.35.220
884teenidols4you.com. 172800 IN NS ns-1439.awsdns-51.org.
885teenidols4you.com. 172800 IN NS ns-1843.awsdns-38.co.uk.
886teenidols4you.com. 172800 IN NS ns-25.awsdns-03.com.
887teenidols4you.com. 172800 IN NS ns-708.awsdns-24.net.
888teenidols4you.com. 14440 IN SOA ns-1843.awsdns-38.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
889teenidols4you.com. 86400 IN MX 10 mail.deadendmail.com.
890teenidols4you.com. 3600 IN TXT "brave-ledger-verification=c9cfb4eec7e83aaa73a5d6692265a984a32e64f2710027f35670ddba3c34ab2c"
891teenidols4you.com. 3600 IN TXT "v=spf1 ip4:45.55.35.220 -all"
892;; Received 436 bytes from 2600:9000:5307:3300::1#53(ns-1843.awsdns-38.co.uk) in 53 ms
893
894##################################################################################################
895[*] Performing General Enumeration of Domain: teenidols4you.com
896[-] DNSSEC is not configured for teenidols4you.com
897[*] SOA ns-1843.awsdns-38.co.uk 205.251.199.51
898[*] NS ns-1843.awsdns-38.co.uk 205.251.199.51
899[*] NS ns-1843.awsdns-38.co.uk 2600:9000:5307:3300::1
900[*] NS ns-25.awsdns-03.com 205.251.192.25
901[*] NS ns-25.awsdns-03.com 2600:9000:5300:1900::1
902[*] NS ns-708.awsdns-24.net 205.251.194.196
903[*] NS ns-708.awsdns-24.net 2600:9000:5302:c400::1
904[*] NS ns-1439.awsdns-51.org 205.251.197.159
905[*] NS ns-1439.awsdns-51.org 2600:9000:5305:9f00::1
906#################################################################################################
907[*] Processing domain teenidols4you.com
908[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
909[+] Getting nameservers
910205.251.199.51 - ns-1843.awsdns-38.co.uk
911205.251.192.25 - ns-25.awsdns-03.com
912205.251.194.196 - ns-708.awsdns-24.net
913205.251.197.159 - ns-1439.awsdns-51.org
914[-] Zone transfer failed
915
916[+] TXT records found
917"v=spf1 ip4:45.55.35.220 -all"
918"brave-ledger-verification=c9cfb4eec7e83aaa73a5d6692265a984a32e64f2710027f35670ddba3c34ab2c"
919
920[+] MX records found, added to target list
92110 mail.deadendmail.com.
922
923[*] Scanning teenidols4you.com for A records
92445.55.35.220 - teenidols4you.com
92545.55.35.220 - assets.teenidols4you.com
92694.31.29.248 - cdn.teenidols4you.com
92745.55.35.220 - m.teenidols4you.com
928################################################################################################
929Parsero scan report for www.teenidols4you.com
930http://www.teenidols4you.com/include/functions.php 200 OK
931http://www.teenidols4you.com/include/rate.php 200 OK
932http://www.teenidols4you.com/videos/include 301 Moved Permanently
933http://www.teenidols4you.com/videos/email_template 301 Moved Permanently
934http://www.teenidols4you.com/images 301 Moved Permanently
935http://www.teenidols4you.com/videos/admin 301 Moved Permanently
936http://www.teenidols4you.com/videos/bbclone 404 Not Found
937http://www.teenidols4you.com/clink 404 Not Found
938http://www.teenidols4you.com/videos/Smarty 301 Moved Permanently
939http://www.teenidols4you.com/reportcoms.php 200 OK
940http://www.teenidols4you.com/blink 404 Not Found
941http://www.teenidols4you.com/replycoms.php 200 OK
942http://www.teenidols4you.com/videos/docs 404 Not Found
943http://www.teenidols4you.com/clink/ 404 Not Found
944#################################################################################################
945Domains still to check: 1
946 Checking if the hostname teenidols4you.com. given is in fact a domain...
947
948Analyzing domain: teenidols4you.com.
949 Checking NameServers using system default resolver...
950 IP: 205.251.199.51 (United States)
951 HostName: ns-1843.awsdns-38.co.uk Type: NS
952 HostName: ns-1843.awsdns-38.co.uk Type: PTR
953 IP: 205.251.192.25 (United States)
954 HostName: ns-25.awsdns-03.com Type: NS
955 HostName: ns-25.awsdns-03.com Type: PTR
956 IP: 205.251.194.196 (United States)
957 HostName: ns-708.awsdns-24.net Type: NS
958 HostName: ns-708.awsdns-24.net Type: PTR
959 IP: 205.251.197.159 (United States)
960 HostName: ns-1439.awsdns-51.org Type: NS
961 HostName: ns-1439.awsdns-51.org Type: PTR
962
963 Checking MailServers using system default resolver...
964 IP: 50.193.231.57 (United States)
965 HostName: mail.deadendmail.com Type: MX
966 HostName: mail.deadendmail.com Type: PTR
967
968 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
969 No zone transfer found on nameserver 205.251.194.196
970 No zone transfer found on nameserver 205.251.192.25
971 No zone transfer found on nameserver 205.251.197.159
972 No zone transfer found on nameserver 205.251.199.51
973
974 Checking SPF record...
975 New IP found: 45.55.35.220
976
977 Checking 192 most common hostnames using system default resolver...
978 IP: 45.55.35.220 (United States)
979 Type: SPF
980 HostName: www.teenidols4you.com. Type: A
981 HostName: teenidols4you.com Type: PTR
982
983 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
984 Checking netblock 205.251.197.0
985 Checking netblock 50.193.231.0
986 Checking netblock 205.251.194.0
987 Checking netblock 45.55.35.0
988 Checking netblock 205.251.199.0
989 Checking netblock 205.251.192.0
990
991 Searching for teenidols4you.com. emails in Google
992
993 Checking 6 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
994 Host 205.251.197.159 is up (reset ttl 64)
995 Host 50.193.231.57 is up (reset ttl 64)
996 Host 205.251.194.196 is up (reset ttl 64)
997 Host 45.55.35.220 is up (reset ttl 64)
998 Host 205.251.199.51 is up (reset ttl 64)
999 Host 205.251.192.25 is up (reset ttl 64)
1000
1001 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1002 Scanning ip 205.251.197.159 (ns-1439.awsdns-51.org (PTR)):
1003 53/tcp open tcpwrapped syn-ack ttl 246
1004 Scanning ip 50.193.231.57 (mail.deadendmail.com (PTR)):
1005 Scanning ip 205.251.194.196 (ns-708.awsdns-24.net (PTR)):
1006 53/tcp open tcpwrapped syn-ack ttl 243
1007 Scanning ip 45.55.35.220 (teenidols4you.com (PTR)):
1008 80/tcp open http syn-ack ttl 50 Apache httpd 2.2.15 ((CentOS))
1009 | http-methods:
1010 |_ Supported Methods: GET HEAD POST OPTIONS
1011 |_http-server-header: Apache/2.2.15 (CentOS)
1012 |_http-title: Did not follow redirect to http://www.45.55.35.220/
1013 3306/tcp open mysql syn-ack ttl 51 MySQL (unauthorized)
1014 Scanning ip 205.251.199.51 (ns-1843.awsdns-38.co.uk (PTR)):
1015 53/tcp open tcpwrapped syn-ack ttl 245
1016 Device type: storage-misc|PBX
1017 Scanning ip 205.251.192.25 (ns-25.awsdns-03.com (PTR)):
1018 53/tcp open tcpwrapped syn-ack ttl 243
1019 WebCrawling domain's web servers... up to 50 max links.
1020
1021 + URL to crawl: http://www.teenidols4you.com.
1022 + Date: 2019-12-06
1023
1024 + Crawling URL: http://www.teenidols4you.com.:
1025 + Links:
1026 + Crawling http://www.teenidols4you.com.
1027 + Crawling http://www.teenidols4you.com./news.html
1028 + Crawling http://www.teenidols4you.com./actor.html
1029 + Crawling http://www.teenidols4you.com./Singers.html
1030 + Crawling http://www.teenidols4you.com./shows/a.html
1031 + Crawling http://www.teenidols4you.com./top50/today
1032 + Crawling http://www.teenidols4you.com./videos/
1033 + Crawling http://www.teenidols4you.com./uploaded.php
1034 + Crawling http://www.teenidols4you.com./birthdays.php
1035 + Crawling http://www.teenidols4you.com./updates.html
1036 + Crawling http://www.teenidols4you.com./upload.php
1037 + Crawling http://www.teenidols4you.com./Actors.html
1038 + Crawling http://www.teenidols4you.com./videos/contact_us.html
1039 + Crawling http://www.teenidols4you.com./search.html
1040 + Crawling http://www.teenidols4you.com./news/enews1168.html
1041 + Crawling http://www.teenidols4you.com./news/enews1157.html
1042 + Crawling http://www.teenidols4you.com./news/enews1156.html
1043 + Crawling http://www.teenidols4you.com./news/enews1155.html
1044 + Crawling http://www.teenidols4you.com./uploaded.html
1045 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=jentzen-ramirez&foto=554&act=3751&mv=4&pic=910654
1046 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=london-cheshire&foto=554&act=3721&mv=4&pic=910653
1047 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910652
1048 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
1049 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=tyler-crumley&foto=554&act=3737&mv=4&pic=910650
1050 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910649
1051 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910648
1052 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910647
1053 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910646
1054 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910645
1055 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910644
1056 + Crawling http://www.teenidols4you.com./picture.html?g=Actors&pe=ryker-baloun&foto=554&act=3718&mv=4&pic=910643
1057 + Crawling http://www.teenidols4you.com./gallery/2972/aidan-gallagher.html
1058 + Crawling http://www.teenidols4you.com./picture/2972/4/aidan-gallagher.html
1059 + Crawling http://www.teenidols4you.com./gallery/3460/alex-ruygrok.html
1060 + Crawling http://www.teenidols4you.com./picture/3460/4/alex-ruygrok.html
1061 + Crawling http://www.teenidols4you.com./gallery/3604/anthony-rosenthal.html
1062 + Crawling http://www.teenidols4you.com./picture/3604/4/anthony-rosenthal.html
1063 + Crawling http://www.teenidols4you.com./gallery/3270/asher-angel.html
1064 + Crawling http://www.teenidols4you.com./picture/3270/4/asher-angel.html
1065 + Crawling http://www.teenidols4you.com./gallery/2924/august-maturo.html
1066 + Crawling http://www.teenidols4you.com./picture/2924/4/august-maturo.html
1067 + Crawling http://www.teenidols4you.com./gallery/3611/ayden-mekus.html
1068 + Crawling http://www.teenidols4you.com./picture/3611/4/ayden-mekus.html
1069 + Crawling http://www.teenidols4you.com./gallery/3437/blaze-freeman.html
1070 + Crawling http://www.teenidols4you.com./picture/3437/4/blaze-freeman.html
1071 + Crawling http://www.teenidols4you.com./gallery/3719/brayden-benson.html
1072 + Crawling http://www.teenidols4you.com./picture/3719/4/brayden-benson.html
1073 + Crawling http://www.teenidols4you.com./gallery/3620/caio-laranjeira.html
1074 + Crawling http://www.teenidols4you.com./picture/3620/4/caio-laranjeira.html
1075 + Crawling http://www.teenidols4you.com./gallery/3731/caleb-coffee.html
1076 + Searching for directories...
1077 - Found: http://www.teenidols4you.com./shows/
1078 - Found: http://www.teenidols4you.com./top50/
1079 - Found: http://www.teenidols4you.com./videos/
1080 - Found: http://www.teenidols4you.com./news/
1081 - Found: http://www.teenidols4you.com./gallery/
1082 - Found: http://www.teenidols4you.com./gallery/2972/
1083 - Found: http://www.teenidols4you.com./picture/
1084 - Found: http://www.teenidols4you.com./picture/2972/
1085 - Found: http://www.teenidols4you.com./picture/2972/4/
1086 - Found: http://www.teenidols4you.com./gallery/3460/
1087 - Found: http://www.teenidols4you.com./picture/3460/
1088 - Found: http://www.teenidols4you.com./picture/3460/4/
1089 - Found: http://www.teenidols4you.com./gallery/3604/
1090 - Found: http://www.teenidols4you.com./picture/3604/
1091 - Found: http://www.teenidols4you.com./picture/3604/4/
1092 - Found: http://www.teenidols4you.com./gallery/3270/
1093 - Found: http://www.teenidols4you.com./picture/3270/
1094 - Found: http://www.teenidols4you.com./picture/3270/4/
1095 - Found: http://www.teenidols4you.com./gallery/2924/
1096 - Found: http://www.teenidols4you.com./picture/2924/
1097 - Found: http://www.teenidols4you.com./picture/2924/4/
1098 - Found: http://www.teenidols4you.com./gallery/3611/
1099 - Found: http://www.teenidols4you.com./picture/3611/
1100 - Found: http://www.teenidols4you.com./picture/3611/4/
1101 - Found: http://www.teenidols4you.com./gallery/3437/
1102 - Found: http://www.teenidols4you.com./picture/3437/
1103 - Found: http://www.teenidols4you.com./picture/3437/4/
1104 - Found: http://www.teenidols4you.com./gallery/3719/
1105 - Found: http://www.teenidols4you.com./picture/3719/
1106 - Found: http://www.teenidols4you.com./picture/3719/4/
1107 - Found: http://www.teenidols4you.com./gallery/3620/
1108 - Found: http://www.teenidols4you.com./picture/3620/
1109 - Found: http://www.teenidols4you.com./picture/3620/4/
1110 - Found: http://www.teenidols4you.com./gallery/3731/
1111 - Found: http://www.teenidols4you.com./tags.expo9.exponential.com/
1112 - Found: http://www.teenidols4you.com./tags.expo9.exponential.com/tags/
1113 - Found: http://www.teenidols4you.com./tags.expo9.exponential.com/tags/TeenIdols4You/
1114 - Found: http://www.teenidols4you.com./tags.expo9.exponential.com/tags/TeenIdols4You/ROS/
1115 - Found: http://www.teenidols4you.com./thumb/
1116 - Found: http://www.teenidols4you.com./thumb/Actors/
1117 - Found: http://www.teenidols4you.com./thumb/Actors/CameronBoyce/
1118 - Found: http://www.teenidols4you.com./thumb/Actors/jacob-sartorius/
1119 - Found: http://www.teenidols4you.com./thumb/Actors/jacob-tremblay/
1120 - Found: http://www.teenidols4you.com./thumb/Actors/thomas-barbusca/
1121 - Found: http://www.teenidols4you.com./thumb/Actors/selena_gomez/
1122 - Found: http://www.teenidols4you.com./thumb/Actors/emma_watson/
1123 - Found: http://www.teenidols4you.com./thumb/Actors/justinbieber/
1124 - Found: http://www.teenidols4you.com./thumb/Actors/one-direction/
1125 - Found: http://www.teenidols4you.com./thumb/Actors/katyperry/
1126 - Found: http://www.teenidols4you.com./thumb/Actors/nickjonas/
1127 - Found: http://www.teenidols4you.com./thumb/Actors/nolangould/
1128 - Found: http://www.teenidols4you.com./thumb/Actors/troyesivan/
1129 - Found: http://www.teenidols4you.com./thumb/Actors/zendayacoleman/
1130 - Found: http://www.teenidols4you.com./thumb/Actors/ansel-elgort/
1131 - Found: http://www.teenidols4you.com./gifs/
1132 - Found: http://www.teenidols4you.com./html5shim.googlecode.com/
1133 - Found: http://www.teenidols4you.com./html5shim.googlecode.com/svn/
1134 - Found: http://www.teenidols4you.com./html5shim.googlecode.com/svn/trunk/
1135 - Found: http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/
1136 - Found: http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/svn/
1137 - Found: http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/svn/trunk/
1138 - Found: http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/
1139 - Found: http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/
1140 - Found: http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/4.5.0/
1141 - Found: http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/
1142 - Found: http://www.teenidols4you.com./ajax.googleapis.com/
1143 - Found: http://www.teenidols4you.com./ajax.googleapis.com/ajax/
1144 - Found: http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/
1145 - Found: http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/jquery/
1146 - Found: http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/jquery/1.8.3/
1147 - Found: http://www.teenidols4you.com./thumb/Actors/jentzen-ramirez/
1148 - Found: http://www.teenidols4you.com./stars/
1149 - Found: http://www.teenidols4you.com./thumb/Actors/london-cheshire/
1150 - Found: http://www.teenidols4you.com./thumb/Actors/lucas-royalty/
1151 - Found: http://www.teenidols4you.com./thumb/Actors/tyler-crumley/
1152 - Found: http://www.teenidols4you.com./thumb/Actors/walker-bryant/
1153 - Found: http://www.teenidols4you.com./thumb/Actors/ryker-baloun/
1154 - Found: http://www.teenidols4you.com./thumb/Actors/caleb-coffee/
1155 - Found: http://www.teenidols4you.com./connect.facebook.net/
1156 - Found: http://www.teenidols4you.com./connect.facebook.net/en_US/
1157 - Found: http://www.teenidols4you.com./platform.twitter.com/
1158 - Found: http://www.teenidols4you.com./blink/
1159 - Found: http://www.teenidols4you.com./blink/Actors/
1160 - Found: http://www.teenidols4you.com./blink/Actors/jentzen-ramirez/
1161 - Found: http://www.teenidols4you.com./videos/templates/
1162 - Found: http://www.teenidols4you.com./videos/templates/default/
1163 - Found: http://www.teenidols4you.com./videos/templates/default/images/
1164 - Found: http://www.teenidols4you.com./s7.addthis.com/
1165 - Found: http://www.teenidols4you.com./s7.addthis.com/js/
1166 - Found: http://www.teenidols4you.com./s7.addthis.com/js/300/
1167 - Found: http://www.teenidols4you.com./blink/Actors/london-cheshire/
1168 - Found: http://www.teenidols4you.com./blink/Actors/lucas-royalty/
1169 - Found: http://www.teenidols4you.com./blink/Actors/tyler-crumley/
1170 - Found: http://www.teenidols4you.com./blink/Actors/walker-bryant/
1171 - Found: http://www.teenidols4you.com./blink/Actors/ryker-baloun/
1172 - Found: http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/
1173 - Found: http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/
1174 - Found: http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/
1175 - Found: http://www.teenidols4you.com./thumb/Actors/asher-angel/
1176 - Found: http://www.teenidols4you.com./thumb/Actors/august-maturo/
1177 - Found: http://www.teenidols4you.com./thumb/Actors/ayden-mekus/
1178 - Found: http://www.teenidols4you.com./thumb/Actors/blaze-freeman/
1179 - Found: http://www.teenidols4you.com./thumb/Actors/brayden-benson/
1180 - Found: http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/
1181 + Searching open folders...
1182 - http://www.teenidols4you.com./shows/ (404 Not Found)
1183 - http://www.teenidols4you.com./top50/ (No Open Folder)
1184 - http://www.teenidols4you.com./videos/ (No Open Folder)
1185 - http://www.teenidols4you.com./news/ (404 Not Found)
1186 - http://www.teenidols4you.com./gallery/ (No Open Folder)
1187 - http://www.teenidols4you.com./gallery/2972/ (404 Not Found)
1188 - http://www.teenidols4you.com./picture/ (404 Not Found)
1189 - http://www.teenidols4you.com./picture/2972/ (404 Not Found)
1190 - http://www.teenidols4you.com./picture/2972/4/ (404 Not Found)
1191 - http://www.teenidols4you.com./gallery/3460/ (404 Not Found)
1192 - http://www.teenidols4you.com./picture/3460/ (404 Not Found)
1193 - http://www.teenidols4you.com./picture/3460/4/ (404 Not Found)
1194 - http://www.teenidols4you.com./gallery/3604/ (404 Not Found)
1195 - http://www.teenidols4you.com./picture/3604/ (404 Not Found)
1196 - http://www.teenidols4you.com./picture/3604/4/ (404 Not Found)
1197 - http://www.teenidols4you.com./gallery/3270/ (404 Not Found)
1198 - http://www.teenidols4you.com./picture/3270/ (404 Not Found)
1199 - http://www.teenidols4you.com./picture/3270/4/ (404 Not Found)
1200 - http://www.teenidols4you.com./gallery/2924/ (404 Not Found)
1201 - http://www.teenidols4you.com./picture/2924/ (404 Not Found)
1202 - http://www.teenidols4you.com./picture/2924/4/ (404 Not Found)
1203 - http://www.teenidols4you.com./gallery/3611/ (404 Not Found)
1204 - http://www.teenidols4you.com./picture/3611/ (404 Not Found)
1205 - http://www.teenidols4you.com./picture/3611/4/ (404 Not Found)
1206 - http://www.teenidols4you.com./gallery/3437/ (404 Not Found)
1207 - http://www.teenidols4you.com./picture/3437/ (404 Not Found)
1208 - http://www.teenidols4you.com./picture/3437/4/ (404 Not Found)
1209 - http://www.teenidols4you.com./gallery/3719/ (404 Not Found)
1210 - http://www.teenidols4you.com./picture/3719/ (404 Not Found)
1211 - http://www.teenidols4you.com./picture/3719/4/ (404 Not Found)
1212 - http://www.teenidols4you.com./gallery/3620/ (404 Not Found)
1213 - http://www.teenidols4you.com./picture/3620/ (404 Not Found)
1214 - http://www.teenidols4you.com./picture/3620/4/ (404 Not Found)
1215 - http://www.teenidols4you.com./gallery/3731/ (404 Not Found)
1216 - http://www.teenidols4you.com./tags.expo9.exponential.com/ (404 Not Found)
1217 - http://www.teenidols4you.com./tags.expo9.exponential.com/tags/ (404 Not Found)
1218 - http://www.teenidols4you.com./tags.expo9.exponential.com/tags/TeenIdols4You/ (404 Not Found)
1219 - http://www.teenidols4you.com./tags.expo9.exponential.com/tags/TeenIdols4You/ROS/ (404 Not Found)
1220 - http://www.teenidols4you.com./thumb/ (403 Forbidden)
1221 - http://www.teenidols4you.com./thumb/Actors/ (403 Forbidden)
1222 - http://www.teenidols4you.com./thumb/Actors/CameronBoyce/ (403 Forbidden)
1223 - http://www.teenidols4you.com./thumb/Actors/jacob-sartorius/ (403 Forbidden)
1224 - http://www.teenidols4you.com./thumb/Actors/jacob-tremblay/ (403 Forbidden)
1225 - http://www.teenidols4you.com./thumb/Actors/thomas-barbusca/ (403 Forbidden)
1226 - http://www.teenidols4you.com./thumb/Actors/selena_gomez/ (403 Forbidden)
1227 - http://www.teenidols4you.com./thumb/Actors/emma_watson/ (403 Forbidden)
1228 - http://www.teenidols4you.com./thumb/Actors/justinbieber/ (403 Forbidden)
1229 - http://www.teenidols4you.com./thumb/Actors/one-direction/ (403 Forbidden)
1230 - http://www.teenidols4you.com./thumb/Actors/katyperry/ (403 Forbidden)
1231 - http://www.teenidols4you.com./thumb/Actors/nickjonas/ (403 Forbidden)
1232 - http://www.teenidols4you.com./thumb/Actors/nolangould/ (403 Forbidden)
1233 - http://www.teenidols4you.com./thumb/Actors/troyesivan/ (403 Forbidden)
1234 - http://www.teenidols4you.com./thumb/Actors/zendayacoleman/ (403 Forbidden)
1235 - http://www.teenidols4you.com./thumb/Actors/ansel-elgort/ (403 Forbidden)
1236 - http://www.teenidols4you.com./gifs/ (403 Forbidden)
1237 - http://www.teenidols4you.com./html5shim.googlecode.com/ (404 Not Found)
1238 - http://www.teenidols4you.com./html5shim.googlecode.com/svn/ (404 Not Found)
1239 - http://www.teenidols4you.com./html5shim.googlecode.com/svn/trunk/ (404 Not Found)
1240 - http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/ (404 Not Found)
1241 - http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/svn/ (404 Not Found)
1242 - http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/svn/trunk/ (404 Not Found)
1243 - http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/ (404 Not Found)
1244 - http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/ (404 Not Found)
1245 - http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/4.5.0/ (404 Not Found)
1246 - http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/ (404 Not Found)
1247 - http://www.teenidols4you.com./ajax.googleapis.com/ (404 Not Found)
1248 - http://www.teenidols4you.com./ajax.googleapis.com/ajax/ (404 Not Found)
1249 - http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/ (404 Not Found)
1250 - http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/jquery/ (404 Not Found)
1251 - http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/jquery/1.8.3/ (404 Not Found)
1252 - http://www.teenidols4you.com./thumb/Actors/jentzen-ramirez/ (403 Forbidden)
1253 - http://www.teenidols4you.com./stars/ (403 Forbidden)
1254 - http://www.teenidols4you.com./thumb/Actors/london-cheshire/ (403 Forbidden)
1255 - http://www.teenidols4you.com./thumb/Actors/lucas-royalty/ (403 Forbidden)
1256 - http://www.teenidols4you.com./thumb/Actors/tyler-crumley/ (403 Forbidden)
1257 - http://www.teenidols4you.com./thumb/Actors/walker-bryant/ (403 Forbidden)
1258 - http://www.teenidols4you.com./thumb/Actors/ryker-baloun/ (403 Forbidden)
1259 - http://www.teenidols4you.com./thumb/Actors/caleb-coffee/ (403 Forbidden)
1260 - http://www.teenidols4you.com./connect.facebook.net/ (404 Not Found)
1261 - http://www.teenidols4you.com./connect.facebook.net/en_US/ (404 Not Found)
1262 - http://www.teenidols4you.com./platform.twitter.com/ (404 Not Found)
1263 - http://www.teenidols4you.com./blink/ (404 Not Found)
1264 - http://www.teenidols4you.com./blink/Actors/ (404 Not Found)
1265 - http://www.teenidols4you.com./blink/Actors/jentzen-ramirez/ (No Open Folder)
1266 - http://www.teenidols4you.com./videos/templates/ (No Open Folder)
1267 - http://www.teenidols4you.com./videos/templates/default/ (No Open Folder)
1268 - http://www.teenidols4you.com./videos/templates/default/images/ (403 Forbidden)
1269 - http://www.teenidols4you.com./s7.addthis.com/ (404 Not Found)
1270 - http://www.teenidols4you.com./s7.addthis.com/js/ (404 Not Found)
1271 - http://www.teenidols4you.com./s7.addthis.com/js/300/ (404 Not Found)
1272 - http://www.teenidols4you.com./blink/Actors/london-cheshire/ (No Open Folder)
1273 - http://www.teenidols4you.com./blink/Actors/lucas-royalty/ (No Open Folder)
1274 - http://www.teenidols4you.com./blink/Actors/tyler-crumley/ (No Open Folder)
1275 - http://www.teenidols4you.com./blink/Actors/walker-bryant/ (No Open Folder)
1276 - http://www.teenidols4you.com./blink/Actors/ryker-baloun/ (No Open Folder)
1277 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/ (403 Forbidden)
1278 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/ (403 Forbidden)
1279 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/ (403 Forbidden)
1280 - http://www.teenidols4you.com./thumb/Actors/asher-angel/ (403 Forbidden)
1281 - http://www.teenidols4you.com./thumb/Actors/august-maturo/ (403 Forbidden)
1282 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ (403 Forbidden)
1283 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/ (403 Forbidden)
1284 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/ (403 Forbidden)
1285 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/ (403 Forbidden)
1286 + Crawl finished successfully.
1287----------------------------------------------------------------------
1288Summary of http://http://www.teenidols4you.com.
1289----------------------------------------------------------------------
1290+ Links crawled:
1291 - http://www.teenidols4you.com.
1292 - http://www.teenidols4you.com./Actors.html
1293 - http://www.teenidols4you.com./Singers.html
1294 - http://www.teenidols4you.com./actor.html
1295 - http://www.teenidols4you.com./birthdays.php
1296 - http://www.teenidols4you.com./gallery/2924/august-maturo.html
1297 - http://www.teenidols4you.com./gallery/2972/aidan-gallagher.html
1298 - http://www.teenidols4you.com./gallery/3270/asher-angel.html
1299 - http://www.teenidols4you.com./gallery/3437/blaze-freeman.html
1300 - http://www.teenidols4you.com./gallery/3460/alex-ruygrok.html
1301 - http://www.teenidols4you.com./gallery/3604/anthony-rosenthal.html
1302 - http://www.teenidols4you.com./gallery/3611/ayden-mekus.html
1303 - http://www.teenidols4you.com./gallery/3620/caio-laranjeira.html
1304 - http://www.teenidols4you.com./gallery/3719/brayden-benson.html
1305 - http://www.teenidols4you.com./gallery/3731/caleb-coffee.html
1306 - http://www.teenidols4you.com./news.html
1307 - http://www.teenidols4you.com./news/enews1155.html
1308 - http://www.teenidols4you.com./news/enews1156.html
1309 - http://www.teenidols4you.com./news/enews1157.html
1310 - http://www.teenidols4you.com./news/enews1168.html
1311 - http://www.teenidols4you.com./picture.html?g=Actors&pe=jentzen-ramirez&foto=554&act=3751&mv=4&pic=910654
1312 - http://www.teenidols4you.com./picture.html?g=Actors&pe=london-cheshire&foto=554&act=3721&mv=4&pic=910653
1313 - http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910644
1314 - http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910645
1315 - http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910646
1316 - http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
1317 - http://www.teenidols4you.com./picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910652
1318 - http://www.teenidols4you.com./picture.html?g=Actors&pe=ryker-baloun&foto=554&act=3718&mv=4&pic=910643
1319 - http://www.teenidols4you.com./picture.html?g=Actors&pe=tyler-crumley&foto=554&act=3737&mv=4&pic=910650
1320 - http://www.teenidols4you.com./picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910647
1321 - http://www.teenidols4you.com./picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910648
1322 - http://www.teenidols4you.com./picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910649
1323 - http://www.teenidols4you.com./picture/2924/4/august-maturo.html
1324 - http://www.teenidols4you.com./picture/2972/4/aidan-gallagher.html
1325 - http://www.teenidols4you.com./picture/3270/4/asher-angel.html
1326 - http://www.teenidols4you.com./picture/3437/4/blaze-freeman.html
1327 - http://www.teenidols4you.com./picture/3460/4/alex-ruygrok.html
1328 - http://www.teenidols4you.com./picture/3604/4/anthony-rosenthal.html
1329 - http://www.teenidols4you.com./picture/3611/4/ayden-mekus.html
1330 - http://www.teenidols4you.com./picture/3620/4/caio-laranjeira.html
1331 - http://www.teenidols4you.com./picture/3719/4/brayden-benson.html
1332 - http://www.teenidols4you.com./search.html
1333 - http://www.teenidols4you.com./shows/a.html
1334 - http://www.teenidols4you.com./top50/today
1335 - http://www.teenidols4you.com./updates.html
1336 - http://www.teenidols4you.com./upload.php
1337 - http://www.teenidols4you.com./uploaded.html
1338 - http://www.teenidols4you.com./uploaded.php
1339 - http://www.teenidols4you.com./videos/
1340 - http://www.teenidols4you.com./videos/contact_us.html
1341 Total links crawled: 50
1342
1343+ Links to files found:
1344 - http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js
1345 - http://www.teenidols4you.com./blink/Actors/jentzen-ramirez/jentzen-ramirez-1575603596.jpg
1346 - http://www.teenidols4you.com./blink/Actors/london-cheshire/london-cheshire-1575603575.jpg
1347 - http://www.teenidols4you.com./blink/Actors/lucas-royalty/lucas-royalty-1575603433.jpg
1348 - http://www.teenidols4you.com./blink/Actors/lucas-royalty/lucas-royalty-1575603440.jpg
1349 - http://www.teenidols4you.com./blink/Actors/lucas-royalty/lucas-royalty-1575603459.jpg
1350 - http://www.teenidols4you.com./blink/Actors/lucas-royalty/lucas-royalty-1575603543.jpg
1351 - http://www.teenidols4you.com./blink/Actors/lucas-royalty/lucas-royalty-1575603551.jpg
1352 - http://www.teenidols4you.com./blink/Actors/ryker-baloun/ryker-baloun-1575603418.jpg
1353 - http://www.teenidols4you.com./blink/Actors/tyler-crumley/tyler-crumley-1575603535.jpg
1354 - http://www.teenidols4you.com./blink/Actors/walker-bryant/walker-bryant-1575603487.jpg
1355 - http://www.teenidols4you.com./blink/Actors/walker-bryant/walker-bryant-1575603502.jpg
1356 - http://www.teenidols4you.com./blink/Actors/walker-bryant/walker-bryant-1575603516.jpg
1357 - http://www.teenidols4you.com./connect.facebook.net/en_US/all.js
1358 - http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/svn/trunk/css3-mediaqueries.js
1359 - http://www.teenidols4you.com./gifs/blank.gif
1360 - http://www.teenidols4you.com./gifs/download2.gif
1361 - http://www.teenidols4you.com./gifs/folder.gif
1362 - http://www.teenidols4you.com./gifs/folderu.gif
1363 - http://www.teenidols4you.com./gifs/linkto2.gif
1364 - http://www.teenidols4you.com./html5shim.googlecode.com/svn/trunk/html5.js
1365 - http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/font-awesome.min.css
1366 - http://www.teenidols4you.com./platform.twitter.com/widgets.js
1367 - http://www.teenidols4you.com./s7.addthis.com/js/300/addthis_widget.js
1368 - http://www.teenidols4you.com./stars/00star.gif
1369 - http://www.teenidols4you.com./stars/1star.gif
1370 - http://www.teenidols4you.com./stars/2star.gif
1371 - http://www.teenidols4you.com./stars/35star.gif
1372 - http://www.teenidols4you.com./stars/3star.gif
1373 - http://www.teenidols4you.com./stars/45star.gif
1374 - http://www.teenidols4you.com./stars/4star.gif
1375 - http://www.teenidols4you.com./stars/5star.gif
1376 - http://www.teenidols4you.com./stars/empty.gif
1377 - http://www.teenidols4you.com./style.css
1378 - http://www.teenidols4you.com./tags.expo9.exponential.com/tags/TeenIdols4You/ROS/tags.js
1379 - http://www.teenidols4you.com./thumb/Actors/CameronBoyce/cameron-boyce-1548088921.jpg
1380 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1410903042.jpg
1381 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192261.jpg
1382 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192270.jpg
1383 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192279.jpg
1384 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192294.jpg
1385 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192303.jpg
1386 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192311.jpg
1387 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192320.jpg
1388 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192327.jpg
1389 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192336.jpg
1390 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192345.jpg
1391 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192353.jpg
1392 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192361.jpg
1393 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192370.jpg
1394 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192392.jpg
1395 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192400.jpg
1396 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192413.jpg
1397 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192422.jpg
1398 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192432.jpg
1399 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575192442.jpg
1400 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575241029.jpg
1401 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575462008.jpg
1402 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/aidan-gallagher-1575597012.jpg
1403 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1514796047.jpg
1404 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575054918.jpg
1405 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575055101.jpg
1406 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575145673.jpg
1407 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575335136.jpg
1408 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575437222.jpg
1409 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461680.jpg
1410 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461689.jpg
1411 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461697.jpg
1412 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461705.jpg
1413 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461713.jpg
1414 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461721.jpg
1415 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461729.jpg
1416 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461737.jpg
1417 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461745.jpg
1418 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575461774.jpg
1419 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575484434.jpg
1420 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575491135.jpg
1421 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575594874.jpg
1422 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575596538.jpg
1423 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575596550.jpg
1424 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575596560.jpg
1425 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/alex-ruygrok-1575599027.jpg
1426 - http://www.teenidols4you.com./thumb/Actors/ansel-elgort/ansel-elgort-1463045761.jpg
1427 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1537886382.jpg
1428 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1564478633.jpg
1429 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1564844956.jpg
1430 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1565786618.jpg
1431 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1566294703.jpg
1432 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1569440040.jpg
1433 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1569440049.jpg
1434 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1569543983.jpg
1435 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1569544288.jpg
1436 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1570659898.jpg
1437 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1570660058.jpg
1438 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1570661729.jpg
1439 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1570661738.jpg
1440 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1572642536.jpg
1441 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1572642542.jpg
1442 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1572642548.jpg
1443 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1572715502.jpg
1444 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1572715513.jpg
1445 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1572715521.jpg
1446 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1572715574.jpg
1447 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1572715590.jpg
1448 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1575054502.jpg
1449 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/anthony-rosenthal-1575598842.jpg
1450 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1512262861.jpg
1451 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575335102.jpg
1452 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575335107.jpg
1453 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575336129.jpg
1454 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575345049.jpg
1455 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575423652.jpg
1456 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575423837.jpg
1457 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575462044.jpg
1458 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575484545.jpg
1459 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575484652.jpg
1460 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575593971.jpg
1461 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575594218.jpg
1462 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575594898.jpg
1463 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575596499.jpg
1464 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575596772.jpg
1465 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575596797.jpg
1466 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575598866.jpg
1467 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575598874.jpg
1468 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575598880.jpg
1469 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575598889.jpg
1470 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575598897.jpg
1471 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575598914.jpg
1472 - http://www.teenidols4you.com./thumb/Actors/asher-angel/asher-angel-1575598945.jpg
1473 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1405174908.jpg
1474 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1574878909.jpg
1475 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1574971022.jpg
1476 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575145486.jpg
1477 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575145634.jpg
1478 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575145641.jpg
1479 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575145647.jpg
1480 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575145653.jpg
1481 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575145660.jpg
1482 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575145667.jpg
1483 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575164649.jpg
1484 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575164657.jpg
1485 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575164666.jpg
1486 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575227188.jpg
1487 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575474454.jpg
1488 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575474463.jpg
1489 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575474475.jpg
1490 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575484456.jpg
1491 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575484537.jpg
1492 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575484574.jpg
1493 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575484583.jpg
1494 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575596358.jpg
1495 - http://www.teenidols4you.com./thumb/Actors/august-maturo/august-maturo-1575596367.jpg
1496 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1538770681.jpg
1497 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574625039.jpg
1498 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574625045.jpg
1499 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574625060.jpg
1500 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574723479.jpg
1501 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574723488.jpg
1502 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574723498.jpg
1503 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574723508.jpg
1504 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574723522.jpg
1505 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574723530.jpg
1506 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574805223.jpg
1507 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574805230.jpg
1508 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574897423.jpg
1509 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574897432.jpg
1510 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574897443.jpg
1511 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574955275.jpg
1512 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1574961614.jpg
1513 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1575142910.jpg
1514 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1575142920.jpg
1515 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1575142973.jpg
1516 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1575250832.jpg
1517 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1575582095.jpg
1518 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ayden-mekus-1575593991.jpg
1519 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1511572352.jpg
1520 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1573411110.jpg
1521 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1573411117.jpg
1522 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1573411122.jpg
1523 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1573411128.jpg
1524 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1573423243.jpg
1525 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1573927696.jpg
1526 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1574274897.jpg
1527 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1574551096.jpg
1528 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1574551105.jpg
1529 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1574551115.jpg
1530 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1574551123.jpg
1531 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1574737870.jpg
1532 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575054770.jpg
1533 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575324100.jpg
1534 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575324793.jpg
1535 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575324863.jpg
1536 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575324870.jpg
1537 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575496789.jpg
1538 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575593982.jpg
1539 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575594016.jpg
1540 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575594109.jpg
1541 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/blaze-freeman-1575597030.jpg
1542 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1565197659.jpg
1543 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1570054121.jpg
1544 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1570659936.jpg
1545 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1570660042.jpg
1546 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1570850710.jpg
1547 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1572467396.jpg
1548 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1572575754.jpg
1549 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1572628571.jpg
1550 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1572997580.jpg
1551 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1573077474.jpg
1552 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1573246877.jpg
1553 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1573409852.jpg
1554 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1573409879.jpg
1555 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1574269256.jpg
1556 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1574302644.jpg
1557 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1574461444.jpg
1558 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1574461498.jpg
1559 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1574461526.jpg
1560 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1575461785.jpg
1561 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1575474257.jpg
1562 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1575494886.jpg
1563 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1575596742.jpg
1564 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/brayden-benson-1575596761.jpg
1565 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1539632685.jpg
1566 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1572045281.jpg
1567 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1572212404.jpg
1568 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1572290584.jpg
1569 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1572467430.jpg
1570 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1572540004.jpg
1571 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1572575550.jpg
1572 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1572652117.jpg
1573 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1572739058.jpg
1574 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1573768076.jpg
1575 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1574302614.jpg
1576 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1574383954.jpg
1577 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1574531236.jpg
1578 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1574622165.jpg
1579 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1574721417.jpg
1580 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1574802816.jpg
1581 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1574875874.jpg
1582 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1574961683.jpg
1583 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1575054688.jpg
1584 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1575223803.jpg
1585 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1575423729.jpg
1586 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1575484563.jpg
1587 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/caio-laranjeira-1575596415.jpg
1588 - http://www.teenidols4you.com./thumb/Actors/caleb-coffee/caleb-coffee-1568241284.jpg
1589 - http://www.teenidols4you.com./thumb/Actors/caleb-coffee/caleb-coffee-1575599279.jpg
1590 - http://www.teenidols4you.com./thumb/Actors/caleb-coffee/caleb-coffee-1575599286.jpg
1591 - http://www.teenidols4you.com./thumb/Actors/caleb-coffee/caleb-coffee-1575599293.jpg
1592 - http://www.teenidols4you.com./thumb/Actors/caleb-coffee/caleb-coffee-1575599300.jpg
1593 - http://www.teenidols4you.com./thumb/Actors/emma_watson/emma-watson-1471208404.jpg
1594 - http://www.teenidols4you.com./thumb/Actors/jacob-sartorius/jacob-sartorius-1488072601.jpg
1595 - http://www.teenidols4you.com./thumb/Actors/jacob-tremblay/jacob-tremblay-1452816568.jpg
1596 - http://www.teenidols4you.com./thumb/Actors/jentzen-ramirez/jentzen-ramirez-1575603596.jpg
1597 - http://www.teenidols4you.com./thumb/Actors/justinbieber/justin-bieber-1482257161.jpg
1598 - http://www.teenidols4you.com./thumb/Actors/katyperry/katy-perry-1481318777.jpg
1599 - http://www.teenidols4you.com./thumb/Actors/london-cheshire/london-cheshire-1575603575.jpg
1600 - http://www.teenidols4you.com./thumb/Actors/lucas-royalty/lucas-royalty-1575603433.jpg
1601 - http://www.teenidols4you.com./thumb/Actors/lucas-royalty/lucas-royalty-1575603440.jpg
1602 - http://www.teenidols4you.com./thumb/Actors/lucas-royalty/lucas-royalty-1575603459.jpg
1603 - http://www.teenidols4you.com./thumb/Actors/lucas-royalty/lucas-royalty-1575603543.jpg
1604 - http://www.teenidols4you.com./thumb/Actors/lucas-royalty/lucas-royalty-1575603551.jpg
1605 - http://www.teenidols4you.com./thumb/Actors/nickjonas/nick-jonas-1466732859.jpg
1606 - http://www.teenidols4you.com./thumb/Actors/nolangould/TI4U1477769948.jpg
1607 - http://www.teenidols4you.com./thumb/Actors/one-direction/one-direction-1481144618.jpg
1608 - http://www.teenidols4you.com./thumb/Actors/ryker-baloun/ryker-baloun-1575603418.jpg
1609 - http://www.teenidols4you.com./thumb/Actors/selena_gomez/selena-gomez-1478800441.jpg
1610 - http://www.teenidols4you.com./thumb/Actors/selena_gomez/selena-gomez-1483863343.jpg
1611 - http://www.teenidols4you.com./thumb/Actors/thomas-barbusca/thomas-barbusca-1483232401.jpg
1612 - http://www.teenidols4you.com./thumb/Actors/troyesivan/troye-sivan-1478615761.jpg
1613 - http://www.teenidols4you.com./thumb/Actors/tyler-crumley/tyler-crumley-1575603535.jpg
1614 - http://www.teenidols4you.com./thumb/Actors/walker-bryant/walker-bryant-1575603487.jpg
1615 - http://www.teenidols4you.com./thumb/Actors/walker-bryant/walker-bryant-1575603502.jpg
1616 - http://www.teenidols4you.com./thumb/Actors/walker-bryant/walker-bryant-1575603516.jpg
1617 - http://www.teenidols4you.com./thumb/Actors/zendayacoleman/zendaya-coleman-1471648821.jpg
1618 - http://www.teenidols4you.com./videos/templates/default/images/ico_favorites.gif
1619 Total links to files: 275
1620
1621+ Externals links found:
1622 - http://
1623 - http://cdn.teenidols4you.com//images/news/amber-heard-31816.jpg
1624 - http://cdn.teenidols4you.com//images/news/dylan-obrien-31816.jpg
1625 - http://cdn.teenidols4you.com/css/A.fancybox.css,,qv==2.1.4+gallery1-28.css+style1-3-min.css,Mcc.S7A3CP-SLJ.css.pagespeed.cf.Wrbrzyp13y.css
1626 - http://cdn.teenidols4you.com/css/A.ffstyle3-2-min.css.pagespeed.cf.jfdSiDKV05.css
1627 - http://cdn.teenidols4you.com/css/A.gallery1-28.css+style1-3-min.css,Mcc.DJQatmMa2t.css.pagespeed.cf.4fTUo_9pZt.css
1628 - http://cdn.teenidols4you.com/css/A.news1-2.css+gallery1-28.css+style1-3-min.css,Mcc.loHMMTULxx.css.pagespeed.cf.jeU55DK7JM.css
1629 - http://cdn.teenidols4you.com/css/A.videostyle2-3.css.pagespeed.cf.6RusVKZXdI.css
1630 - http://cdn.teenidols4you.com/css/gallery1-28.css
1631 - http://cdn.teenidols4you.com/css/style1-3-min.css
1632 - http://cdn.teenidols4you.com/favicon.ico
1633 - http://cdn.teenidols4you.com/gifs/arrowdown.png
1634 - http://cdn.teenidols4you.com/gifs/arrowup.png
1635 - http://cdn.teenidols4you.com/gifs/blank.gif
1636 - http://cdn.teenidols4you.com/gifs/folderu.gif
1637 - http://cdn.teenidols4you.com/gifs/logo3.png
1638 - http://cdn.teenidols4you.com/gifs/underground.png
1639 - http://cdn.teenidols4you.com/images/logo9.png
1640 - http://cdn.teenidols4you.com/images/news/cameron-boyce-rip.jpg
1641 - http://cdn.teenidols4you.com/images/news/jacob-sartorius-022717.jpg
1642 - http://cdn.teenidols4you.com/images/news/jacob-tremblay-012517.jpg
1643 - http://cdn.teenidols4you.com/images/news/thomas-barbusca-011817.jpg
1644 - http://cdn.teenidols4you.com/js/fancybox.js,qv=2.1.4.pagespeed.jm.wEgxSSorKA.js
1645 - http://cdn.teenidols4you.com/js/favs.js+fancybox.js,qv==2.1.4.pagespeed.jc.-ilcWU89Zm.js
1646 - http://cdn.teenidols4you.com/js/jquery-latest.min.js
1647 - http://cdn.teenidols4you.com/js/jquery-latest.min.js.pagespeed.jm.ZzSiN_5Whq.js
1648 - http://cdn.teenidols4you.com/rate.js.pagespeed.jm.JujpfOmSFQ.js
1649 - http://cdn.teenidols4you.com/sgpics-small/CameronBoyce.jpg
1650 - http://cdn.teenidols4you.com/sgpics-small/Chandler-Riggs.jpg
1651 - http://cdn.teenidols4you.com/sgpics-small/Thomas_Sangster.jpg
1652 - http://cdn.teenidols4you.com/sgpics-small/aaron-carpenter.jpg
1653 - http://cdn.teenidols4you.com/sgpics-small/aaron_carter.jpg
1654 - http://cdn.teenidols4you.com/sgpics-small/aidan-gallagher.jpg
1655 - http://cdn.teenidols4you.com/sgpics-small/aidan-langford.jpg
1656 - http://cdn.teenidols4you.com/sgpics-small/aidanalexander.jpg
1657 - http://cdn.teenidols4you.com/sgpics-small/alec-golinger.jpg
1658 - http://cdn.teenidols4you.com/sgpics-small/alex-angelo.jpg
1659 - http://cdn.teenidols4you.com/sgpics-small/alex-ruygrok.jpg
1660 - http://cdn.teenidols4you.com/sgpics-small/anahi.jpg
1661 - http://cdn.teenidols4you.com/sgpics-small/anthony-rosenthal.jpg
1662 - http://cdn.teenidols4you.com/sgpics-small/anthony-ursin.jpg
1663 - http://cdn.teenidols4you.com/sgpics-small/asabutterfield.jpg
1664 - http://cdn.teenidols4you.com/sgpics-small/asher-angel.jpg
1665 - http://cdn.teenidols4you.com/sgpics-small/august-maturo.jpg
1666 - http://cdn.teenidols4you.com/sgpics-small/austin-mahone.jpg
1667 - http://cdn.teenidols4you.com/sgpics-small/avi-angel.jpg
1668 - http://cdn.teenidols4you.com/sgpics-small/ayden-mekus.jpg
1669 - http://cdn.teenidols4you.com/sgpics-small/ben-azelart.jpg
1670 - http://cdn.teenidols4you.com/sgpics-small/benjamin-wadsworth.jpg
1671 - http://cdn.teenidols4you.com/sgpics-small/blake-hendricks.jpg
1672 - http://cdn.teenidols4you.com/sgpics-small/blaze-freeman.jpg
1673 - http://cdn.teenidols4you.com/sgpics-small/boo_boo_stewart.jpg
1674 - http://cdn.teenidols4you.com/sgpics-small/brayden-benson.jpg
1675 - http://cdn.teenidols4you.com/sgpics-small/brent-rivera.jpg
1676 - http://cdn.teenidols4you.com/sgpics-small/brock-brenner.jpg
1677 - http://cdn.teenidols4you.com/sgpics-small/bryson-pitts.jpg
1678 - http://cdn.teenidols4you.com/sgpics-small/caden-conrique.jpg
1679 - http://cdn.teenidols4you.com/sgpics-small/caio-laranjeira.jpg
1680 - http://cdn.teenidols4you.com/sgpics-small/caleb-coffee.jpg
1681 - http://cdn.teenidols4you.com/sgpics-small/cameron-cuffe.jpg
1682 - http://cdn.teenidols4you.com/sgpics-small/cameron-dallas.jpg
1683 - http://cdn.teenidols4you.com/sgpics-small/carson-lueders.jpg
1684 - http://cdn.teenidols4you.com/sgpics-small/carson-white.jpg
1685 - http://cdn.teenidols4you.com/sgpics-small/charlie-lenehan.jpg
1686 - http://cdn.teenidols4you.com/sgpics-small/charlie-shotwell.jpg
1687 - http://cdn.teenidols4you.com/sgpics-small/christian-convery.jpg
1688 - http://cdn.teenidols4you.com/sgpics-small/cole_dillan.jpg
1689 - http://cdn.teenidols4you.com/sgpics-small/connor-finnerty.jpg
1690 - http://cdn.teenidols4you.com/sgpics-small/corbyn-besson.jpg
1691 - http://cdn.teenidols4you.com/sgpics-small/dakota-lotus.jpg
1692 - http://cdn.teenidols4you.com/sgpics-small/daniel-seavey.jpg
1693 - http://cdn.teenidols4you.com/sgpics-small/david-mazou.jpg
1694 - http://cdn.teenidols4you.com/sgpics-small/demi_lovato.jpg
1695 - http://cdn.teenidols4you.com/sgpics-small/diego-velazquez.jpg
1696 - http://cdn.teenidols4you.com/sgpics-small/dylan-hartman.jpg
1697 - http://cdn.teenidols4you.com/sgpics-small/dylan-lawson.jpg
1698 - http://cdn.teenidols4you.com/sgpics-small/dylan-summerall.jpg
1699 - http://cdn.teenidols4you.com/sgpics-small/dylan_patton.jpg
1700 - http://cdn.teenidols4you.com/sgpics-small/elias-harger.jpg
1701 - http://cdn.teenidols4you.com/sgpics-small/ethan-wacker.jpg
1702 - http://cdn.teenidols4you.com/sgpics-small/finn-wolfhard-.jpg
1703 - http://cdn.teenidols4you.com/sgpics-small/garrett-clayton.jpg
1704 - http://cdn.teenidols4you.com/sgpics-small/gavin-casalegno.jpg
1705 - http://cdn.teenidols4you.com/sgpics-small/gavin-macintosh.jpg
1706 - http://cdn.teenidols4you.com/sgpics-small/gavin-magnus.jpg
1707 - http://cdn.teenidols4you.com/sgpics-small/gavin-warren.jpg
1708 - http://cdn.teenidols4you.com/sgpics-small/greysonmichaelchance.jpg
1709 - http://cdn.teenidols4you.com/sgpics-small/hayden-summerall.jpg
1710 - http://cdn.teenidols4you.com/sgpics-small/hayes-grier.jpg
1711 - http://cdn.teenidols4you.com/sgpics-small/hudson-west.jpg
1712 - http://cdn.teenidols4you.com/sgpics-small/hunter-payton.jpg
1713 - http://cdn.teenidols4you.com/sgpics-small/hunter-rowland.jpg
1714 - http://cdn.teenidols4you.com/sgpics-small/iain-armitage.jpg
1715 - http://cdn.teenidols4you.com/sgpics-small/isaak-presley.jpg
1716 - http://cdn.teenidols4you.com/sgpics-small/izan-llunas.jpg
1717 - http://cdn.teenidols4you.com/sgpics-small/jace-norman.jpg
1718 - http://cdn.teenidols4you.com/sgpics-small/jack-avery.jpg
1719 - http://cdn.teenidols4you.com/sgpics-small/jack-dylan-grazer.jpg
1720 - http://cdn.teenidols4you.com/sgpics-small/jack-griffo.jpg
1721 - http://cdn.teenidols4you.com/sgpics-small/jack-mcgraw.jpg
1722 - http://cdn.teenidols4you.com/sgpics-small/jacob-sartorius.jpg
1723 - http://cdn.teenidols4you.com/sgpics-small/jacob-tremblay.jpg
1724 - http://cdn.teenidols4you.com/sgpics-small/jaeden-lieberher.jpg
1725 - http://cdn.teenidols4you.com/sgpics-small/jake-getman.jpg
1726 - http://cdn.teenidols4you.com/sgpics-small/jake-satow.jpg
1727 - http://cdn.teenidols4you.com/sgpics-small/jake_austin.jpg
1728 - http://cdn.teenidols4you.com/sgpics-small/jason-drucker.jpg
1729 - http://cdn.teenidols4you.com/sgpics-small/jason-maybaum.jpg
1730 - http://cdn.teenidols4you.com/sgpics-small/jenna-ortega.jpg
1731 - http://cdn.teenidols4you.com/sgpics-small/jensen-gering.jpg
1732 - http://cdn.teenidols4you.com/sgpics-small/jentzen-ramirez.jpg
1733 - http://cdn.teenidols4you.com/sgpics-small/jet-jurgensmeyer.jpg
1734 - http://cdn.teenidols4you.com/sgpics-small/johnny-orlando.jpg
1735 - http://cdn.teenidols4you.com/sgpics-small/joshua-bassett.jpg
1736 - http://cdn.teenidols4you.com/sgpics-small/joshua-rush.jpg
1737 - http://cdn.teenidols4you.com/sgpics-small/jt-church.jpg
1738 - http://cdn.teenidols4you.com/sgpics-small/julian-e-serrano.jpg
1739 - http://cdn.teenidols4you.com/sgpics-small/julian-grey.jpg
1740 - http://cdn.teenidols4you.com/sgpics-small/justinbieber.jpg
1741 - http://cdn.teenidols4you.com/sgpics-small/kannon-hicks.jpg
1742 - http://cdn.teenidols4you.com/sgpics-small/kevin-chacon.jpg
1743 - http://cdn.teenidols4you.com/sgpics-small/kevin-g-quinn.jpg
1744 - http://cdn.teenidols4you.com/sgpics-small/kodismitmcphee.jpg
1745 - http://cdn.teenidols4you.com/sgpics-small/kyle-breitkopf.jpg
1746 - http://cdn.teenidols4you.com/sgpics-small/leondre-devries.jpg
1747 - http://cdn.teenidols4you.com/sgpics-small/levi-miller.jpg
1748 - http://cdn.teenidols4you.com/sgpics-small/liam-mcgill.jpg
1749 - http://cdn.teenidols4you.com/sgpics-small/lincoln-melcher.jpg
1750 - http://cdn.teenidols4you.com/sgpics-small/lionel-ferro.jpg
1751 - http://cdn.teenidols4you.com/sgpics-small/logan_lerman.jpg
1752 - http://cdn.teenidols4you.com/sgpics-small/london-cheshire.jpg
1753 - http://cdn.teenidols4you.com/sgpics-small/lucas-royalty.jpg
1754 - http://cdn.teenidols4you.com/sgpics-small/luke-mullen.jpg
1755 - http://cdn.teenidols4you.com/sgpics-small/luke-roessler.jpg
1756 - http://cdn.teenidols4you.com/sgpics-small/malachi-barton.jpg
1757 - http://cdn.teenidols4you.com/sgpics-small/marcel-ruiz.jpg
1758 - http://cdn.teenidols4you.com/sgpics-small/marik-knight.jpg
1759 - http://cdn.teenidols4you.com/sgpics-small/mason-dye.jpg
1760 - http://cdn.teenidols4you.com/sgpics-small/matthew-espinosa.jpg
1761 - http://cdn.teenidols4you.com/sgpics-small/max-jenkins.jpg
1762 - http://cdn.teenidols4you.com/sgpics-small/melvin-mellbolm.jpg
1763 - http://cdn.teenidols4you.com/sgpics-small/merrick-hanna.jpg
1764 - http://cdn.teenidols4you.com/sgpics-small/michael-campion.jpg
1765 - http://cdn.teenidols4you.com/sgpics-small/miley_cyrus.jpg
1766 - http://cdn.teenidols4you.com/sgpics-small/milo-manheim.jpg
1767 - http://cdn.teenidols4you.com/sgpics-small/nadav-jackson.jpg
1768 - http://cdn.teenidols4you.com/sgpics-small/niall-horan.jpg
1769 - http://cdn.teenidols4you.com/sgpics-small/nickolas-wolf.jpg
1770 - http://cdn.teenidols4you.com/sgpics-small/nicolas-bechtel.jpg
1771 - http://cdn.teenidols4you.com/sgpics-small/nicpuehse.jpg
1772 - http://cdn.teenidols4you.com/sgpics-small/noah-jupe.jpg
1773 - http://cdn.teenidols4you.com/sgpics-small/noah-schnapp.jpg
1774 - http://cdn.teenidols4you.com/sgpics-small/noah-urrea.jpg
1775 - http://cdn.teenidols4you.com/sgpics-small/noahf.jpg
1776 - http://cdn.teenidols4you.com/sgpics-small/owen-vaccaro.jpg
1777 - http://cdn.teenidols4you.com/sgpics-small/parker-bates.jpg
1778 - http://cdn.teenidols4you.com/sgpics-small/parker-james-fullmore.jpg
1779 - http://cdn.teenidols4you.com/sgpics-small/peyton-meyer.jpg
1780 - http://cdn.teenidols4you.com/sgpics-small/pierce-pope.jpg
1781 - http://cdn.teenidols4you.com/sgpics-small/prestyn-bates.jpg
1782 - http://cdn.teenidols4you.com/sgpics-small/ricky-garcia.jpg
1783 - http://cdn.teenidols4you.com/sgpics-small/robert-levey.jpg
1784 - http://cdn.teenidols4you.com/sgpics-small/romeo-beckham.jpg
1785 - http://cdn.teenidols4you.com/sgpics-small/rush-holland.jpg
1786 - http://cdn.teenidols4you.com/sgpics-small/ryanpotter.jpg
1787 - http://cdn.teenidols4you.com/sgpics-small/ryanwynott.jpg
1788 - http://cdn.teenidols4you.com/sgpics-small/ryker-baloun.jpg
1789 - http://cdn.teenidols4you.com/sgpics-small/sam-golbach.jpg
1790 - http://cdn.teenidols4you.com/sgpics-small/sawyer-sharbino.jpg
1791 - http://cdn.teenidols4you.com/sgpics-small/sean-cavaliere.jpg
1792 - http://cdn.teenidols4you.com/sgpics-small/sean-odonnell.jpg
1793 - http://cdn.teenidols4you.com/sgpics-small/sebastian-croft.jpg
1794 - http://cdn.teenidols4you.com/sgpics-small/shawn-mendes.jpg
1795 - http://cdn.teenidols4you.com/sgpics-small/stefaniescott.jpg
1796 - http://cdn.teenidols4you.com/sgpics-small/tanner-buchanan.jpg
1797 - http://cdn.teenidols4you.com/sgpics-small/tequanrichmond.jpg
1798 - http://cdn.teenidols4you.com/sgpics-small/thomas-barbusca.jpg
1799 - http://cdn.teenidols4you.com/sgpics-small/thomas-kuc.jpg
1800 - http://cdn.teenidols4you.com/sgpics-small/tim-luca-schmidt.jpg
1801 - http://cdn.teenidols4you.com/sgpics-small/timothee-chalamet.jpg
1802 - http://cdn.teenidols4you.com/sgpics-small/tivodar-danil.jpg
1803 - http://cdn.teenidols4you.com/sgpics-small/tom-holland.jpg
1804 - http://cdn.teenidols4you.com/sgpics-small/tristanpuehse.jpg
1805 - http://cdn.teenidols4you.com/sgpics-small/troyesivan.jpg
1806 - http://cdn.teenidols4you.com/sgpics-small/ty-simpkins.jpg
1807 - http://cdn.teenidols4you.com/sgpics-small/tyler-crumley.jpg
1808 - http://cdn.teenidols4you.com/sgpics-small/tyler-dryden.jpg
1809 - http://cdn.teenidols4you.com/sgpics-small/walker-bryant.jpg
1810 - http://cdn.teenidols4you.com/sgpics-small/why-dont-we.jpg
1811 - http://cdn.teenidols4you.com/sgpics-small/william-franklyn-miller.jpg
1812 - http://cdn.teenidols4you.com/sgpics-small/zac-mann.jpg
1813 - http://cdn.teenidols4you.com/sgpics-small/zach-herron.jpg
1814 - http://cdn.teenidols4you.com/sgpics-small/zacharygordan.jpg
1815 - http://cdn.teenidols4you.com/sgpics-small/zackary-arthur.jpg
1816 - http://cdn.teenidols4you.com/sgpics/Aaron-Keller.jpg
1817 - http://cdn.teenidols4you.com/sgpics/AdamLambert.jpg
1818 - http://cdn.teenidols4you.com/sgpics/Adele.jpg
1819 - http://cdn.teenidols4you.com/sgpics/AmandaSeyfried.jpg
1820 - http://cdn.teenidols4you.com/sgpics/Bogdan-Iancu.jpg
1821 - http://cdn.teenidols4you.com/sgpics/ChandlerCanterbury.jpg
1822 - http://cdn.teenidols4you.com/sgpics/Jeremy-Fernandez.jpg
1823 - http://cdn.teenidols4you.com/sgpics/aaranthomas.jpg
1824 - http://cdn.teenidols4you.com/sgpics/aaron-carpenter.jpg
1825 - http://cdn.teenidols4you.com/sgpics/aaron-christian-howles.jpg
1826 - http://cdn.teenidols4you.com/sgpics/aaron-david-johnson.jpg
1827 - http://cdn.teenidols4you.com/sgpics/aaron-r-landon.jpg
1828 - http://cdn.teenidols4you.com/sgpics/aaron_altaras.jpg
1829 - http://cdn.teenidols4you.com/sgpics/aaron_carter.jpg
1830 - http://cdn.teenidols4you.com/sgpics/aaron_johnson.jpg
1831 - http://cdn.teenidols4you.com/sgpics/aaron_renfree.jpg
1832 - http://cdn.teenidols4you.com/sgpics/aaron_sidwell.jpg
1833 - http://cdn.teenidols4you.com/sgpics/aaron_stanford.jpg
1834 - http://cdn.teenidols4you.com/sgpics/aaronashmore.jpg
1835 - http://cdn.teenidols4you.com/sgpics/aaronbuckingham.jpg
1836 - http://cdn.teenidols4you.com/sgpics/aaronhart.jpg
1837 - http://cdn.teenidols4you.com/sgpics/aaronhimelstein.jpg
1838 - http://cdn.teenidols4you.com/sgpics/aaronmichaeldrozin.jpg
1839 - http://cdn.teenidols4you.com/sgpics/aaronrefvem.jpg
1840 - http://cdn.teenidols4you.com/sgpics/aaronsanders.jpg
1841 - http://cdn.teenidols4you.com/sgpics/abigail-pniowsky.jpg
1842 - http://cdn.teenidols4you.com/sgpics/abigail_breslin.jpg
1843 - http://cdn.teenidols4you.com/sgpics/abigailmavity.jpg
1844 - http://cdn.teenidols4you.com/sgpics/acursivememory.jpg
1845 - http://cdn.teenidols4you.com/sgpics/adam-dimarco.jpg
1846 - http://cdn.teenidols4you.com/sgpics/adam_brody.jpg
1847 - http://cdn.teenidols4you.com/sgpics/adam_butcher.jpg
1848 - http://cdn.teenidols4you.com/sgpics/adam_hicks.jpg
1849 - http://cdn.teenidols4you.com/sgpics/adam_lamberg.jpg
1850 - http://cdn.teenidols4you.com/sgpics/adam_sevani.jpg
1851 - http://cdn.teenidols4you.com/sgpics/adam_smith.jpg
1852 - http://cdn.teenidols4you.com/sgpics/adamchojnacki.jpg
1853 - http://cdn.teenidols4you.com/sgpics/adamgarcia.jpg
1854 - http://cdn.teenidols4you.com/sgpics/adamgilbertjespersen.jpg
1855 - http://cdn.teenidols4you.com/sgpics/adamgregory.jpg
1856 - http://cdn.teenidols4you.com/sgpics/adamirigoyen.jpg
1857 - http://cdn.teenidols4you.com/sgpics/adamjeziersky.jpg
1858 - http://cdn.teenidols4you.com/sgpics/adexe-guttierez-hernandez.jpg
1859 - http://cdn.teenidols4you.com/sgpics/adrianrodriguez.jpg
1860 - http://cdn.teenidols4you.com/sgpics/afinefrenzy.jpg
1861 - http://cdn.teenidols4you.com/sgpics/after-romeo.jpg
1862 - http://cdn.teenidols4you.com/sgpics/aidanalexander.jpg
1863 - http://cdn.teenidols4you.com/sgpics/aidandavis.jpg
1864 - http://cdn.teenidols4you.com/sgpics/aiden-flowers.jpg
1865 - http://cdn.teenidols4you.com/sgpics/aisha-dee.jpg
1866 - http://cdn.teenidols4you.com/sgpics/aj-mitchell.jpg
1867 - http://cdn.teenidols4you.com/sgpics/aj-wray.jpg
1868 - http://cdn.teenidols4you.com/sgpics/aj_trauth.jpg
1869 - http://cdn.teenidols4you.com/sgpics/ajlamas.jpg
1870 - http://cdn.teenidols4you.com/sgpics/ajsaudin.jpg
1871 - http://cdn.teenidols4you.com/sgpics/al-calderon.jpg
1872 - http://cdn.teenidols4you.com/sgpics/albin-palmgren-.jpg
1873 - http://cdn.teenidols4you.com/sgpics/alec-golinger.jpg
1874 - http://cdn.teenidols4you.com/sgpics/alex-angelo.jpg
1875 - http://cdn.teenidols4you.com/sgpics/alex-b.jpg
1876 - http://cdn.teenidols4you.com/sgpics/alex-ruygrok.jpg
1877 - http://cdn.teenidols4you.com/sgpics/alex_turner.jpg
1878 - http://cdn.teenidols4you.com/sgpics/alex_wolff.jpg
1879 - http://cdn.teenidols4you.com/sgpics/alexa_melo.jpg
1880 - http://cdn.teenidols4you.com/sgpics/alexandernoyes.jpg
1881 - http://cdn.teenidols4you.com/sgpics/alexanderrybak.jpg
1882 - http://cdn.teenidols4you.com/sgpics/alexband.jpg
1883 - http://cdn.teenidols4you.com/sgpics/alexgaskarth.jpg
1884 - http://cdn.teenidols4you.com/sgpics/alexheartbreaker.jpg
1885 - http://cdn.teenidols4you.com/sgpics/alfred-enoch.jpg
1886 - http://cdn.teenidols4you.com/sgpics/alilohan.jpg
1887 - http://cdn.teenidols4you.com/sgpics/allanhyde.jpg
1888 - http://cdn.teenidols4you.com/sgpics/allisoniraheta.jpg
1889 - http://cdn.teenidols4you.com/sgpics/allstarweekend.jpg
1890 - http://cdn.teenidols4you.com/sgpics/alohafromhell.jpg
1891 - http://cdn.teenidols4you.com/sgpics/alyson_michalka.jpg
1892 - http://cdn.teenidols4you.com/sgpics/alyssabarlow.jpg
1893 - http://cdn.teenidols4you.com/sgpics/amanda_michalka.jpg
1894 - http://cdn.teenidols4you.com/sgpics/amitfarkash.jpg
1895 - http://cdn.teenidols4you.com/sgpics/amydiamond.jpg
1896 - http://cdn.teenidols4you.com/sgpics/amylee.jpg
1897 - http://cdn.teenidols4you.com/sgpics/anahi.jpg
1898 - http://cdn.teenidols4you.com/sgpics/anaislameche.jpg
1899 - http://cdn.teenidols4you.com/sgpics/andre-kim.jpg
1900 - http://cdn.teenidols4you.com/sgpics/andrewlee.jpg
1901 - http://cdn.teenidols4you.com/sgpics/andysixx.jpg
1902 - http://cdn.teenidols4you.com/sgpics/angelfaith.jpg
1903 - http://cdn.teenidols4you.com/sgpics/anna_popplewell.jpg
1904 - http://cdn.teenidols4you.com/sgpics/annamariaperezdetagle.jpg
1905 - http://cdn.teenidols4you.com/sgpics/annasophia_robb.jpg
1906 - http://cdn.teenidols4you.com/sgpics/annasundstrand.jpg
1907 - http://cdn.teenidols4you.com/sgpics/anneliesevanderpol.jpg
1908 - http://cdn.teenidols4you.com/sgpics/anthony-rosenthal.jpg
1909 - http://cdn.teenidols4you.com/sgpics/anthony_way.jpg
1910 - http://cdn.teenidols4you.com/sgpics/anthonyfederov.jpg
1911 - http://cdn.teenidols4you.com/sgpics/anthonygargiula.jpg
1912 - http://cdn.teenidols4you.com/sgpics/antonio_jose.jpg
1913 - http://cdn.teenidols4you.com/sgpics/arianagrande.jpg
1914 - http://cdn.teenidols4you.com/sgpics/arianalynnzari.jpg
1915 - http://cdn.teenidols4you.com/sgpics/arielmoore.jpg
1916 - http://cdn.teenidols4you.com/sgpics/artiom_strelnikov.jpg
1917 - http://cdn.teenidols4you.com/sgpics/ashanti.jpg
1918 - http://cdn.teenidols4you.com/sgpics/asher-angel.jpg
1919 - http://cdn.teenidols4you.com/sgpics/asher_book.jpg
1920 - http://cdn.teenidols4you.com/sgpics/asherroth.jpg
1921 - http://cdn.teenidols4you.com/sgpics/ashleesimpson.jpg
1922 - http://cdn.teenidols4you.com/sgpics/ashley_parker_angel.jpg
1923 - http://cdn.teenidols4you.com/sgpics/ashley_tisdale.jpg
1924 - http://cdn.teenidols4you.com/sgpics/ashleyargota.jpg
1925 - http://cdn.teenidols4you.com/sgpics/ashleybenson.jpg
1926 - http://cdn.teenidols4you.com/sgpics/ashton-irwin.jpg
1927 - http://cdn.teenidols4you.com/sgpics/asiacruise.jpg
1928 - http://cdn.teenidols4you.com/sgpics/ateens.jpg
1929 - http://cdn.teenidols4you.com/sgpics/austin-brown.jpg
1930 - http://cdn.teenidols4you.com/sgpics/austin-kane.jpg
1931 - http://cdn.teenidols4you.com/sgpics/austin-mahone.jpg
1932 - http://cdn.teenidols4you.com/sgpics/austinanderson.jpg
1933 - http://cdn.teenidols4you.com/sgpics/ava-kolker.jpg
1934 - http://cdn.teenidols4you.com/sgpics/avenue.jpg
1935 - http://cdn.teenidols4you.com/sgpics/avi-angel.jpg
1936 - http://cdn.teenidols4you.com/sgpics/avril_lavigne.jpg
1937 - http://cdn.teenidols4you.com/sgpics/aydan-calafiore.jpg
1938 - http://cdn.teenidols4you.com/sgpics/ben_thomas.jpg
1939 - http://cdn.teenidols4you.com/sgpics/ben_thornton.jpg
1940 - http://cdn.teenidols4you.com/sgpics/brandon-rossel.jpg
1941 - http://cdn.teenidols4you.com/sgpics/brandonmichaelvayda.jpg
1942 - http://cdn.teenidols4you.com/sgpics/brandontylerrussell.jpg
1943 - http://cdn.teenidols4you.com/sgpics/brianb.jpg
1944 - http://cdn.teenidols4you.com/sgpics/bridgitmendler.jpg
1945 - http://cdn.teenidols4you.com/sgpics/britney_spears.jpg
1946 - http://cdn.teenidols4you.com/sgpics/bronsonpelletier.jpg
1947 - http://cdn.teenidols4you.com/sgpics/bryce-gheisar.jpg
1948 - http://cdn.teenidols4you.com/sgpics/bryce-robinson.jpg
1949 - http://cdn.teenidols4you.com/sgpics/caleb-coffee.jpg
1950 - http://cdn.teenidols4you.com/sgpics/carson-peters.jpg
1951 - http://cdn.teenidols4you.com/sgpics/carson-severson.jpg
1952 - http://cdn.teenidols4you.com/sgpics/carson-white.jpg
1953 - http://cdn.teenidols4you.com/sgpics/cassiesteele.jpg
1954 - http://cdn.teenidols4you.com/sgpics/cassius-devan.jpg
1955 - http://cdn.teenidols4you.com/sgpics/charlie-puth.jpg
1956 - http://cdn.teenidols4you.com/sgpics/charliecox.jpg
1957 - http://cdn.teenidols4you.com/sgpics/chloebridges.jpg
1958 - http://cdn.teenidols4you.com/sgpics/chris_furrh.jpg
1959 - http://cdn.teenidols4you.com/sgpics/christianvandal.jpg
1960 - http://cdn.teenidols4you.com/sgpics/christinaaguilera.jpg
1961 - http://cdn.teenidols4you.com/sgpics/christoph_oehme.jpg
1962 - http://cdn.teenidols4you.com/sgpics/cole_peterson.jpg
1963 - http://cdn.teenidols4you.com/sgpics/connorross.jpg
1964 - http://cdn.teenidols4you.com/sgpics/corey-haim.jpg
1965 - http://cdn.teenidols4you.com/sgpics/cruz-beckham.jpg
1966 - http://cdn.teenidols4you.com/sgpics/cthowell.jpg
1967 - http://cdn.teenidols4you.com/sgpics/dakota-lotus.jpg
1968 - http://cdn.teenidols4you.com/sgpics/daniel-doheny.jpg
1969 - http://cdn.teenidols4you.com/sgpics/daniel-huttlestone.jpg
1970 - http://cdn.teenidols4you.com/sgpics/daniel-tay.jpg
1971 - http://cdn.teenidols4you.com/sgpics/daniel_magder.jpg
1972 - http://cdn.teenidols4you.com/sgpics/danielwachowiak.jpg
1973 - http://cdn.teenidols4you.com/sgpics/david_archuleta.jpg
1974 - http://cdn.teenidols4you.com/sgpics/davidcook.jpg
1975 - http://cdn.teenidols4you.com/sgpics/declan_galbraith.jpg
1976 - http://cdn.teenidols4you.com/sgpics/diego-velazquez.jpg
1977 - http://cdn.teenidols4you.com/sgpics/dieterschmitz.jpg
1978 - http://cdn.teenidols4you.com/sgpics/dulcemaria.jpg
1979 - http://cdn.teenidols4you.com/sgpics/dylan-hartman.jpg
1980 - http://cdn.teenidols4you.com/sgpics/dylan_mclaughlin.jpg
1981 - http://cdn.teenidols4you.com/sgpics/dylanminnette.jpg
1982 - http://cdn.teenidols4you.com/sgpics/dyllan_christopher.jpg
1983 - http://cdn.teenidols4you.com/sgpics/elizadushku.jpg
1984 - http://cdn.teenidols4you.com/sgpics/emery-kelly.jpg
1985 - http://cdn.teenidols4you.com/sgpics/emiliedeRavin.jpg
1986 - http://cdn.teenidols4you.com/sgpics/emily_browning.jpg
1987 - http://cdn.teenidols4you.com/sgpics/emmabell.jpg
1988 - http://cdn.teenidols4you.com/sgpics/emmalockhart.jpg
1989 - http://cdn.teenidols4you.com/sgpics/eunicecho.jpg
1990 - http://cdn.teenidols4you.com/sgpics/fabianhalbig.jpg
1991 - http://cdn.teenidols4you.com/sgpics/felipe-leal.jpg
1992 - http://cdn.teenidols4you.com/sgpics/felix-bossuet.jpg
1993 - http://cdn.teenidols4you.com/sgpics/finn-wolfhard-.jpg
1994 - http://cdn.teenidols4you.com/sgpics/frankie_j.jpg
1995 - http://cdn.teenidols4you.com/sgpics/frankiem.jpg
1996 - http://cdn.teenidols4you.com/sgpics/g-hannelius.jpg
1997 - http://cdn.teenidols4you.com/sgpics/garren-stitt.jpg
1998 - http://cdn.teenidols4you.com/sgpics/graham-rogers.jpg
1999 - http://cdn.teenidols4you.com/sgpics/grant-knoche.jpg
2000 - http://cdn.teenidols4you.com/sgpics/graysonrussell.jpg
2001 - http://cdn.teenidols4you.com/sgpics/gregfinley.jpg
2002 - http://cdn.teenidols4you.com/sgpics/hailee-steinfeld.jpg
2003 - http://cdn.teenidols4you.com/sgpics/halleehirsh.jpg
2004 - http://cdn.teenidols4you.com/sgpics/halscardino.jpg
2005 - http://cdn.teenidols4you.com/sgpics/harry_judd.jpg
2006 - http://cdn.teenidols4you.com/sgpics/hayley_williams.jpg
2007 - http://cdn.teenidols4you.com/sgpics/helenflanagan.jpg
2008 - http://cdn.teenidols4you.com/sgpics/hunter-jones.jpg
2009 - http://cdn.teenidols4you.com/sgpics/hunter_allan.jpg
2010 - http://cdn.teenidols4you.com/sgpics/hunter_gomez.jpg
2011 - http://cdn.teenidols4you.com/sgpics/ian_somerhalder.jpg
2012 - http://cdn.teenidols4you.com/sgpics/inigo_garces.jpg
2013 - http://cdn.teenidols4you.com/sgpics/isaak-presley.jpg
2014 - http://cdn.teenidols4you.com/sgpics/isabellasoric.jpg
2015 - http://cdn.teenidols4you.com/sgpics/ivan-mallon.jpg
2016 - http://cdn.teenidols4you.com/sgpics/jack-griffo.jpg
2017 - http://cdn.teenidols4you.com/sgpics/jack-mcgraw.jpg
2018 - http://cdn.teenidols4you.com/sgpics/jackie-radinsky.jpg
2019 - http://cdn.teenidols4you.com/sgpics/jackson-a-dunn.jpg
2020 - http://cdn.teenidols4you.com/sgpics/jackson-dollinger.jpg
2021 - http://cdn.teenidols4you.com/sgpics/jacksonrathbone.jpg
2022 - http://cdn.teenidols4you.com/sgpics/jacob-buster.jpg
2023 - http://cdn.teenidols4you.com/sgpics/jacob-sartorius.jpg
2024 - http://cdn.teenidols4you.com/sgpics/jaeden-lieberher.jpg
2025 - http://cdn.teenidols4you.com/sgpics/jake-manley.jpg
2026 - http://cdn.teenidols4you.com/sgpics/jake_austin.jpg
2027 - http://cdn.teenidols4you.com/sgpics/jake_gyllenhaal.jpg
2028 - http://cdn.teenidols4you.com/sgpics/jakob-davies.jpg
2029 - http://cdn.teenidols4you.com/sgpics/jamieanderson.jpg
2030 - http://cdn.teenidols4you.com/sgpics/jane-levy.jpg
2031 - http://cdn.teenidols4you.com/sgpics/janhendrikkiefer.jpg
2032 - http://cdn.teenidols4you.com/sgpics/jasminevillegas.jpg
2033 - http://cdn.teenidols4you.com/sgpics/jean_baptiste_maunier.jpg
2034 - http://cdn.teenidols4you.com/sgpics/jean_luke_figueroa.jpg
2035 - http://cdn.teenidols4you.com/sgpics/jenna_dewan.jpg
2036 - http://cdn.teenidols4you.com/sgpics/jesse_metcalfe.jpg
2037 - http://cdn.teenidols4you.com/sgpics/jessicaharmon.jpg
2038 - http://cdn.teenidols4you.com/sgpics/jessicatyler.jpg
2039 - http://cdn.teenidols4you.com/sgpics/jillian-rose-reed.jpg
2040 - http://cdn.teenidols4you.com/sgpics/jimi_ochsenknecht.jpg
2041 - http://cdn.teenidols4you.com/sgpics/joanna_levesque.jpg
2042 - http://cdn.teenidols4you.com/sgpics/joe_mcintyre.jpg
2043 - http://cdn.teenidols4you.com/sgpics/joe_scheibelhut.jpg
2044 - http://cdn.teenidols4you.com/sgpics/joel-dawson.jpg
2045 - http://cdn.teenidols4you.com/sgpics/joel-goncalves.jpg
2046 - http://cdn.teenidols4you.com/sgpics/johann-vera.jpg
2047 - http://cdn.teenidols4you.com/sgpics/johnny-orlando.jpg
2048 - http://cdn.teenidols4you.com/sgpics/jojo.jpg
2049 - http://cdn.teenidols4you.com/sgpics/jordan_garrett.jpg
2050 - http://cdn.teenidols4you.com/sgpics/jordinsparks.jpg
2051 - http://cdn.teenidols4you.com/sgpics/jorge-blanco.jpg
2052 - http://cdn.teenidols4you.com/sgpics/joseph_mcmanners.jpg
2053 - http://cdn.teenidols4you.com/sgpics/josh-feldman.jpg
2054 - http://cdn.teenidols4you.com/sgpics/joshua-bassett.jpg
2055 - http://cdn.teenidols4you.com/sgpics/joshua-rush.jpg
2056 - http://cdn.teenidols4you.com/sgpics/jt-church.jpg
2057 - http://cdn.teenidols4you.com/sgpics/katetodd.jpg
2058 - http://cdn.teenidols4you.com/sgpics/katevoegele.jpg
2059 - http://cdn.teenidols4you.com/sgpics/kevin_alexander_clark.jpg
2060 - http://cdn.teenidols4you.com/sgpics/kiersey-clemons.jpg
2061 - http://cdn.teenidols4you.com/sgpics/kristin_kreuk.jpg
2062 - http://cdn.teenidols4you.com/sgpics/krystenritter.jpg
2063 - http://cdn.teenidols4you.com/sgpics/kyan-zielinski.jpg
2064 - http://cdn.teenidols4you.com/sgpics/ladysovereign.jpg
2065 - http://cdn.teenidols4you.com/sgpics/lance-lim.jpg
2066 - http://cdn.teenidols4you.com/sgpics/laurenceleboeuf.jpg
2067 - http://cdn.teenidols4you.com/sgpics/leon-wessel-masannek.jpg
2068 - http://cdn.teenidols4you.com/sgpics/leonjackson.jpg
2069 - http://cdn.teenidols4you.com/sgpics/leticia_colin.jpg
2070 - http://cdn.teenidols4you.com/sgpics/lincoln-melcher.jpg
2071 - http://cdn.teenidols4you.com/sgpics/lindsay_felton.jpg
2072 - http://cdn.teenidols4you.com/sgpics/lloyd-daniels.jpg
2073 - http://cdn.teenidols4you.com/sgpics/logan-robot-gladden.jpg
2074 - http://cdn.teenidols4you.com/sgpics/loganhuffman.jpg
2075 - http://cdn.teenidols4you.com/sgpics/louis-tomlinson.jpg
2076 - http://cdn.teenidols4you.com/sgpics/lucas-hedges.jpg
2077 - http://cdn.teenidols4you.com/sgpics/luke-donaldson.jpg
2078 - http://cdn.teenidols4you.com/sgpics/luke-judy.jpg
2079 - http://cdn.teenidols4you.com/sgpics/mace-coronel.jpg
2080 - http://cdn.teenidols4you.com/sgpics/mackenzie_rosman.jpg
2081 - http://cdn.teenidols4you.com/sgpics/macsen-lintz.jpg
2082 - http://cdn.teenidols4you.com/sgpics/madisondelagarza.jpg
2083 - http://cdn.teenidols4you.com/sgpics/malachi-barton.jpg
2084 - http://cdn.teenidols4you.com/sgpics/mandyjiroux.jpg
2085 - http://cdn.teenidols4you.com/sgpics/manu-rios.jpg
2086 - http://cdn.teenidols4you.com/sgpics/mariano_titanti.jpg
2087 - http://cdn.teenidols4you.com/sgpics/mariomaurer.jpg
2088 - http://cdn.teenidols4you.com/sgpics/maverick-baker.jpg
2089 - http://cdn.teenidols4you.com/sgpics/max-and-harvey.jpg
2090 - http://cdn.teenidols4you.com/sgpics/maxkasch.jpg
2091 - http://cdn.teenidols4you.com/sgpics/meghan-trainor.jpg
2092 - http://cdn.teenidols4you.com/sgpics/michael-murphy.jpg
2093 - http://cdn.teenidols4you.com/sgpics/michael_angarano.jpg
2094 - http://cdn.teenidols4you.com/sgpics/michaellohanjr.jpg
2095 - http://cdn.teenidols4you.com/sgpics/mikevitar.jpg
2096 - http://cdn.teenidols4you.com/sgpics/nash-grier.jpg
2097 - http://cdn.teenidols4you.com/sgpics/nat_wolff.jpg
2098 - http://cdn.teenidols4you.com/sgpics/neel-sethi.jpg
2099 - http://cdn.teenidols4you.com/sgpics/nic-neufeld.jpg
2100 - http://cdn.teenidols4you.com/sgpics/nicholas_hoult.jpg
2101 - http://cdn.teenidols4you.com/sgpics/nick-merico.jpg
2102 - http://cdn.teenidols4you.com/sgpics/nick-shafer.jpg
2103 - http://cdn.teenidols4you.com/sgpics/nicki-minaj.jpg
2104 - http://cdn.teenidols4you.com/sgpics/nickroux.jpg
2105 - http://cdn.teenidols4you.com/sgpics/nicks.jpg
2106 - http://cdn.teenidols4you.com/sgpics/nicolas-bechtel.jpg
2107 - http://cdn.teenidols4you.com/sgpics/nicpuehse.jpg
2108 - http://cdn.teenidols4you.com/sgpics/noahdahl.jpg
2109 - http://cdn.teenidols4you.com/sgpics/orlandobrown.jpg
2110 - http://cdn.teenidols4you.com/sgpics/owen-vaccaro.jpg
2111 - http://cdn.teenidols4you.com/sgpics/paris-berelc.jpg
2112 - http://cdn.teenidols4you.com/sgpics/parker-bates.jpg
2113 - http://cdn.teenidols4you.com/sgpics/paulrodriguez.jpg
2114 - http://cdn.teenidols4you.com/sgpics/raven_symone.jpg
2115 - http://cdn.teenidols4you.com/sgpics/remy_thorne.jpg
2116 - http://cdn.teenidols4you.com/sgpics/ricky_godinez.jpg
2117 - http://cdn.teenidols4you.com/sgpics/rileyhawk.jpg
2118 - http://cdn.teenidols4you.com/sgpics/robert-daniel-sloan.jpg
2119 - http://cdn.teenidols4you.com/sgpics/robertclarenceirwin.jpg
2120 - http://cdn.teenidols4you.com/sgpics/robertschwartzman.jpg
2121 - http://cdn.teenidols4you.com/sgpics/ross-lynch.jpg
2122 - http://cdn.teenidols4you.com/sgpics/ross_bagley.jpg
2123 - http://cdn.teenidols4you.com/sgpics/russell-horning.jpg
2124 - http://cdn.teenidols4you.com/sgpics/ryan_carnes.jpg
2125 - http://cdn.teenidols4you.com/sgpics/ryan_deboer.jpg
2126 - http://cdn.teenidols4you.com/sgpics/ryan_sheckler.jpg
2127 - http://cdn.teenidols4you.com/sgpics/ryanwynott.jpg
2128 - http://cdn.teenidols4you.com/sgpics/ryders.jpg
2129 - http://cdn.teenidols4you.com/sgpics/sam_geer.jpg
2130 - http://cdn.teenidols4you.com/sgpics/samantha-boscarino.jpg
2131 - http://cdn.teenidols4you.com/sgpics/samantha_burton.jpg
2132 - http://cdn.teenidols4you.com/sgpics/sawyer-sharbino.jpg
2133 - http://cdn.teenidols4you.com/sgpics/seamus_fitzpatrick.jpg
2134 - http://cdn.teenidols4you.com/sgpics/sean-grandillo.jpg
2135 - http://cdn.teenidols4you.com/sgpics/sebastian-croft.jpg
2136 - http://cdn.teenidols4you.com/sgpics/sebastien-skubala.jpg
2137 - http://cdn.teenidols4you.com/sgpics/seth-lee.jpg
2138 - http://cdn.teenidols4you.com/sgpics/severinsonntag.jpg
2139 - http://cdn.teenidols4you.com/sgpics/shirota_yuu.jpg
2140 - http://cdn.teenidols4you.com/sgpics/spencerdaniels.jpg
2141 - http://cdn.teenidols4you.com/sgpics/stefaniescott.jpg
2142 - http://cdn.teenidols4you.com/sgpics/tanner-buchanan.jpg
2143 - http://cdn.teenidols4you.com/sgpics/tanner-fontana.jpg
2144 - http://cdn.teenidols4you.com/sgpics/taylor_ball.jpg
2145 - http://cdn.teenidols4you.com/sgpics/taylor_swift.jpg
2146 - http://cdn.teenidols4you.com/sgpics/thomas-law.jpg
2147 - http://cdn.teenidols4you.com/sgpics/thomas_dekker.jpg
2148 - http://cdn.teenidols4you.com/sgpics/thomasfiss.jpg
2149 - http://cdn.teenidols4you.com/sgpics/timothee-chalamet.jpg
2150 - http://cdn.teenidols4you.com/sgpics/timothy-colombos.jpg
2151 - http://cdn.teenidols4you.com/sgpics/tom_sturridge.jpg
2152 - http://cdn.teenidols4you.com/sgpics/trevorteichmann.jpg
2153 - http://cdn.teenidols4you.com/sgpics/tristanpuehse.jpg
2154 - http://cdn.teenidols4you.com/sgpics/tyler-dryden.jpg
2155 - http://cdn.teenidols4you.com/sgpics/tyree-brown.jpg
2156 - http://cdn.teenidols4you.com/sgpics/vanessa_anne_hudgens.jpg
2157 - http://cdn.teenidols4you.com/sgpics/vinicius-leal.jpg
2158 - http://cdn.teenidols4you.com/sgpics/vinnielangdon.jpg
2159 - http://cdn.teenidols4you.com/sgpics/wesley-stromberg.jpg
2160 - http://cdn.teenidols4you.com/sgpics/will-meyers.jpg
2161 - http://cdn.teenidols4you.com/sgpics/xaviersamuel.jpg
2162 - http://cdn.teenidols4you.com/sgpics/zach_mills.jpg
2163 - http://cdn.teenidols4you.com/sgpics/zachary-haven.jpg
2164 - http://cdn.teenidols4you.com/sgpics/zachcumer.jpg
2165 - http://cdn.teenidols4you.com/thumb/Actors/jentzen-ramirez/88TI4U1575596699.jpg
2166 - http://cdn.teenidols4you.com/thumb/Actors/jentzen-ramirez/88jentzen-ramirez-1575496807.jpg
2167 - http://cdn.teenidols4you.com/thumb/Actors/jentzen-ramirez/88jentzen-ramirez-1575594133.jpg
2168 - http://cdn.teenidols4you.com/thumb/Actors/jentzen-ramirez/88jentzen-ramirez-1575598861.jpg
2169 - http://cdn.teenidols4you.com/thumb/Actors/jentzen-ramirez/88jentzen-ramirez-1575599211.jpg
2170 - http://cdn.teenidols4you.com/thumb/Actors/jentzen-ramirez/88jentzen-ramirez-1575603596.jpg
2171 - http://cdn.teenidols4you.com/thumb/Actors/london-cheshire/88TI4U1574026548.jpg
2172 - http://cdn.teenidols4you.com/thumb/Actors/london-cheshire/88london-cheshire-1574041813.jpg
2173 - http://cdn.teenidols4you.com/thumb/Actors/london-cheshire/88london-cheshire-1574041844.jpg
2174 - http://cdn.teenidols4you.com/thumb/Actors/london-cheshire/88london-cheshire-1574041876.jpg
2175 - http://cdn.teenidols4you.com/thumb/Actors/london-cheshire/88london-cheshire-1574041896.jpg
2176 - http://cdn.teenidols4you.com/thumb/Actors/london-cheshire/88london-cheshire-1575603575.jpg
2177 - http://cdn.teenidols4you.com/thumb/Actors/lucas-royalty/88lucas-royalty-1575484668.jpg
2178 - http://cdn.teenidols4you.com/thumb/Actors/lucas-royalty/88lucas-royalty-1575594141.jpg
2179 - http://cdn.teenidols4you.com/thumb/Actors/lucas-royalty/88lucas-royalty-1575599136.jpg
2180 - http://cdn.teenidols4you.com/thumb/Actors/lucas-royalty/88lucas-royalty-1575603433.jpg
2181 - http://cdn.teenidols4you.com/thumb/Actors/lucas-royalty/88lucas-royalty-1575603440.jpg
2182 - http://cdn.teenidols4you.com/thumb/Actors/lucas-royalty/88lucas-royalty-1575603459.jpg
2183 - http://cdn.teenidols4you.com/thumb/Actors/lucas-royalty/88lucas-royalty-1575603543.jpg
2184 - http://cdn.teenidols4you.com/thumb/Actors/lucas-royalty/88lucas-royalty-1575603551.jpg
2185 - http://cdn.teenidols4you.com/thumb/Actors/ryker-baloun/88ryker-baloun-1575240944.jpg
2186 - http://cdn.teenidols4you.com/thumb/Actors/ryker-baloun/88ryker-baloun-1575240950.jpg
2187 - http://cdn.teenidols4you.com/thumb/Actors/ryker-baloun/88ryker-baloun-1575240956.jpg
2188 - http://cdn.teenidols4you.com/thumb/Actors/ryker-baloun/88ryker-baloun-1575240960.jpg
2189 - http://cdn.teenidols4you.com/thumb/Actors/ryker-baloun/88ryker-baloun-1575240965.jpg
2190 - http://cdn.teenidols4you.com/thumb/Actors/ryker-baloun/88ryker-baloun-1575603418.jpg
2191 - http://cdn.teenidols4you.com/thumb/Actors/tyler-crumley/88tyler-crumley-1575241024.jpg
2192 - http://cdn.teenidols4you.com/thumb/Actors/tyler-crumley/88tyler-crumley-1575252960.jpg
2193 - http://cdn.teenidols4you.com/thumb/Actors/tyler-crumley/88tyler-crumley-1575252965.jpg
2194 - http://cdn.teenidols4you.com/thumb/Actors/tyler-crumley/88tyler-crumley-1575252970.jpg
2195 - http://cdn.teenidols4you.com/thumb/Actors/tyler-crumley/88tyler-crumley-1575324680.jpg
2196 - http://cdn.teenidols4you.com/thumb/Actors/tyler-crumley/88tyler-crumley-1575603535.jpg
2197 - http://cdn.teenidols4you.com/thumb/Actors/walker-bryant/88TI4U1575596699.jpg
2198 - http://cdn.teenidols4you.com/thumb/Actors/walker-bryant/88walker-bryant-1575597000.jpg
2199 - http://cdn.teenidols4you.com/thumb/Actors/walker-bryant/88walker-bryant-1575599041.jpg
2200 - http://cdn.teenidols4you.com/thumb/Actors/walker-bryant/88walker-bryant-1575603487.jpg
2201 - http://cdn.teenidols4you.com/thumb/Actors/walker-bryant/88walker-bryant-1575603502.jpg
2202 - http://cdn.teenidols4you.com/thumb/Actors/walker-bryant/88walker-bryant-1575603516.jpg
2203 - http://cms.springboardplatform.com/embed_iframe/325/video/724605/tnid009/teenidols4you.com/10
2204 - http://m.teenidols4you.com
2205 - http://m.teenidols4you.com/Actors.html
2206 - http://m.teenidols4you.com/Singers.html
2207 - http://m.teenidols4you.com/actor.html
2208 - http://m.teenidols4you.com/birthdays.php
2209 - http://m.teenidols4you.com/gallery/2924/august-maturo.html
2210 - http://m.teenidols4you.com/gallery/2972/aidan-gallagher.html
2211 - http://m.teenidols4you.com/gallery/3270/asher-angel.html
2212 - http://m.teenidols4you.com/gallery/3437/blaze-freeman.html
2213 - http://m.teenidols4you.com/gallery/3460/alex-ruygrok.html
2214 - http://m.teenidols4you.com/gallery/3604/anthony-rosenthal.html
2215 - http://m.teenidols4you.com/gallery/3611/ayden-mekus.html
2216 - http://m.teenidols4you.com/gallery/3620/caio-laranjeira.html
2217 - http://m.teenidols4you.com/gallery/3719/brayden-benson.html
2218 - http://m.teenidols4you.com/gallery/3731/caleb-coffee.html
2219 - http://m.teenidols4you.com/news.html
2220 - http://m.teenidols4you.com/news/enews1155.html
2221 - http://m.teenidols4you.com/news/enews1156.html
2222 - http://m.teenidols4you.com/news/enews1157.html
2223 - http://m.teenidols4you.com/news/enews1168.html
2224 - http://m.teenidols4you.com/picture.html?g=Actors&pe=jentzen-ramirez&foto=554&act=3751&mv=4&pic=910654
2225 - http://m.teenidols4you.com/picture.html?g=Actors&pe=london-cheshire&foto=554&act=3721&mv=4&pic=910653
2226 - http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910644
2227 - http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910645
2228 - http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910646
2229 - http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
2230 - http://m.teenidols4you.com/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910652
2231 - http://m.teenidols4you.com/picture.html?g=Actors&pe=ryker-baloun&foto=554&act=3718&mv=4&pic=910643
2232 - http://m.teenidols4you.com/picture.html?g=Actors&pe=tyler-crumley&foto=554&act=3737&mv=4&pic=910650
2233 - http://m.teenidols4you.com/picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910647
2234 - http://m.teenidols4you.com/picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910648
2235 - http://m.teenidols4you.com/picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910649
2236 - http://m.teenidols4you.com/picture/2924/4/august-maturo.html
2237 - http://m.teenidols4you.com/picture/2972/4/aidan-gallagher.html
2238 - http://m.teenidols4you.com/picture/3270/4/asher-angel.html
2239 - http://m.teenidols4you.com/picture/3437/4/blaze-freeman.html
2240 - http://m.teenidols4you.com/picture/3460/4/alex-ruygrok.html
2241 - http://m.teenidols4you.com/picture/3604/4/anthony-rosenthal.html
2242 - http://m.teenidols4you.com/picture/3611/4/ayden-mekus.html
2243 - http://m.teenidols4you.com/picture/3620/4/caio-laranjeira.html
2244 - http://m.teenidols4you.com/picture/3719/4/brayden-benson.html
2245 - http://m.teenidols4you.com/search.html
2246 - http://m.teenidols4you.com/shows/a.html
2247 - http://m.teenidols4you.com/top50/today
2248 - http://m.teenidols4you.com/updates.html
2249 - http://m.teenidols4you.com/upload.php
2250 - http://m.teenidols4you.com/uploaded.php
2251 - http://s7.addthis.com/js/250/addthis_widget.js
2252 - http://statcount.teenidols4you.com/stats-1575659816.gif?idol=3751
2253 - http://statcount.teenidols4you.com/stats-1575659817.gif?idol=3721
2254 - http://statcount.teenidols4you.com/stats-1575659819.gif?idol=3659
2255 - http://statcount.teenidols4you.com/stats-1575659821.gif?idol=3659
2256 - http://statcount.teenidols4you.com/stats-1575659823.gif?idol=3737
2257 - http://statcount.teenidols4you.com/stats-1575659825.gif?idol=3724
2258 - http://statcount.teenidols4you.com/stats-1575659827.gif?idol=3724
2259 - http://statcount.teenidols4you.com/stats-1575659829.gif?idol=3724
2260 - http://statcount.teenidols4you.com/stats-1575659831.gif?idol=3659
2261 - http://statcount.teenidols4you.com/stats-1575659833.gif?idol=3659
2262 - http://statcount.teenidols4you.com/stats-1575659834.gif?idol=3659
2263 - http://statcount.teenidols4you.com/stats-1575659836.gif?idol=3718
2264 - http://statcount.teenidols4you.com/stats-1575659838.gif?idol=2972
2265 - http://statcount.teenidols4you.com/stats-1575659840.gif?idol=2972
2266 - http://statcount.teenidols4you.com/stats-1575659842.gif?idol=3460
2267 - http://statcount.teenidols4you.com/stats-1575659844.gif?idol=3460
2268 - http://statcount.teenidols4you.com/stats-1575659845.gif?idol=3604
2269 - http://statcount.teenidols4you.com/stats-1575659847.gif?idol=3604
2270 - http://statcount.teenidols4you.com/stats-1575659849.gif?idol=3270
2271 - http://statcount.teenidols4you.com/stats-1575659851.gif?idol=3270
2272 - http://statcount.teenidols4you.com/stats-1575659854.gif?idol=2924
2273 - http://statcount.teenidols4you.com/stats-1575659855.gif?idol=2924
2274 - http://statcount.teenidols4you.com/stats-1575659857.gif?idol=3611
2275 - http://statcount.teenidols4you.com/stats-1575659859.gif?idol=3611
2276 - http://statcount.teenidols4you.com/stats-1575659861.gif?idol=3437
2277 - http://statcount.teenidols4you.com/stats-1575659863.gif?idol=3437
2278 - http://statcount.teenidols4you.com/stats-1575659865.gif?idol=3719
2279 - http://statcount.teenidols4you.com/stats-1575659867.gif?idol=3719
2280 - http://statcount.teenidols4you.com/stats-1575659869.gif?idol=3620
2281 - http://statcount.teenidols4you.com/stats-1575659871.gif?idol=3620
2282 - http://statcount.teenidols4you.com/stats-1575659873.gif?idol=3731
2283 - http://tags.expo9.exponential.com/tags/TeenIdols4You/ROS/tags.js
2284 - http://www.addthis.com/bookmark.php
2285 - http://www.google.com/cse/brand?form=cse-search-box&lang=en
2286 - http://www.google.com/cse/style/look/default.css
2287 - http://www.google.com/jsapi
2288 - http://www.springboardplatform.com/js/overlay
2289 - http://www.teenidols4you.com/actor.html?page=2
2290 - http://www.teenidols4you.com/gallery/2517/CameronBoyce.html
2291 - http://www.teenidols4you.com/videos/a-new-beginning_6877d96d2.html
2292 - http://www.teenidols4you.com/videos/a-week-in-jacob-sartorius-life_aa56e2111.html
2293 - http://www.teenidols4you.com/videos/alex-angelo-change-your-life-official-music-lyric-video_07ae57546.html
2294 - http://www.teenidols4you.com/videos/bars-and-melody-i-wont-let-you-go-official-video_a8c713689.html
2295 - http://www.teenidols4you.com/videos/baseboys-level-1000_141d281f3.html
2296 - http://www.teenidols4you.com/videos/browse-country-videos-1-date.html
2297 - http://www.teenidols4you.com/videos/browse-dance-videos-1-date.html
2298 - http://www.teenidols4you.com/videos/browse-hiphop-videos-1-date.html
2299 - http://www.teenidols4you.com/videos/browse-holiday-videos-1-date.html
2300 - http://www.teenidols4you.com/videos/browse-latin-videos-1-date.html
2301 - http://www.teenidols4you.com/videos/browse-pop-videos-1-date.html
2302 - http://www.teenidols4you.com/videos/browse-rnb-videos-1-date.html
2303 - http://www.teenidols4you.com/videos/browse-rock-videos-1-date.html
2304 - http://www.teenidols4you.com/videos/browse-tvfilm-videos-1-date.html
2305 - http://www.teenidols4you.com/videos/browse-usercreated-videos-1-date.html
2306 - http://www.teenidols4you.com/videos/browse.html
2307 - http://www.teenidols4you.com/videos/contact_us.html
2308 - http://www.teenidols4you.com/videos/demi-lovato-dont-forget-video_44f4fd58b.html
2309 - http://www.teenidols4you.com/videos/embed.php?vid=a4dd08c16
2310 - http://www.teenidols4you.com/videos/greyson-chance-low-live-at-roland-studios_5afd529f3.html
2311 - http://www.teenidols4you.com/videos/greyson-chance-unfriend-you-video_4983a3387.html
2312 - http://www.teenidols4you.com/videos/include/securimage_show.php?sid=e5c939c253c8a2c8f05ccab289375f7d
2313 - http://www.teenidols4you.com/videos/index.html
2314 - http://www.teenidols4you.com/videos/interview-on-skype-with-max-charles_0f3002a79.html
2315 - http://www.teenidols4you.com/videos/it-cast_5d9fc0670.html
2316 - http://www.teenidols4you.com/videos/jacob-sartorius-by-your-side-official-music-video_a4dd08c16.html
2317 - http://www.teenidols4you.com/videos/jacob-tremblay-on-the-show-jimmy-kimmel_d6bf5f44e.html
2318 - http://www.teenidols4you.com/videos/js,_melody.dev.js+templates,_default,_js,_melody.dev.js+templates,_default,_js,_lightbox.min.js.pagespeed.jc.mJSR-Mm7ln.js
2319 - http://www.teenidols4you.com/videos/js/swfobject.js.pagespeed.jm.1RrDOSyVY3.js
2320 - http://www.teenidols4you.com/videos/justin-bieber-as-long-as-you-love-me-acoustic-live-video_d7b024cfb.html
2321 - http://www.teenidols4you.com/videos/justin-bieber-love-me-video_9989bf349.html
2322 - http://www.teenidols4you.com/videos/justin-bieber-one-time-kiss-985-live-video_f03a31cae.html
2323 - http://www.teenidols4you.com/videos/login.html?do=forgot_pass
2324 - http://www.teenidols4you.com/videos/login.php?do=twitter
2325 - http://www.teenidols4you.com/videos/mattyb-justin-bieber-as-long-as-you-love-me-video_b2f80a258.html
2326 - http://www.teenidols4you.com/videos/maxwell-jenkins-of-netflixs-lost-in-space-has-deep-chicago-roots_2d955e317.html
2327 - http://www.teenidols4you.com/videos/memberlist.html
2328 - http://www.teenidols4you.com/videos/memberlist.html?do=online
2329 - http://www.teenidols4you.com/videos/merrick-hanna-from-americas-got-talent_a99e8ccf2.html
2330 - http://www.teenidols4you.com/videos/miley-cyrus-how-to-do-the-hoedown-throwdown-video_d11413eaa.html
2331 - http://www.teenidols4you.com/videos/miley-cyrus-party-in-the-usa-video_b017d6f2b.html
2332 - http://www.teenidols4you.com/videos/newvideos.html
2333 - http://www.teenidols4you.com/videos/randomizer.php
2334 - http://www.teenidols4you.com/videos/register.html
2335 - http://www.teenidols4you.com/videos/rss.php
2336 - http://www.teenidols4you.com/videos/tags/jesse-mccartney/
2337 - http://www.teenidols4you.com/videos/tags/justin-bieber/
2338 - http://www.teenidols4you.com/videos/tags/justin/
2339 - http://www.teenidols4you.com/videos/tags/mattybraps/
2340 - http://www.teenidols4you.com/videos/tags/music-video/
2341 - http://www.teenidols4you.com/videos/tags/music/
2342 - http://www.teenidols4you.com/videos/tags/pop/
2343 - http://www.teenidols4you.com/videos/tags/the/
2344 - http://www.teenidols4you.com/videos/tags/video/
2345 - http://www.teenidols4you.com/videos/tags/you/
2346 - http://www.teenidols4you.com/videos/templates,_default,_js,_jquery.carouFredSel.min.js+templates,_default,_js,_jquery.touchwipe.min.js+templates,_default,_js,_jquery.maskedinput-1.3.min.js+templates,_default,_js,_jquery.tagsinput.min.js+templates,_default,_js,_jquery-scrolltofixed-min.js+templates,_default,_js,_jquery.uniform.min.js+templates,_default,_js,_jquery.ba-dotimeout.min.js+js,_jquery.typewatch.js+js,_bootstrap-notify.min.js.pagespeed.jc.DvFlf9HeNj.js
2347 - http://www.teenidols4you.com/videos/templates,_default,_js,_jquery.maskedinput-1.3.min.js+templates,_default,_js,_jquery.tagsinput.min.js+templates,_default,_js,_jquery-scrolltofixed-min.js+templates,_default,_js,_jquery.uniform.min.js+templates,_default,_js,_jquery.ba-dotimeout.min.js+js,_jquery.typewatch.js+js,_bootstrap-notify.min.js+js,_melody.dev.js+templates,_default,_js,_melody.dev.js+templates,_default,_js,_lightbox.min.js.pagespeed.jc.TV-4H6yo3w.js
2348 - http://www.teenidols4you.com/videos/templates/default/css/A.bootstrap.min.css+bootstrap-responsive.min.css,Mcc.vXxFI8eqSY.css.pagespeed.cf.gA5l0eUFH8.css
2349 - http://www.teenidols4you.com/videos/templates/default/css/A.new-style.css.pagespeed.cf.bJS-3IrWQL.css
2350 - http://www.teenidols4you.com/videos/templates/default/css/new-style-ie.css
2351 - http://www.teenidols4you.com/videos/templates/default/img/favicon.ico
2352 - http://www.teenidols4you.com/videos/templates/default/img/pm-avatar.png
2353 - http://www.teenidols4you.com/videos/templates/default/js/bootstrap.min.js+jquery.cookee.js+jquery.validate.min.js.pagespeed.jc._kXGI16sWa.js
2354 - http://www.teenidols4you.com/videos/templates/default/js/theme.js
2355 - http://www.teenidols4you.com/videos/templates/default/js/waypoints.min.js+melody.social.dev.js+jquery.cropit.js.pagespeed.jc.huEK_xmTDG.js
2356 - http://www.teenidols4you.com/videos/topvideos.html
2357 - http://www.teenidols4you.com/videos/uploads/thumbs/07ae57546-1.jpg
2358 - http://www.teenidols4you.com/videos/uploads/thumbs/0f3002a79-1.jpg
2359 - http://www.teenidols4you.com/videos/uploads/thumbs/141d281f3-1.jpg
2360 - http://www.teenidols4you.com/videos/uploads/thumbs/2d955e317-1.jpg
2361 - http://www.teenidols4you.com/videos/uploads/thumbs/44f4fd58b-1.jpg
2362 - http://www.teenidols4you.com/videos/uploads/thumbs/4983a3387-1.jpg
2363 - http://www.teenidols4you.com/videos/uploads/thumbs/57890cde6-1.jpg
2364 - http://www.teenidols4you.com/videos/uploads/thumbs/5afd529f3-1.jpg
2365 - http://www.teenidols4you.com/videos/uploads/thumbs/5d9fc0670-1.jpg
2366 - http://www.teenidols4you.com/videos/uploads/thumbs/6877d96d2-1.jpg
2367 - http://www.teenidols4you.com/videos/uploads/thumbs/9989bf349-1.jpg
2368 - http://www.teenidols4you.com/videos/uploads/thumbs/a8c713689-1.jpg
2369 - http://www.teenidols4you.com/videos/uploads/thumbs/a99e8ccf2-1.jpg
2370 - http://www.teenidols4you.com/videos/uploads/thumbs/aa56e2111-1.jpg
2371 - http://www.teenidols4you.com/videos/uploads/thumbs/b017d6f2b-1.jpg
2372 - http://www.teenidols4you.com/videos/uploads/thumbs/b2f80a258-1.jpg
2373 - http://www.teenidols4you.com/videos/uploads/thumbs/d11413eaa-1.jpg
2374 - http://www.teenidols4you.com/videos/uploads/thumbs/d6bf5f44e-1.jpg
2375 - http://www.teenidols4you.com/videos/uploads/thumbs/d7b024cfb-1.jpg
2376 - http://www.teenidols4you.com/videos/uploads/thumbs/f03a31cae-1.jpg
2377 - http://www.teenidols4you.com/videos/uriah-shelton-forever-young_57890cde6.html
2378 - http://www.teenidols4you.com/videos/user/TheMaxCharles/
2379 - http://www.teenidols4you.com/videos/user/admin/
2380 - http://www.teenidols4you.com/videos/user/teenactorfan/
2381 - https://apis.google.com/js/plusone.js
2382 - https://buysellads.com/buy/detail/244057
2383 - https://m.do.co/c/e1240b95a3bd
2384 - https://static.icopyright.net/user/js/rh.js
2385 - https://twitter.com/TeenIdols4You
2386 - https://twitter.com/share
2387 Total external links: 765
2388
2389+ Email addresses found:
2390 Total email address found: 0
2391
2392+ Directories found:
2393 - http://www.teenidols4you.com./ajax.googleapis.com/ (404 Not Found)
2394 - http://www.teenidols4you.com./ajax.googleapis.com/ajax/ (404 Not Found)
2395 - http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/ (404 Not Found)
2396 - http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/jquery/ (404 Not Found)
2397 - http://www.teenidols4you.com./ajax.googleapis.com/ajax/libs/jquery/1.8.3/ (404 Not Found)
2398 - http://www.teenidols4you.com./blink/ (404 Not Found)
2399 - http://www.teenidols4you.com./blink/Actors/ (404 Not Found)
2400 - http://www.teenidols4you.com./blink/Actors/jentzen-ramirez/ (No open folder)
2401 - http://www.teenidols4you.com./blink/Actors/london-cheshire/ (No open folder)
2402 - http://www.teenidols4you.com./blink/Actors/lucas-royalty/ (No open folder)
2403 - http://www.teenidols4you.com./blink/Actors/ryker-baloun/ (No open folder)
2404 - http://www.teenidols4you.com./blink/Actors/tyler-crumley/ (No open folder)
2405 - http://www.teenidols4you.com./blink/Actors/walker-bryant/ (No open folder)
2406 - http://www.teenidols4you.com./connect.facebook.net/ (404 Not Found)
2407 - http://www.teenidols4you.com./connect.facebook.net/en_US/ (404 Not Found)
2408 - http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/ (404 Not Found)
2409 - http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/svn/ (404 Not Found)
2410 - http://www.teenidols4you.com./css3-mediaqueries-js.googlecode.com/svn/trunk/ (404 Not Found)
2411 - http://www.teenidols4you.com./gallery/ (No open folder)
2412 - http://www.teenidols4you.com./gallery/2924/ (404 Not Found)
2413 - http://www.teenidols4you.com./gallery/2972/ (404 Not Found)
2414 - http://www.teenidols4you.com./gallery/3270/ (404 Not Found)
2415 - http://www.teenidols4you.com./gallery/3437/ (404 Not Found)
2416 - http://www.teenidols4you.com./gallery/3460/ (404 Not Found)
2417 - http://www.teenidols4you.com./gallery/3604/ (404 Not Found)
2418 - http://www.teenidols4you.com./gallery/3611/ (404 Not Found)
2419 - http://www.teenidols4you.com./gallery/3620/ (404 Not Found)
2420 - http://www.teenidols4you.com./gallery/3719/ (404 Not Found)
2421 - http://www.teenidols4you.com./gallery/3731/ (404 Not Found)
2422 - http://www.teenidols4you.com./gifs/ (403 Forbidden)
2423 - http://www.teenidols4you.com./html5shim.googlecode.com/ (404 Not Found)
2424 - http://www.teenidols4you.com./html5shim.googlecode.com/svn/ (404 Not Found)
2425 - http://www.teenidols4you.com./html5shim.googlecode.com/svn/trunk/ (404 Not Found)
2426 - http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/ (404 Not Found)
2427 - http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/ (404 Not Found)
2428 - http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/4.5.0/ (404 Not Found)
2429 - http://www.teenidols4you.com./maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/ (404 Not Found)
2430 - http://www.teenidols4you.com./news/ (404 Not Found)
2431 - http://www.teenidols4you.com./picture/ (404 Not Found)
2432 - http://www.teenidols4you.com./picture/2924/ (404 Not Found)
2433 - http://www.teenidols4you.com./picture/2924/4/ (404 Not Found)
2434 - http://www.teenidols4you.com./picture/2972/ (404 Not Found)
2435 - http://www.teenidols4you.com./picture/2972/4/ (404 Not Found)
2436 - http://www.teenidols4you.com./picture/3270/ (404 Not Found)
2437 - http://www.teenidols4you.com./picture/3270/4/ (404 Not Found)
2438 - http://www.teenidols4you.com./picture/3437/ (404 Not Found)
2439 - http://www.teenidols4you.com./picture/3437/4/ (404 Not Found)
2440 - http://www.teenidols4you.com./picture/3460/ (404 Not Found)
2441 - http://www.teenidols4you.com./picture/3460/4/ (404 Not Found)
2442 - http://www.teenidols4you.com./picture/3604/ (404 Not Found)
2443 - http://www.teenidols4you.com./picture/3604/4/ (404 Not Found)
2444 - http://www.teenidols4you.com./picture/3611/ (404 Not Found)
2445 - http://www.teenidols4you.com./picture/3611/4/ (404 Not Found)
2446 - http://www.teenidols4you.com./picture/3620/ (404 Not Found)
2447 - http://www.teenidols4you.com./picture/3620/4/ (404 Not Found)
2448 - http://www.teenidols4you.com./picture/3719/ (404 Not Found)
2449 - http://www.teenidols4you.com./picture/3719/4/ (404 Not Found)
2450 - http://www.teenidols4you.com./platform.twitter.com/ (404 Not Found)
2451 - http://www.teenidols4you.com./s7.addthis.com/ (404 Not Found)
2452 - http://www.teenidols4you.com./s7.addthis.com/js/ (404 Not Found)
2453 - http://www.teenidols4you.com./s7.addthis.com/js/300/ (404 Not Found)
2454 - http://www.teenidols4you.com./shows/ (404 Not Found)
2455 - http://www.teenidols4you.com./stars/ (403 Forbidden)
2456 - http://www.teenidols4you.com./tags.expo9.exponential.com/ (404 Not Found)
2457 - http://www.teenidols4you.com./tags.expo9.exponential.com/tags/ (404 Not Found)
2458 - http://www.teenidols4you.com./tags.expo9.exponential.com/tags/TeenIdols4You/ (404 Not Found)
2459 - http://www.teenidols4you.com./tags.expo9.exponential.com/tags/TeenIdols4You/ROS/ (404 Not Found)
2460 - http://www.teenidols4you.com./thumb/ (403 Forbidden)
2461 - http://www.teenidols4you.com./thumb/Actors/ (403 Forbidden)
2462 - http://www.teenidols4you.com./thumb/Actors/CameronBoyce/ (403 Forbidden)
2463 - http://www.teenidols4you.com./thumb/Actors/aidan-gallagher/ (403 Forbidden)
2464 - http://www.teenidols4you.com./thumb/Actors/alex-ruygrok/ (403 Forbidden)
2465 - http://www.teenidols4you.com./thumb/Actors/ansel-elgort/ (403 Forbidden)
2466 - http://www.teenidols4you.com./thumb/Actors/anthony-rosenthal/ (403 Forbidden)
2467 - http://www.teenidols4you.com./thumb/Actors/asher-angel/ (403 Forbidden)
2468 - http://www.teenidols4you.com./thumb/Actors/august-maturo/ (403 Forbidden)
2469 - http://www.teenidols4you.com./thumb/Actors/ayden-mekus/ (403 Forbidden)
2470 - http://www.teenidols4you.com./thumb/Actors/blaze-freeman/ (403 Forbidden)
2471 - http://www.teenidols4you.com./thumb/Actors/brayden-benson/ (403 Forbidden)
2472 - http://www.teenidols4you.com./thumb/Actors/caio-laranjeira/ (403 Forbidden)
2473 - http://www.teenidols4you.com./thumb/Actors/caleb-coffee/ (403 Forbidden)
2474 - http://www.teenidols4you.com./thumb/Actors/emma_watson/ (403 Forbidden)
2475 - http://www.teenidols4you.com./thumb/Actors/jacob-sartorius/ (403 Forbidden)
2476 - http://www.teenidols4you.com./thumb/Actors/jacob-tremblay/ (403 Forbidden)
2477 - http://www.teenidols4you.com./thumb/Actors/jentzen-ramirez/ (403 Forbidden)
2478 - http://www.teenidols4you.com./thumb/Actors/justinbieber/ (403 Forbidden)
2479 - http://www.teenidols4you.com./thumb/Actors/katyperry/ (403 Forbidden)
2480 - http://www.teenidols4you.com./thumb/Actors/london-cheshire/ (403 Forbidden)
2481 - http://www.teenidols4you.com./thumb/Actors/lucas-royalty/ (403 Forbidden)
2482 - http://www.teenidols4you.com./thumb/Actors/nickjonas/ (403 Forbidden)
2483 - http://www.teenidols4you.com./thumb/Actors/nolangould/ (403 Forbidden)
2484 - http://www.teenidols4you.com./thumb/Actors/one-direction/ (403 Forbidden)
2485 - http://www.teenidols4you.com./thumb/Actors/ryker-baloun/ (403 Forbidden)
2486 - http://www.teenidols4you.com./thumb/Actors/selena_gomez/ (403 Forbidden)
2487 - http://www.teenidols4you.com./thumb/Actors/thomas-barbusca/ (403 Forbidden)
2488 - http://www.teenidols4you.com./thumb/Actors/troyesivan/ (403 Forbidden)
2489 - http://www.teenidols4you.com./thumb/Actors/tyler-crumley/ (403 Forbidden)
2490 - http://www.teenidols4you.com./thumb/Actors/walker-bryant/ (403 Forbidden)
2491 - http://www.teenidols4you.com./thumb/Actors/zendayacoleman/ (403 Forbidden)
2492 - http://www.teenidols4you.com./top50/ (No open folder)
2493 - http://www.teenidols4you.com./videos/ (No open folder)
2494 - http://www.teenidols4you.com./videos/templates/ (No open folder)
2495 - http://www.teenidols4you.com./videos/templates/default/ (No open folder)
2496 - http://www.teenidols4you.com./videos/templates/default/images/ (403 Forbidden)
2497 Total directories: 104
2498
2499+ Directory indexing found:
2500 Total directories with indexing: 0
2501
2502----------------------------------------------------------------------
2503
2504--Finished--
2505Summary information for domain teenidols4you.com.
2506-----------------------------------------
2507
2508 Domain Ips Information:
2509 IP: 205.251.197.159
2510 HostName: ns-1439.awsdns-51.org Type: NS
2511 HostName: ns-1439.awsdns-51.org Type: PTR
2512 Country: United States
2513 Is Active: True (reset ttl 64)
2514 Port: 53/tcp open tcpwrapped syn-ack ttl 246
2515 IP: 50.193.231.57
2516 HostName: mail.deadendmail.com Type: MX
2517 HostName: mail.deadendmail.com Type: PTR
2518 Country: United States
2519 Is Active: True (reset ttl 64)
2520 IP: 205.251.194.196
2521 HostName: ns-708.awsdns-24.net Type: NS
2522 HostName: ns-708.awsdns-24.net Type: PTR
2523 Country: United States
2524 Is Active: True (reset ttl 64)
2525 Port: 53/tcp open tcpwrapped syn-ack ttl 243
2526 IP: 45.55.35.220
2527 Type: SPF
2528 HostName: www.teenidols4you.com. Type: A
2529 HostName: teenidols4you.com Type: PTR
2530 Country: United States
2531 Is Active: True (reset ttl 64)
2532 Port: 80/tcp open http syn-ack ttl 50 Apache httpd 2.2.15 ((CentOS))
2533 Script Info: | http-methods:
2534 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
2535 Script Info: |_http-server-header: Apache/2.2.15 (CentOS)
2536 Script Info: |_http-title: Did not follow redirect to http://www.45.55.35.220/
2537 Port: 3306/tcp open mysql syn-ack ttl 51 MySQL (unauthorized)
2538 IP: 205.251.199.51
2539 HostName: ns-1843.awsdns-38.co.uk Type: NS
2540 HostName: ns-1843.awsdns-38.co.uk Type: PTR
2541 Country: United States
2542 Is Active: True (reset ttl 64)
2543 Port: 53/tcp open tcpwrapped syn-ack ttl 245
2544 Script Info: Device type: storage-misc|PBX
2545 IP: 205.251.192.25
2546 HostName: ns-25.awsdns-03.com Type: NS
2547 HostName: ns-25.awsdns-03.com Type: PTR
2548 Country: United States
2549 Is Active: True (reset ttl 64)
2550 Port: 53/tcp open tcpwrapped syn-ack ttl 243
2551
2552--------------End Summary --------------
2553-----------------------------------------
2554#################################################################################################
2555traceroute to www.teenidols4you.com (45.55.35.220), 30 hops max, 60 byte packets
2556 1 10.246.204.1 (10.246.204.1) 214.103 ms 214.069 ms 214.043 ms
2557 2 213.184.122.97 (213.184.122.97) 214.084 ms 214.062 ms 214.038 ms
2558 3 bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9) 213.922 ms 213.901 ms 213.834 ms
2559 4 bzq-179-124-185.cust.bezeqint.net (212.179.124.185) 213.846 ms bzq-219-189-185.cablep.bezeqint.net (62.219.189.185) 373.066 ms 373.035 ms
2560 5 bzq-114-65-2.cust.bezeqint.net (192.114.65.2) 213.794 ms bzq-114-65-1.cust.bezeqint.net (192.114.65.1) 372.942 ms bzq-219-189-17.dsl.bezeqint.net (62.219.189.17) 372.883 ms
2561 6 bzq-179-124-85.cust.bezeqint.net (212.179.124.85) 213.671 ms bzq-179-124-153.cust.bezeqint.net (212.179.124.153) 348.092 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237) 464.245 ms
2562 7 ae8.cr1-fra2.ip4.gtt.net (46.33.89.237) 464.164 ms et-0-0-5.cr10-fra2.ip4.gtt.net (89.149.136.117) 464.187 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237) 347.945 ms
2563 8 ip4.gtt.net (46.33.83.254) 464.129 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237) 347.903 ms ip4.gtt.net (46.33.83.254) 464.083 ms
2564 9 et-0-0-5.cr10-fra2.ip4.gtt.net (89.149.136.117) 347.822 ms 347.780 ms et-0-0-71.cr10-fra2.ip4.gtt.net (89.149.180.230) 463.927 ms
256510 ae-14.r24.frnkge08.de.bb.gin.ntt.net (129.250.4.10) 463.936 ms ip4.gtt.net (46.33.83.254) 461.221 ms ae-14.r24.frnkge08.de.bb.gin.ntt.net (129.250.4.10) 461.187 ms
256611 ae-14.r24.frnkge08.de.bb.gin.ntt.net (129.250.4.10) 461.147 ms ae-11.r01.nycmny17.us.bb.gin.ntt.net (129.250.6.97) 461.147 ms *
256712 * * ae-2.r00.nycmny17.us.bb.gin.ntt.net (129.250.3.51) 363.481 ms
256813 ae-2.r00.nycmny17.us.bb.gin.ntt.net (129.250.3.51) 363.534 ms * 363.341 ms
256914 * * ce-0-13-0-2.r01.nycmny17.us.ce.gin.ntt.net (157.238.179.154) 363.243 ms
257015 * teenidols4you.com (45.55.35.220) 363.138 ms 481.279 ms
2571#################################################################################################
2572----- teenidols4you.com -----
2573
2574
2575Host's addresses:
2576__________________
2577
2578teenidols4you.com. 13564 IN A 45.55.35.220
2579
2580
2581Name Servers:
2582______________
2583
2584ns-708.awsdns-24.net. 85640 IN A 205.251.194.196
2585ns-25.awsdns-03.com. 85087 IN A 205.251.192.25
2586ns-1439.awsdns-51.org. 85567 IN A 205.251.197.159
2587ns-1843.awsdns-38.co.uk. 28634 IN A 205.251.199.51
2588
2589
2590Mail (MX) Servers:
2591___________________
2592
2593mail.deadendmail.com. 3389 IN A 50.193.231.57
2594
2595
2596
2597
2598Google Results:
2599________________
2600
2601www.teenidols4you.com. 13113 IN A 45.55.35.220
2602m.teenidols4you.com. 13533 IN A 45.55.35.220
2603cdn.teenidols4you.com. 85078 IN CNAME (
2604teenidols.thegalacticstudio.netdna-cdn.com. 300 IN A 94.31.29.248
2605
2606
2607Brute forcing with /usr/share/dnsenum/dns.txt:
2608_______________________________________________
2609
2610
2611
2612Launching Whois Queries:
2613_________________________
2614
2615 whois ip result: 45.55.35.0 -> 45.55.0.0/16
2616
2617
2618teenidols4you.com_________________
2619
2620 45.55.0.0/16
2621#################################################################################################
2622Source:
2623whois.arin.net
2624IP Address:
262545.55.35.220
2626Name:
2627DIGITALOCEAN-11
2628Handle:
2629NET-45-55-0-0-1
2630Registration Date:
26312/5/15
2632Range:
263345.55.0.0-45.55.255.255
2634Org:
2635DigitalOcean, LLC
2636Org Handle:
2637DO-13
2638Address:
2639101 Ave of the Americas
2640City:
2641New York
2642State/Province:
2643NY
2644Postal Code:
264510013
2646Country:
2647United States
2648Name Servers:
2649##################################################################################################
2650URLCrazy Domain Report
2651Domain : www.teenidols4you.com
2652Keyboard : qwerty
2653At : 2019-12-06 14:26:44 -0500
2654
2655# Please wait. 227 hostnames to process
2656
2657Typo Type Typo DNS-A CC-A DNS-MX Extn
2658--------------------------------------------------------------------------------------------------------
2659Character Omission ww.teenidols4you.com ? com
2660Character Omission www.eenidols4you.com ? com
2661Character Omission www.teeidols4you.com ? com
2662Character Omission www.teendols4you.com ? com
2663Character Omission www.teenidls4you.com ? com
2664Character Omission www.teenidol4you.com ? com
2665Character Omission www.teenidols4ou.com ? com
2666Character Omission www.teenidols4yo.com ? com
2667Character Omission www.teenidols4you.cm ? cm
2668Character Omission www.teenidols4yu.com ? com
2669Character Omission www.teenidolsyou.com ? com
2670Character Omission www.teenidos4you.com ? com
2671Character Omission www.teeniols4you.com ? com
2672Character Omission www.tenidols4you.com ? com
2673Character Omission wwwteenidols4you.com ? com
2674Character Repeat www.teeenidols4you.com ? com
2675Character Repeat www.teeniddols4you.com ? com
2676Character Repeat www.teenidolls4you.com ? com
2677Character Repeat www.teenidols44you.com ? com
2678Character Repeat www.teenidols4yoou.com ? com
2679Character Repeat www.teenidols4youu.com ? com
2680Character Repeat www.teenidols4yyou.com ? com
2681Character Repeat www.teenidolss4you.com ? com
2682Character Repeat www.teenidools4you.com ? com
2683Character Repeat www.teeniidols4you.com ? com
2684Character Repeat www.teennidols4you.com ? com
2685Character Repeat www.tteenidols4you.com ? com
2686Character Repeat wwww.teenidols4you.com ? com
2687Character Swap ww.wteenidols4you.com ? com
2688Character Swap www.etenidols4you.com ? com
2689Character Swap www.teeindols4you.com ? com
2690Character Swap www.teendiols4you.com ? com
2691Character Swap www.teenidlos4you.com ? com
2692Character Swap www.teenidol4syou.com ? com
2693Character Swap www.teenidols4oyu.com ? com
2694Character Swap www.teenidols4yuo.com ? com
2695Character Swap www.teenidolsy4ou.com ? com
2696Character Swap www.teenidosl4you.com ? com
2697Character Swap www.teeniodls4you.com ? com
2698Character Swap www.teneidols4you.com ? com
2699Character Swap wwwt.eenidols4you.com ? com
2700Character Replacement eww.teenidols4you.com ? com
2701Character Replacement qww.teenidols4you.com ? com
2702Character Replacement wew.teenidols4you.com ? com
2703Character Replacement wqw.teenidols4you.com ? com
2704Character Replacement wwe.teenidols4you.com ? com
2705Character Replacement wwq.teenidols4you.com ? com
2706Character Replacement www.reenidols4you.com ? com
2707Character Replacement www.teebidols4you.com ? com
2708Character Replacement www.teemidols4you.com ? com
2709Character Replacement www.teenidils4you.com ? com
2710Character Replacement www.teenidoks4you.com ? com
2711Character Replacement www.teenidola4you.com ? com
2712Character Replacement www.teenidold4you.com ? com
2713Character Replacement www.teenidols3you.com ? com
2714Character Replacement www.teenidols4tou.com ? com
2715Character Replacement www.teenidols4uou.com ? com
2716Character Replacement www.teenidols4yiu.com ? com
2717Character Replacement www.teenidols4yoi.com ? com
2718Character Replacement www.teenidols4yoy.com ? com
2719Character Replacement www.teenidols4ypu.com ? com
2720Character Replacement www.teenidols5you.com ? com
2721Character Replacement www.teenidpls4you.com ? com
2722Character Replacement www.teenifols4you.com ? com
2723Character Replacement www.teenisols4you.com ? com
2724Character Replacement www.teenodols4you.com ? com
2725Character Replacement www.teenudols4you.com ? com
2726Character Replacement www.ternidols4you.com ? com
2727Character Replacement www.tewnidols4you.com ? com
2728Character Replacement www.trenidols4you.com ? com
2729Character Replacement www.twenidols4you.com ? com
2730Character Replacement www.yeenidols4you.com ? com
2731Double Character Replacement eew.teenidols4you.com ? com
2732Double Character Replacement qqw.teenidols4you.com ? com
2733Double Character Replacement wee.teenidols4you.com ? com
2734Double Character Replacement wqq.teenidols4you.com ? com
2735Double Character Replacement www.trrnidols4you.com ? com
2736Double Character Replacement www.twwnidols4you.com ? com
2737Character Insertion weww.teenidols4you.com ? com
2738Character Insertion wqww.teenidols4you.com ? com
2739Character Insertion wwew.teenidols4you.com ? com
2740Character Insertion wwqw.teenidols4you.com ? com
2741Character Insertion www.teenbidols4you.com ? com
2742Character Insertion www.teenidfols4you.com ? com
2743Character Insertion www.teenidoils4you.com ? com
2744Character Insertion www.teenidolks4you.com ? com
2745Character Insertion www.teenidols43you.com ? com
2746Character Insertion www.teenidols45you.com ? com
2747Character Insertion www.teenidols4yoiu.com ? com
2748Character Insertion www.teenidols4yopu.com ? com
2749Character Insertion www.teenidols4youi.com ? com
2750Character Insertion www.teenidols4youy.com ? com
2751Character Insertion www.teenidols4ytou.com ? com
2752Character Insertion www.teenidols4yuou.com ? com
2753Character Insertion www.teenidolsa4you.com ? com
2754Character Insertion www.teenidolsd4you.com ? com
2755Character Insertion www.teenidopls4you.com ? com
2756Character Insertion www.teenidsols4you.com ? com
2757Character Insertion www.teeniodols4you.com ? com
2758Character Insertion www.teeniudols4you.com ? com
2759Character Insertion www.teenmidols4you.com ? com
2760Character Insertion www.teernidols4you.com ? com
2761Character Insertion www.teewnidols4you.com ? com
2762Character Insertion www.terenidols4you.com ? com
2763Character Insertion www.tewenidols4you.com ? com
2764Character Insertion www.treenidols4you.com ? com
2765Character Insertion www.tyeenidols4you.com ? com
2766Character Insertion wwwe.teenidols4you.com ? com
2767Character Insertion wwwq.teenidols4you.com ? com
2768Missing Dot wwwwww.teenidols4you.com ? com
2769Singular or Pluralise teenidols4you.com 45.55.35.220 mail.deadendmail.com com
2770Singular or Pluralise teenidols4yous.com ? com
2771Vowel Swap www.taanidols4you.com ? com
2772Vowel Swap www.teenadols4you.com ? com
2773Vowel Swap www.teenedols4you.com ? com
2774Vowel Swap www.teenidols4yoa.com ? com
2775Vowel Swap www.teenidols4yoe.com ? com
2776Vowel Swap www.teenidols4yoo.com ? com
2777Vowel Swap www.tiinidols4you.com ? com
2778Vowel Swap www.toonidols4you.com ? com
2779Vowel Swap www.tuunidols4you.com ? com
2780Homophones www.teanidols4you.com ? com
2781Homophones www.teenayedols4you.com ? com
2782Homophones www.teeneyedols4you.com ? com
2783Homophones www.teenidewls4you.com ? com
2784Homophones www.teenidles4you.com ? com
2785Homophones www.teenidols4ewe.com ? com
2786Homophones www.teenidols4yew.com ? com
2787Homophones www.teeniduels4you.com ? com
2788Bit Flipping 7ww.teenidols4you.com ? com
2789Bit Flipping gww.teenidols4you.com ? com
2790Bit Flipping sww.teenidols4you.com ? com
2791Bit Flipping uww.teenidols4you.com ? com
2792Bit Flipping vww.teenidols4you.com ? com
2793Bit Flipping w7w.teenidols4you.com ? com
2794Bit Flipping wgw.teenidols4you.com ? com
2795Bit Flipping wsw.teenidols4you.com ? com
2796Bit Flipping wuw.teenidols4you.com ? com
2797Bit Flipping wvw.teenidols4you.com ? com
2798Bit Flipping ww7.teenidols4you.com ? com
2799Bit Flipping wwg.teenidols4you.com ? com
2800Bit Flipping wws.teenidols4you.com ? com
2801Bit Flipping wwu.teenidols4you.com ? com
2802Bit Flipping wwv.teenidols4you.com ? com
2803Bit Flipping www.4eenidols4you.com ? com
2804Bit Flipping www.deenidols4you.com ? com
2805Bit Flipping www.peenidols4you.com ? com
2806Bit Flipping www.taenidols4you.com ? com
2807Bit Flipping www.tdenidols4you.com ? com
2808Bit Flipping www.tednidols4you.com ? com
2809Bit Flipping www.tee.idols4you.com ? com
2810Bit Flipping www.teefidols4you.com ? com
2811Bit Flipping www.teejidols4you.com ? com
2812Bit Flipping www.teelidols4you.com ? com
2813Bit Flipping www.teenhdols4you.com ? com
2814Bit Flipping www.teenidgls4you.com ? com
2815Bit Flipping www.teenidkls4you.com ? com
2816Bit Flipping www.teenidmls4you.com ? com
2817Bit Flipping www.teenidnls4you.com ? com
2818Bit Flipping www.teenidods4you.com ? com
2819Bit Flipping www.teenidohs4you.com ? com
2820Bit Flipping www.teenidol34you.com ? com
2821Bit Flipping www.teenidolc4you.com ? com
2822Bit Flipping www.teenidolq4you.com ? com
2823Bit Flipping www.teenidolr4you.com ? com
2824Bit Flipping www.teenidols0you.com ? com
2825Bit Flipping www.teenidols49ou.com ? com
2826Bit Flipping www.teenidols4iou.com ? com
2827Bit Flipping www.teenidols4qou.com ? com
2828Bit Flipping www.teenidols4xou.com ? com
2829Bit Flipping www.teenidols4ygu.com ? com
2830Bit Flipping www.teenidols4yku.com ? com
2831Bit Flipping www.teenidols4ymu.com ? com
2832Bit Flipping www.teenidols4ynu.com ? com
2833Bit Flipping www.teenidols4yo5.com ? com
2834Bit Flipping www.teenidols4yoq.com ? com
2835Bit Flipping www.teenidols4yot.com ? com
2836Bit Flipping www.teenidols4yow.com ? com
2837Bit Flipping www.teenidols6you.com ? com
2838Bit Flipping www.teenidolstyou.com ? com
2839Bit Flipping www.teenidolw4you.com ? com
2840Bit Flipping www.teenidoms4you.com ? com
2841Bit Flipping www.teenidons4you.com ? com
2842Bit Flipping www.teenieols4you.com ? com
2843Bit Flipping www.teenilols4you.com ? com
2844Bit Flipping www.teenitols4you.com ? com
2845Bit Flipping www.teenkdols4you.com ? com
2846Bit Flipping www.teenmdols4you.com ? com
2847Bit Flipping www.teenydols4you.com ? com
2848Bit Flipping www.teeoidols4you.com ? com
2849Bit Flipping www.tegnidols4you.com ? com
2850Bit Flipping www.temnidols4you.com ? com
2851Bit Flipping www.teunidols4you.com ? com
2852Bit Flipping www.tgenidols4you.com ? com
2853Bit Flipping www.tmenidols4you.com ? com
2854Bit Flipping www.tuenidols4you.com ? com
2855Bit Flipping www.ueenidols4you.com ? com
2856Bit Flipping www.veenidols4you.com ? com
2857Bit Flipping wwwnteenidols4you.com ? com
2858Homoglyphs vvvvvv.teenidols4you.com ? com
2859Homoglyphs vvvvw.teenidols4you.com ? com
2860Homoglyphs vvwvv.teenidols4you.com ? com
2861Homoglyphs vvww.teenidols4you.com ? com
2862Homoglyphs wvvvv.teenidols4you.com ? com
2863Homoglyphs wvvw.teenidols4you.com ? com
2864Homoglyphs wwvv.teenidols4you.com ? com
2865Homoglyphs www.teeniclols4you.com ? com
2866Homoglyphs www.teenid0ls4y0u.com ? com
2867Homoglyphs www.teenid0ls4you.com ? com
2868Homoglyphs www.teenido1s4you.com ? com
2869Homoglyphs www.teenidols4y0u.com ? com
2870Homoglyphs www.teenldols4you.com ? com
2871Wrong TLD teenidols4you.ca ? ca
2872Wrong TLD teenidols4you.ch ? ch
2873Wrong TLD teenidols4you.de ? de
2874Wrong TLD teenidols4you.edu ? edu
2875Wrong TLD teenidols4you.es ? es
2876Wrong TLD teenidols4you.fr ? fr
2877Wrong TLD teenidols4you.it ? it
2878Wrong TLD teenidols4you.jp ? jp
2879Wrong TLD teenidols4you.net ? net
2880Wrong TLD teenidols4you.nl ? nl
2881Wrong TLD teenidols4you.no ? no
2882Wrong TLD teenidols4you.org ? org
2883Wrong TLD teenidols4you.ru ? ru
2884Wrong TLD teenidols4you.se ? se
2885Wrong TLD teenidols4you.us ? us
2886#################################################################################################
2887[*] Processing domain www.teenidols4you.com
2888[*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
2889[+] Getting nameservers
2890[-] Getting nameservers failed
2891[-] Zone transfer failed
2892
2893[*] Scanning www.teenidols4you.com for A records
289445.55.35.220 - www.teenidols4you.com
2895#################################################################################################
2896Privileges have been dropped to "nobody:nogroup" for security reasons.
2897
2898Processed queries: 0
2899Received packets: 0
2900Progress: 0.00% (00 h 00 min 00 sec / 00 h 00 min 00 sec)
2901Current incoming rate: 0 pps, average: 0 pps
2902Current success rate: 0 pps, average: 0 pps
2903Finished total: 0, success: 0 (0.00%)
2904Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
2905Failures: 0: 0.00%, 1: 0.00%, 2: 0.00%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2906Response: | Success: | Total:
2907OK: | 0 ( 0.00%) | 0 ( 0.00%)
2908NXDOMAIN: | 0 ( 0.00%) | 0 ( 0.00%)
2909SERVFAIL: | 0 ( 0.00%) | 0 ( 0.00%)
2910REFUSED: | 0 ( 0.00%) | 0 ( 0.00%)
2911FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2912
2913
2914
2915Processed queries: 1919
2916Received packets: 1842
2917Progress: 100.00% (00 h 00 min 01 sec / 00 h 00 min 01 sec)
2918Current incoming rate: 1840 pps, average: 1840 pps
2919Current success rate: 1186 pps, average: 1186 pps
2920Finished total: 1187, success: 1187 (100.00%)
2921Mismatched domains: 181 (9.89%), IDs: 0 (0.00%)
2922Failures: 0: 27.63%, 1: 101.18%, 2: 30.33%, 3: 2.53%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2923Response: | Success: | Total:
2924OK: | 111 ( 9.35%) | 124 ( 6.78%)
2925NXDOMAIN: | 1056 ( 88.96%) | 1174 ( 64.15%)
2926SERVFAIL: | 20 ( 1.68%) | 25 ( 1.37%)
2927REFUSED: | 0 ( 0.00%) | 507 ( 27.70%)
2928FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2929
2930
2931
2932Processed queries: 1919
2933Received packets: 2325
2934Progress: 100.00% (00 h 00 min 02 sec / 00 h 00 min 02 sec)
2935Current incoming rate: 482 pps, average: 1160 pps
2936Current success rate: 219 pps, average: 702 pps
2937Finished total: 1407, success: 1407 (100.00%)
2938Mismatched domains: 354 (15.32%), IDs: 0 (0.00%)
2939Failures: 0: 23.31%, 1: 57.00%, 2: 17.70%, 3: 21.75%, 4: 14.85%, 5: 1.71%, 6: 0.07%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2940Response: | Success: | Total:
2941OK: | 132 ( 9.38%) | 151 ( 6.54%)
2942NXDOMAIN: | 1251 ( 88.91%) | 1477 ( 63.94%)
2943SERVFAIL: | 24 ( 1.71%) | 29 ( 1.26%)
2944REFUSED: | 0 ( 0.00%) | 652 ( 28.23%)
2945FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2946
2947
2948
2949Processed queries: 1919
2950Received packets: 2325
2951Progress: 100.00% (00 h 00 min 03 sec / 00 h 00 min 03 sec)
2952Current incoming rate: 0 pps, average: 773 pps
2953Current success rate: 0 pps, average: 468 pps
2954Finished total: 1407, success: 1407 (100.00%)
2955Mismatched domains: 354 (15.32%), IDs: 0 (0.00%)
2956Failures: 0: 23.31%, 1: 57.00%, 2: 17.70%, 3: 1.99%, 4: 0.00%, 5: 19.90%, 6: 14.78%, 7: 1.63%, 8: 0.07%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2957Response: | Success: | Total:
2958OK: | 132 ( 9.38%) | 151 ( 6.54%)
2959NXDOMAIN: | 1251 ( 88.91%) | 1477 ( 63.94%)
2960SERVFAIL: | 24 ( 1.71%) | 29 ( 1.26%)
2961REFUSED: | 0 ( 0.00%) | 652 ( 28.23%)
2962FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2963
2964
2965
2966Processed queries: 1919
2967Received packets: 4412
2968Progress: 100.00% (00 h 00 min 04 sec / 00 h 00 min 04 sec)
2969Current incoming rate: 2082 pps, average: 1101 pps
2970Current success rate: 498 pps, average: 475 pps
2971Finished total: 1906, success: 1906 (100.00%)
2972Mismatched domains: 1744 (39.81%), IDs: 0 (0.00%)
2973Failures: 0: 17.21%, 1: 42.08%, 2: 13.06%, 3: 1.47%, 4: 0.00%, 5: 0.00%, 6: 9.65%, 7: 11.02%, 8: 4.35%, 9: 1.42%, 10: 0.31%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2974Response: | Success: | Total:
2975OK: | 166 ( 8.71%) | 272 ( 6.21%)
2976NXDOMAIN: | 1709 ( 89.66%) | 2847 ( 64.99%)
2977SERVFAIL: | 31 ( 1.63%) | 53 ( 1.21%)
2978REFUSED: | 0 ( 0.00%) | 1208 ( 27.57%)
2979FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2980
2981
2982
2983Processed queries: 1919
2984Received packets: 4536
2985Progress: 100.00% (00 h 00 min 05 sec / 00 h 00 min 05 sec)
2986Current incoming rate: 123 pps, average: 905 pps
2987Current success rate: 10 pps, average: 382 pps
2988Finished total: 1917, success: 1917 (100.00%)
2989Mismatched domains: 1856 (41.20%), IDs: 0 (0.00%)
2990Failures: 0: 17.11%, 1: 41.84%, 2: 12.99%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.60%, 7: 10.80%, 8: 4.38%, 9: 1.36%, 10: 0.47%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2991Response: | Success: | Total:
2992OK: | 169 ( 8.82%) | 278 ( 6.17%)
2993NXDOMAIN: | 1717 ( 89.57%) | 2951 ( 65.50%)
2994SERVFAIL: | 31 ( 1.62%) | 54 ( 1.20%)
2995REFUSED: | 0 ( 0.00%) | 1220 ( 27.08%)
2996FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2997
2998
2999
3000Processed queries: 1919
3001Received packets: 4556
3002Progress: 100.00% (00 h 00 min 06 sec / 00 h 00 min 06 sec)
3003Current incoming rate: 19 pps, average: 757 pps
3004Current success rate: 0 pps, average: 319 pps
3005Finished total: 1918, success: 1918 (100.00%)
3006Mismatched domains: 1874 (41.41%), IDs: 0 (0.00%)
3007Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.16%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3008Response: | Success: | Total:
3009OK: | 169 ( 8.81%) | 278 ( 6.14%)
3010NXDOMAIN: | 1718 ( 89.57%) | 2968 ( 65.59%)
3011SERVFAIL: | 31 ( 1.62%) | 54 ( 1.19%)
3012REFUSED: | 0 ( 0.00%) | 1223 ( 27.03%)
3013FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3014
3015
3016
3017Processed queries: 1919
3018Received packets: 4562
3019Progress: 100.00% (00 h 00 min 07 sec / 00 h 00 min 07 sec)
3020Current incoming rate: 5 pps, average: 650 pps
3021Current success rate: 0 pps, average: 273 pps
3022Finished total: 1918, success: 1918 (100.00%)
3023Mismatched domains: 1880 (41.49%), IDs: 0 (0.00%)
3024Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.05%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3025Response: | Success: | Total:
3026OK: | 169 ( 8.81%) | 279 ( 6.16%)
3027NXDOMAIN: | 1718 ( 89.57%) | 2972 ( 65.59%)
3028SERVFAIL: | 31 ( 1.62%) | 54 ( 1.19%)
3029REFUSED: | 0 ( 0.00%) | 1223 ( 26.99%)
3030FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3031
3032
3033
3034Processed queries: 1919
3035Received packets: 4566
3036Progress: 100.00% (00 h 00 min 08 sec / 00 h 00 min 08 sec)
3037Current incoming rate: 3 pps, average: 569 pps
3038Current success rate: 0 pps, average: 239 pps
3039Finished total: 1918, success: 1918 (100.00%)
3040Mismatched domains: 1884 (41.54%), IDs: 0 (0.00%)
3041Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.05%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3042Response: | Success: | Total:
3043OK: | 169 ( 8.81%) | 279 ( 6.15%)
3044NXDOMAIN: | 1718 ( 89.57%) | 2975 ( 65.60%)
3045SERVFAIL: | 31 ( 1.62%) | 54 ( 1.19%)
3046REFUSED: | 0 ( 0.00%) | 1224 ( 26.99%)
3047FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3048
3049
3050
3051Processed queries: 1919
3052Received packets: 4568
3053Progress: 100.00% (00 h 00 min 09 sec / 00 h 00 min 09 sec)
3054Current incoming rate: 1 pps, average: 506 pps
3055Current success rate: 0 pps, average: 212 pps
3056Finished total: 1918, success: 1918 (100.00%)
3057Mismatched domains: 1886 (41.57%), IDs: 0 (0.00%)
3058Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3059Response: | Success: | Total:
3060OK: | 169 ( 8.81%) | 279 ( 6.15%)
3061NXDOMAIN: | 1718 ( 89.57%) | 2975 ( 65.57%)
3062SERVFAIL: | 31 ( 1.62%) | 54 ( 1.19%)
3063REFUSED: | 0 ( 0.00%) | 1226 ( 27.02%)
3064FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3065
3066
3067
3068Processed queries: 1919
3069Received packets: 4573
3070Progress: 100.00% (00 h 00 min 10 sec / 00 h 00 min 10 sec)
3071Current incoming rate: 4 pps, average: 456 pps
3072Current success rate: 0 pps, average: 191 pps
3073Finished total: 1918, success: 1918 (100.00%)
3074Mismatched domains: 1891 (41.63%), IDs: 0 (0.00%)
3075Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.05%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3076Response: | Success: | Total:
3077OK: | 169 ( 8.81%) | 280 ( 6.16%)
3078NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.57%)
3079SERVFAIL: | 31 ( 1.62%) | 55 ( 1.21%)
3080REFUSED: | 0 ( 0.00%) | 1226 ( 26.99%)
3081FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3082
3083
3084
3085Processed queries: 1919
3086Received packets: 4578
3087Progress: 100.00% (00 h 00 min 11 sec / 00 h 00 min 11 sec)
3088Current incoming rate: 4 pps, average: 415 pps
3089Current success rate: 0 pps, average: 174 pps
3090Finished total: 1918, success: 1918 (100.00%)
3091Mismatched domains: 1896 (41.70%), IDs: 0 (0.00%)
3092Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.05%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3093Response: | Success: | Total:
3094OK: | 169 ( 8.81%) | 280 ( 6.16%)
3095NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.49%)
3096SERVFAIL: | 31 ( 1.62%) | 59 ( 1.30%)
3097REFUSED: | 0 ( 0.00%) | 1226 ( 26.96%)
3098FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3099
3100
3101
3102Processed queries: 1919
3103Received packets: 4580
3104Progress: 100.00% (00 h 00 min 12 sec / 00 h 00 min 12 sec)
3105Current incoming rate: 1 pps, average: 380 pps
3106Current success rate: 0 pps, average: 159 pps
3107Finished total: 1918, success: 1918 (100.00%)
3108Mismatched domains: 1898 (41.72%), IDs: 0 (0.00%)
3109Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.05%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3110Response: | Success: | Total:
3111OK: | 169 ( 8.81%) | 280 ( 6.16%)
3112NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.46%)
3113SERVFAIL: | 31 ( 1.62%) | 59 ( 1.30%)
3114REFUSED: | 0 ( 0.00%) | 1228 ( 26.99%)
3115FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3116
3117
3118
3119Processed queries: 1919
3120Received packets: 4582
3121Progress: 100.00% (00 h 00 min 13 sec / 00 h 00 min 13 sec)
3122Current incoming rate: 1 pps, average: 351 pps
3123Current success rate: 0 pps, average: 147 pps
3124Finished total: 1918, success: 1918 (100.00%)
3125Mismatched domains: 1900 (41.75%), IDs: 0 (0.00%)
3126Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.05%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3127Response: | Success: | Total:
3128OK: | 169 ( 8.81%) | 280 ( 6.15%)
3129NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.44%)
3130SERVFAIL: | 31 ( 1.62%) | 60 ( 1.32%)
3131REFUSED: | 0 ( 0.00%) | 1229 ( 27.01%)
3132FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3133
3134
3135
3136Processed queries: 1919
3137Received packets: 4588
3138Progress: 100.00% (00 h 00 min 14 sec / 00 h 00 min 14 sec)
3139Current incoming rate: 5 pps, average: 327 pps
3140Current success rate: 0 pps, average: 136 pps
3141Finished total: 1918, success: 1918 (100.00%)
3142Mismatched domains: 1906 (41.83%), IDs: 0 (0.00%)
3143Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.05%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3144Response: | Success: | Total:
3145OK: | 169 ( 8.81%) | 280 ( 6.14%)
3146NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.35%)
3147SERVFAIL: | 31 ( 1.62%) | 65 ( 1.43%)
3148REFUSED: | 0 ( 0.00%) | 1230 ( 26.99%)
3149FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3150
3151
3152
3153Processed queries: 1919
3154Received packets: 4589
3155Progress: 100.00% (00 h 00 min 15 sec / 00 h 00 min 15 sec)
3156Current incoming rate: 0 pps, average: 305 pps
3157Current success rate: 0 pps, average: 127 pps
3158Finished total: 1918, success: 1918 (100.00%)
3159Mismatched domains: 1907 (41.84%), IDs: 0 (0.00%)
3160Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.05%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3161Response: | Success: | Total:
3162OK: | 169 ( 8.81%) | 280 ( 6.14%)
3163NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.34%)
3164SERVFAIL: | 31 ( 1.62%) | 65 ( 1.43%)
3165REFUSED: | 0 ( 0.00%) | 1231 ( 27.01%)
3166FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3167
3168
3169
3170Processed queries: 1919
3171Received packets: 4591
3172Progress: 100.00% (00 h 00 min 16 sec / 00 h 00 min 16 sec)
3173Current incoming rate: 1 pps, average: 286 pps
3174Current success rate: 0 pps, average: 119 pps
3175Finished total: 1918, success: 1918 (100.00%)
3176Mismatched domains: 1909 (41.86%), IDs: 0 (0.00%)
3177Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.05%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3178Response: | Success: | Total:
3179OK: | 169 ( 8.81%) | 280 ( 6.14%)
3180NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.31%)
3181SERVFAIL: | 31 ( 1.62%) | 65 ( 1.43%)
3182REFUSED: | 0 ( 0.00%) | 1233 ( 27.04%)
3183FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
3184
3185
3186
3187Processed queries: 1919
3188Received packets: 4593
3189Progress: 100.00% (00 h 00 min 17 sec / 00 h 00 min 17 sec)
3190Current incoming rate: 1 pps, average: 269 pps
3191Current success rate: 0 pps, average: 112 pps
3192Finished total: 1918, success: 1918 (100.00%)
3193Mismatched domains: 1911 (41.89%), IDs: 0 (0.00%)
3194Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.05%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3195Response: | Success: | Total:
3196OK: | 169 ( 8.81%) | 280 ( 6.14%)
3197NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.28%)
3198SERVFAIL: | 31 ( 1.62%) | 65 ( 1.42%)
3199REFUSED: | 0 ( 0.00%) | 1233 ( 27.03%)
3200FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3201
3202
3203
3204Processed queries: 1919
3205Received packets: 4594
3206Progress: 100.00% (00 h 00 min 18 sec / 00 h 00 min 18 sec)
3207Current incoming rate: 0 pps, average: 254 pps
3208Current success rate: 0 pps, average: 106 pps
3209Finished total: 1918, success: 1918 (100.00%)
3210Mismatched domains: 1912 (41.90%), IDs: 0 (0.00%)
3211Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.05%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3212Response: | Success: | Total:
3213OK: | 169 ( 8.81%) | 280 ( 6.14%)
3214NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.26%)
3215SERVFAIL: | 31 ( 1.62%) | 65 ( 1.42%)
3216REFUSED: | 0 ( 0.00%) | 1234 ( 27.04%)
3217FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3218
3219
3220
3221Processed queries: 1919
3222Received packets: 4595
3223Progress: 100.00% (00 h 00 min 19 sec / 00 h 00 min 19 sec)
3224Current incoming rate: 0 pps, average: 241 pps
3225Current success rate: 0 pps, average: 100 pps
3226Finished total: 1918, success: 1918 (100.00%)
3227Mismatched domains: 1913 (41.91%), IDs: 0 (0.00%)
3228Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.05%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3229Response: | Success: | Total:
3230OK: | 169 ( 8.81%) | 280 ( 6.13%)
3231NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.25%)
3232SERVFAIL: | 31 ( 1.62%) | 65 ( 1.42%)
3233REFUSED: | 0 ( 0.00%) | 1235 ( 27.06%)
3234FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3235
3236
3237
3238Processed queries: 1919
3239Received packets: 4600
3240Progress: 100.00% (00 h 00 min 20 sec / 00 h 00 min 20 sec)
3241Current incoming rate: 4 pps, average: 229 pps
3242Current success rate: 0 pps, average: 95 pps
3243Finished total: 1918, success: 1918 (100.00%)
3244Mismatched domains: 1918 (41.98%), IDs: 0 (0.00%)
3245Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.05%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3246Response: | Success: | Total:
3247OK: | 169 ( 8.81%) | 280 ( 6.13%)
3248NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.18%)
3249SERVFAIL: | 31 ( 1.62%) | 68 ( 1.49%)
3250REFUSED: | 0 ( 0.00%) | 1237 ( 27.07%)
3251FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3252
3253
3254
3255Processed queries: 1919
3256Received packets: 4600
3257Progress: 100.00% (00 h 00 min 21 sec / 00 h 00 min 21 sec)
3258Current incoming rate: 0 pps, average: 218 pps
3259Current success rate: 0 pps, average: 91 pps
3260Finished total: 1918, success: 1918 (100.00%)
3261Mismatched domains: 1918 (41.98%), IDs: 0 (0.00%)
3262Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.05%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3263Response: | Success: | Total:
3264OK: | 169 ( 8.81%) | 280 ( 6.13%)
3265NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.18%)
3266SERVFAIL: | 31 ( 1.62%) | 68 ( 1.49%)
3267REFUSED: | 0 ( 0.00%) | 1237 ( 27.07%)
3268FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3269
3270
3271
3272Processed queries: 1919
3273Received packets: 4602
3274Progress: 100.00% (00 h 00 min 22 sec / 00 h 00 min 22 sec)
3275Current incoming rate: 1 pps, average: 208 pps
3276Current success rate: 0 pps, average: 87 pps
3277Finished total: 1918, success: 1918 (100.00%)
3278Mismatched domains: 1920 (42.00%), IDs: 0 (0.00%)
3279Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.05%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3280Response: | Success: | Total:
3281OK: | 169 ( 8.81%) | 280 ( 6.13%)
3282NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.15%)
3283SERVFAIL: | 31 ( 1.62%) | 70 ( 1.53%)
3284REFUSED: | 0 ( 0.00%) | 1237 ( 27.06%)
3285FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3286
3287
3288
3289Processed queries: 1919
3290Received packets: 4605
3291Progress: 100.00% (00 h 00 min 23 sec / 00 h 00 min 23 sec)
3292Current incoming rate: 2 pps, average: 199 pps
3293Current success rate: 0 pps, average: 83 pps
3294Finished total: 1918, success: 1918 (100.00%)
3295Mismatched domains: 1923 (42.04%), IDs: 0 (0.00%)
3296Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.05%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3297Response: | Success: | Total:
3298OK: | 169 ( 8.81%) | 280 ( 6.12%)
3299NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.11%)
3300SERVFAIL: | 31 ( 1.62%) | 71 ( 1.55%)
3301REFUSED: | 0 ( 0.00%) | 1239 ( 27.09%)
3302FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3303
3304
3305
3306Processed queries: 1919
3307Received packets: 4606
3308Progress: 100.00% (00 h 00 min 24 sec / 00 h 00 min 24 sec)
3309Current incoming rate: 0 pps, average: 191 pps
3310Current success rate: 0 pps, average: 79 pps
3311Finished total: 1918, success: 1918 (100.00%)
3312Mismatched domains: 1924 (42.05%), IDs: 0 (0.00%)
3313Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.05%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
3314Response: | Success: | Total:
3315OK: | 169 ( 8.81%) | 280 ( 6.12%)
3316NXDOMAIN: | 1718 ( 89.57%) | 2978 ( 65.09%)
3317SERVFAIL: | 31 ( 1.62%) | 71 ( 1.55%)
3318REFUSED: | 0 ( 0.00%) | 1240 ( 27.10%)
3319FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3320
3321
3322
3323Processed queries: 1919
3324Received packets: 4610
3325Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
3326Current incoming rate: 3 pps, average: 184 pps
3327Current success rate: 0 pps, average: 76 pps
3328Finished total: 1918, success: 1918 (100.00%)
3329Mismatched domains: 1928 (42.11%), IDs: 0 (0.00%)
3330Failures: 0: 17.10%, 1: 41.81%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.05%, 50: 0.00%,
3331Response: | Success: | Total:
3332OK: | 169 ( 8.81%) | 280 ( 6.11%)
3333NXDOMAIN: | 1718 ( 89.57%) | 2979 ( 65.06%)
3334SERVFAIL: | 31 ( 1.62%) | 72 ( 1.57%)
3335REFUSED: | 0 ( 0.00%) | 1242 ( 27.12%)
3336FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3337
3338
3339
3340Processed queries: 1919
3341Received packets: 4610
3342Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
3343Current incoming rate: 0 pps, average: 183 pps
3344Current success rate: 0 pps, average: 76 pps
3345Finished total: 1919, success: 1918 (99.95%)
3346Mismatched domains: 1928 (42.11%), IDs: 0 (0.00%)
3347Failures: 0: 17.09%, 1: 41.79%, 2: 12.98%, 3: 1.46%, 4: 0.00%, 5: 0.00%, 6: 9.59%, 7: 10.79%, 8: 4.38%, 9: 1.30%, 10: 0.42%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.05%,
3348Response: | Success: | Total:
3349OK: | 169 ( 8.81%) | 280 ( 6.11%)
3350NXDOMAIN: | 1718 ( 89.57%) | 2979 ( 65.06%)
3351SERVFAIL: | 31 ( 1.62%) | 72 ( 1.57%)
3352REFUSED: | 0 ( 0.00%) | 1242 ( 27.12%)
3353FORMERR: | 0 ( 0.00%) | 1 ( 0.02%)
3354#################################################################################################
3355[+] www.teenidols4you.com has no SPF record!
3356[*] No DMARC record found. Looking for organizational record
3357[+] No organizational DMARC record
3358[+] Spoofing possible for www.teenidols4you.com!
3359#################################################################################################
3360teenidols4you.com. 3600 IN SOA ns-1843.awsdns-38.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
3361dig: '.www.teenidols4you.com' is not a legal name (empty label)
3362teenidols4you.com. 3600 IN SOA ns-1843.awsdns-38.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
3363################################################################################################
3364WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
3365Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-06 14:32 EST
3366Nmap scan report for www.teenidols4you.com (45.55.35.220)
3367Host is up (0.11s latency).
3368rDNS record for 45.55.35.220: teenidols4you.com
3369Not shown: 493 closed ports, 1 filtered port
3370Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
3371PORT STATE SERVICE
337280/tcp open http
33733306/tcp open mysql
3374
3375Nmap done: 1 IP address (1 host up) scanned in 2.14 seconds
3376#################################################################################################
3377Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-06 14:32 EST
3378Nmap scan report for www.teenidols4you.com (45.55.35.220)
3379Host is up (0.12s latency).
3380rDNS record for 45.55.35.220: teenidols4you.com
3381Not shown: 10 closed ports, 2 filtered ports
3382PORT STATE SERVICE
3383123/udp open ntp
3384500/udp open|filtered isakmp
33852049/udp open|filtered nfs
3386
3387Nmap done: 1 IP address (1 host up) scanned in 7.40 seconds
3388#################################################################################################
3389HTTP/1.1 200 OK
3390Date: Fri, 06 Dec 2019 19:33:02 GMT
3391Server: Apache/2.2.15 (CentOS)
3392Cache-Control: max-age=0, no-cache
3393Vary: Accept-Encoding
3394Content-Type: text/html; charset=utf-8
3395#################################################################################################
3396/actor.html
3397/birthdays.php
3398/gallery/1148/nicpuehse.html
3399/gallery/1149/tristanpuehse.html
3400/gallery/2262/stefaniescott.html
3401/gallery/2383/ryanwynott.html
3402/gallery/2677/jack-griffo.html
3403/gallery/3136/tanner-buchanan.html
3404/gallery/3183/jacob-tremblay.html
3405/gallery/3460/alex-ruygrok.html
3406/gallery/3548/jack-mcgraw.html
3407/gallery/3587/tivodar-danil.html
3408/gallery/3659/lucas-royalty.html
3409/gallery/3718/ryker-baloun.html
3410/gallery/3749/dylan-hartman.html
3411/gallery/3750/luke-roessler.html
3412/gallery/3751/jentzen-ramirez.html
3413/gallery/3752/liam-mcgill.html
3414/gallery/3753/benjamin-wadsworth.html
3415/gallery/3754/nickolas-wolf.html
3416http://www.teenidols4you.com/search.html
3417/news/enews1168.html
3418/news.html
3419/picture.html?g=Actors&pe=jentzen-ramirez&foto=554&act=3751&mv=4&pic=910654
3420/picture.html?g=Actors&pe=london-cheshire&foto=554&act=3721&mv=4&pic=910653
3421/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910644
3422/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910645
3423/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910646
3424/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
3425/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910652
3426/picture.html?g=Actors&pe=ryker-baloun&foto=554&act=3718&mv=4&pic=910643
3427/picture.html?g=Actors&pe=tyler-crumley&foto=554&act=3737&mv=4&pic=910650
3428/picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910647
3429/picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910648
3430/picture.html?g=Actors&pe=walker-bryant&foto=554&act=3724&mv=4&pic=910649
3431/shows/a.html
3432/Singers.html
3433text/javascript
3434/top50/today
3435/updates.html
3436/uploaded.html
3437/videos/
3438/videos/page.php?p=1
3439-//W3C//DTD HTML 4.01 Transitional//EN
3440################################################################################################
3441http://www.teenidols4you.com [200 OK] Apache[2.2.15], Cookies[PHPSESSID], Country[RESERVED][ZZ], Google-API[Dynamic], Google-Analytics[Universal][UA-1056114-1], HTTPServer[CentOS][Apache/2.2.15 (CentOS)], IP[45.55.35.220], PHP[5.6.40], Script[text/javascript], Title[Teen Idols 4 You : Teen Entertainment News and Picture Galleries], UncommonHeaders[x-mod-pagespeed], X-Powered-By[PHP/5.6.40]
3442#################################################################################################
3443
3444wig - WebApp Information Gatherer
3445
3446
3447Scanning http://www.teenidols4you.com...
3448_____________________ SITE INFO _____________________
3449IP Title
345045.55.35.220 Teen Idols 4 You : Teen Entertainme
3451
3452______________________ VERSION ______________________
3453Name Versions Type
3454Apache 2.2.15 Platform
3455PHP 5.6.40 Platform
3456CentOS 6.6 | 6.8 OS
3457
3458____________________ INTERESTING ____________________
3459URL Note Type
3460/robots.txt robots.txt index Interesting
3461
3462_____________________________________________________
3463Time: 46.5 sec Urls: 828 Fingerprints: 40401
3464################################################################################################
3465Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-06 14:34 EST
3466NSE: Loaded 163 scripts for scanning.
3467NSE: Script Pre-scanning.
3468Initiating NSE at 14:34
3469Completed NSE at 14:34, 0.00s elapsed
3470Initiating NSE at 14:34
3471Completed NSE at 14:34, 0.00s elapsed
3472Initiating Parallel DNS resolution of 1 host. at 14:34
3473Completed Parallel DNS resolution of 1 host. at 14:34, 0.02s elapsed
3474Initiating SYN Stealth Scan at 14:34
3475Scanning www.teenidols4you.com (45.55.35.220) [1 port]
3476Discovered open port 80/tcp on 45.55.35.220
3477Completed SYN Stealth Scan at 14:34, 0.09s elapsed (1 total ports)
3478Initiating Service scan at 14:34
3479Scanning 1 service on www.teenidols4you.com (45.55.35.220)
3480Completed Service scan at 14:34, 6.15s elapsed (1 service on 1 host)
3481Initiating OS detection (try #1) against www.teenidols4you.com (45.55.35.220)
3482Initiating Traceroute at 14:34
3483Completed Traceroute at 14:34, 3.17s elapsed
3484Initiating Parallel DNS resolution of 12 hosts. at 14:34
3485Completed Parallel DNS resolution of 12 hosts. at 14:34, 0.90s elapsed
3486NSE: Script scanning 45.55.35.220.
3487Initiating NSE at 14:34
3488NSE: [http-wordpress-enum 45.55.35.220:80] got no answers from pipelined queries
3489Completed NSE at 14:48, 860.56s elapsed
3490Initiating NSE at 14:48
3491Completed NSE at 14:48, 0.43s elapsed
3492Nmap scan report for www.teenidols4you.com (45.55.35.220)
3493Host is up (0.064s latency).
3494rDNS record for 45.55.35.220: teenidols4you.com
3495
3496PORT STATE SERVICE VERSION
349780/tcp open http Apache httpd 2.2.15 ((CentOS))
3498| http-backup-finder:
3499| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=www.teenidols4you.com
3500| http://www.teenidols4you.com:80/gallery/3281/jt-church.html~
3501| http://www.teenidols4you.com:80/gallery/3281/jt-church.html.1
3502| http://www.teenidols4you.com:80/gallery/3281/jt-church.html.~1~
3503| http://www.teenidols4you.com:80/gallery/2262/stefaniescott.html~
3504| http://www.teenidols4you.com:80/gallery/2262/stefaniescott.html.1
3505| http://www.teenidols4you.com:80/gallery/2262/stefaniescott.html.~1~
3506| http://www.teenidols4you.com:80/gallery/3526/corbyn-besson.html~
3507| http://www.teenidols4you.com:80/gallery/3526/corbyn-besson.html.1
3508| http://www.teenidols4you.com:80/gallery/3526/corbyn-besson.html.~1~
3509| http://www.teenidols4you.com:80/picture/3091/4/carson-lueders.html~
3510| http://www.teenidols4you.com:80/picture/3091/4/carson-lueders copy.html
3511| http://www.teenidols4you.com:80/picture/3091/4/Copy of carson-lueders.html
3512| http://www.teenidols4you.com:80/picture/3091/4/Copy (2) of carson-lueders.html
3513| http://www.teenidols4you.com:80/picture/3091/4/carson-lueders.html.1
3514| http://www.teenidols4you.com:80/picture/3091/4/carson-lueders.html.~1~
3515| http://www.teenidols4you.com:80/picture/3616/4/melvin-mellbolm.html~
3516| http://www.teenidols4you.com:80/picture/3616/4/melvin-mellbolm copy.html
3517| http://www.teenidols4you.com:80/picture/3616/4/Copy of melvin-mellbolm.html
3518| http://www.teenidols4you.com:80/picture/3616/4/Copy (2) of melvin-mellbolm.html
3519| http://www.teenidols4you.com:80/picture/3616/4/melvin-mellbolm.html.1
3520| http://www.teenidols4you.com:80/picture/3616/4/melvin-mellbolm.html.~1~
3521| http://www.teenidols4you.com:80/picture/3065/4/hayden-summerall.html~
3522| http://www.teenidols4you.com:80/picture/3065/4/hayden-summerall copy.html
3523| http://www.teenidols4you.com:80/picture/3065/4/Copy of hayden-summerall.html
3524| http://www.teenidols4you.com:80/picture/3065/4/Copy (2) of hayden-summerall.html
3525| http://www.teenidols4you.com:80/picture/3065/4/hayden-summerall.html.1
3526| http://www.teenidols4you.com:80/picture/3065/4/hayden-summerall.html.~1~
3527| http://www.teenidols4you.com:80/gallery/3238/jet-jurgensmeyer.html~
3528| http://www.teenidols4you.com:80/gallery/3238/jet-jurgensmeyer.html.1
3529| http://www.teenidols4you.com:80/gallery/3238/jet-jurgensmeyer.html.~1~
3530| http://www.teenidols4you.com:80/picture/3281/4/jt-church.html~
3531| http://www.teenidols4you.com:80/picture/3281/4/jt-church copy.html
3532| http://www.teenidols4you.com:80/picture/3281/4/Copy of jt-church.html
3533| http://www.teenidols4you.com:80/picture/3281/4/Copy (2) of jt-church.html
3534| http://www.teenidols4you.com:80/picture/3281/4/jt-church.html.1
3535| http://www.teenidols4you.com:80/picture/3281/4/jt-church.html.~1~
3536| http://www.teenidols4you.com:80/picture/3405/4/merrick-hanna.html~
3537| http://www.teenidols4you.com:80/picture/3405/4/merrick-hanna copy.html
3538| http://www.teenidols4you.com:80/picture/3405/4/Copy of merrick-hanna.html
3539| http://www.teenidols4you.com:80/picture/3405/4/Copy (2) of merrick-hanna.html
3540| http://www.teenidols4you.com:80/picture/3405/4/merrick-hanna.html.1
3541| http://www.teenidols4you.com:80/picture/3405/4/merrick-hanna.html.~1~
3542| http://www.teenidols4you.com:80/gallery/3192/malachi-barton.html~
3543| http://www.teenidols4you.com:80/gallery/3192/malachi-barton.html.1
3544| http://www.teenidols4you.com:80/gallery/3192/malachi-barton.html.~1~
3545| http://www.teenidols4you.com:80/picture/3525/4/jack-avery.html~
3546| http://www.teenidols4you.com:80/picture/3525/4/jack-avery copy.html
3547| http://www.teenidols4you.com:80/picture/3525/4/Copy of jack-avery.html
3548| http://www.teenidols4you.com:80/picture/3525/4/Copy (2) of jack-avery.html
3549| http://www.teenidols4you.com:80/picture/3525/4/jack-avery.html.1
3550| http://www.teenidols4you.com:80/picture/3525/4/jack-avery.html.~1~
3551| http://www.teenidols4you.com:80/gallery/3290/hudson-west.html~
3552| http://www.teenidols4you.com:80/gallery/3290/hudson-west.html.1
3553| http://www.teenidols4you.com:80/gallery/3290/hudson-west.html.~1~
3554| http://www.teenidols4you.com:80/picture/2755/4/joshua-rush.html~
3555| http://www.teenidols4you.com:80/picture/2755/4/joshua-rush copy.html
3556| http://www.teenidols4you.com:80/picture/2755/4/Copy of joshua-rush.html
3557| http://www.teenidols4you.com:80/picture/2755/4/Copy (2) of joshua-rush.html
3558| http://www.teenidols4you.com:80/picture/2755/4/joshua-rush.html.1
3559| http://www.teenidols4you.com:80/picture/2755/4/joshua-rush.html.~1~
3560| http://www.teenidols4you.com:80/picture/3503/4/kyle-breitkopf.html~
3561| http://www.teenidols4you.com:80/picture/3503/4/kyle-breitkopf copy.html
3562| http://www.teenidols4you.com:80/picture/3503/4/Copy of kyle-breitkopf.html
3563| http://www.teenidols4you.com:80/picture/3503/4/Copy (2) of kyle-breitkopf.html
3564| http://www.teenidols4you.com:80/picture/3503/4/kyle-breitkopf.html.1
3565|_ http://www.teenidols4you.com:80/picture/3503/4/kyle-breitkopf.html.~1~
3566| http-brute:
3567|_ Path "/" does not require authentication
3568|_http-chrono: Request times for /; avg: 1399.50ms; min: 1141.77ms; max: 1824.96ms
3569| http-cookie-flags:
3570| /:
3571| PHPSESSID:
3572|_ httponly flag not set
3573| http-cross-domain-policy:
3574| VULNERABLE:
3575| Cross-domain and Client Access policies.
3576| State: VULNERABLE
3577| A cross-domain policy file specifies the permissions that a web client such as Java, Adobe Flash, Adobe Reader,
3578| etc. use to access data across different domains. A client acces policy file is similar to cross-domain policy
3579| but is used for M$ Silverlight applications. Overly permissive configurations enables Cross-site Request
3580| Forgery attacks, and may allow third parties to access sensitive data meant for the user.
3581| Check results:
3582| /crossdomain.xml:
3583| <?xml version="1.0"?>
3584|
3585|
3586| <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
3587|
3588|
3589| <cross-domain-policy>
3590|
3591|
3592| <allow-access-from domain="*" />
3593|
3594|
3595| </cross-domain-policy>
3596|
3597| Extra information:
3598| Trusted domains:*
3599| Use the script argument 'domain-lookup' to find trusted domains available for purchase
3600| References:
3601| http://acunetix.com/vulnerabilities/web/insecure-clientaccesspolicy-xml-file
3602| https://www.adobe.com/devnet/articles/crossdomain_policy_file_spec.html
3603| https://www.owasp.org/index.php/Test_RIA_cross_domain_policy_%28OTG-CONFIG-008%29
3604| http://gursevkalra.blogspot.com/2013/08/bypassing-same-origin-policy-with-flash.html
3605| https://www.adobe.com/devnet-docs/acrobatetk/tools/AppSec/CrossDomain_PolicyFile_Specification.pdf
3606|_ http://sethsec.blogspot.com/2014/03/exploiting-misconfigured-crossdomainxml.html
3607| http-csrf:
3608| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=www.teenidols4you.com
3609| Found the following possible CSRF vulnerabilities:
3610|
3611| Path: http://www.teenidols4you.com:80/
3612| Form id: cse-search-box
3613| Form action: http://www.teenidols4you.com/search.html
3614|
3615| Path: http://www.teenidols4you.com:80/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
3616| Form id: cse-search-box
3617| Form action: http://www.teenidols4you.com/search.html
3618|
3619| Path: http://www.teenidols4you.com:80/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
3620| Form id: addcommentform
3621| Form action:
3622|
3623| Path: http://www.teenidols4you.com:80/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
3624| Form id:
3625| Form action: /videos/login.php
3626|
3627| Path: http://www.teenidols4you.com:80/gallery/3281/jt-church.html
3628| Form id: cse-search-box
3629| Form action: http://www.teenidols4you.com/search.html
3630|
3631| Path: http://www.teenidols4you.com:80/gallery/3281/jt-church.html
3632| Form id:
3633| Form action: /videos/login.php
3634|
3635| Path: http://www.teenidols4you.com:80/top50/today
3636| Form id: cse-search-box
3637| Form action: http://www.teenidols4you.com/search.html
3638|
3639| Path: http://www.teenidols4you.com:80/gallery/2262/stefaniescott.html
3640| Form id: cse-search-box
3641| Form action: http://www.teenidols4you.com/search.html
3642|
3643| Path: http://www.teenidols4you.com:80/gallery/2262/stefaniescott.html
3644| Form id:
3645| Form action: /videos/login.php
3646|
3647| Path: http://www.teenidols4you.com:80/gallery/3526/corbyn-besson.html
3648| Form id: cse-search-box
3649| Form action: http://www.teenidols4you.com/search.html
3650|
3651| Path: http://www.teenidols4you.com:80/gallery/3526/corbyn-besson.html
3652| Form id:
3653| Form action: /videos/login.php
3654|
3655| Path: http://www.teenidols4you.com:80/picture/3091/4/carson-lueders.html
3656| Form id: cse-search-box
3657| Form action: http://www.teenidols4you.com/search.html
3658|
3659| Path: http://www.teenidols4you.com:80/picture/3091/4/carson-lueders.html
3660| Form id:
3661| Form action: /videos/login.php
3662|
3663| Path: http://www.teenidols4you.com:80/picture/3616/4/melvin-mellbolm.html
3664| Form id: cse-search-box
3665| Form action: http://www.teenidols4you.com/search.html
3666|
3667| Path: http://www.teenidols4you.com:80/picture/3616/4/melvin-mellbolm.html
3668| Form id:
3669| Form action: /videos/login.php
3670|
3671| Path: http://www.teenidols4you.com:80/picture/3065/4/hayden-summerall.html
3672| Form id: cse-search-box
3673| Form action: http://www.teenidols4you.com/search.html
3674|
3675| Path: http://www.teenidols4you.com:80/picture/3065/4/hayden-summerall.html
3676| Form id:
3677| Form action: /videos/login.php
3678|
3679| Path: http://www.teenidols4you.com:80/search.html
3680| Form id: cse-search-box
3681| Form action: http://www.teenidols4you.com/search.html
3682|
3683| Path: http://www.teenidols4you.com:80/search.html
3684| Form id:
3685| Form action: /videos/login.php
3686|
3687| Path: http://www.teenidols4you.com:80/privacy.html
3688| Form id: cse-search-box
3689| Form action: http://www.teenidols4you.com/search.html
3690|
3691| Path: http://www.teenidols4you.com:80/privacy.html
3692| Form id:
3693| Form action: /videos/login.php
3694|
3695| Path: http://www.teenidols4you.com:80/gallery/3238/jet-jurgensmeyer.html
3696| Form id: cse-search-box
3697| Form action: http://www.teenidols4you.com/search.html
3698|
3699| Path: http://www.teenidols4you.com:80/gallery/3238/jet-jurgensmeyer.html
3700| Form id:
3701| Form action: /videos/login.php
3702|
3703| Path: http://www.teenidols4you.com:80/picture/3281/4/jt-church.html
3704| Form id: cse-search-box
3705| Form action: http://www.teenidols4you.com/search.html
3706|
3707| Path: http://www.teenidols4you.com:80/picture/3281/4/jt-church.html
3708| Form id:
3709| Form action: /videos/login.php
3710|
3711| Path: http://www.teenidols4you.com:80/picture/3405/4/merrick-hanna.html
3712| Form id: cse-search-box
3713| Form action: http://www.teenidols4you.com/search.html
3714|
3715| Path: http://www.teenidols4you.com:80/picture/3405/4/merrick-hanna.html
3716| Form id:
3717| Form action: /videos/login.php
3718|
3719| Path: http://www.teenidols4you.com:80/gallery/3192/malachi-barton.html
3720| Form id: cse-search-box
3721| Form action: http://www.teenidols4you.com/search.html
3722|
3723| Path: http://www.teenidols4you.com:80/gallery/3192/malachi-barton.html
3724| Form id:
3725| Form action: /videos/login.php
3726|
3727| Path: http://www.teenidols4you.com:80/updates.html
3728| Form id: cse-search-box
3729| Form action: http://www.teenidols4you.com/search.html
3730|
3731| Path: http://www.teenidols4you.com:80/updates.html
3732| Form id:
3733| Form action: /videos/login.php
3734|
3735| Path: http://www.teenidols4you.com:80/picture/3525/4/jack-avery.html
3736| Form id: cse-search-box
3737| Form action: http://www.teenidols4you.com/search.html
3738|
3739| Path: http://www.teenidols4you.com:80/picture/3525/4/jack-avery.html
3740| Form id:
3741| Form action: /videos/login.php
3742|
3743| Path: http://www.teenidols4you.com:80/gallery/3290/hudson-west.html
3744| Form id: cse-search-box
3745| Form action: http://www.teenidols4you.com/search.html
3746|
3747| Path: http://www.teenidols4you.com:80/gallery/3290/hudson-west.html
3748| Form id:
3749| Form action: /videos/login.php
3750|
3751| Path: http://www.teenidols4you.com:80/picture/2755/4/joshua-rush.html
3752| Form id: cse-search-box
3753| Form action: http://www.teenidols4you.com/search.html
3754|
3755| Path: http://www.teenidols4you.com:80/picture/2755/4/joshua-rush.html
3756| Form id:
3757| Form action: /videos/login.php
3758|
3759| Path: http://www.teenidols4you.com:80/picture/3503/4/kyle-breitkopf.html
3760| Form id: cse-search-box
3761| Form action: http://www.teenidols4you.com/search.html
3762|
3763| Path: http://www.teenidols4you.com:80/picture/3503/4/kyle-breitkopf.html
3764| Form id:
3765|_ Form action: /videos/login.php
3766|_http-date: Fri, 06 Dec 2019 19:34:35 GMT; -1s from local time.
3767|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
3768|_http-dombased-xss: Couldn't find any DOM based XSS.
3769|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
3770|_http-errors: Couldn't find any error pages.
3771|_http-feed: Couldn't find any feeds.
3772|_http-fetch: Please enter the complete path of the directory to save data in.
3773| http-grep:
3774| (2) http://www.teenidols4you.com:80/privacy.html:
3775| (2) email:
3776| + privacy@exponential.com
3777|_ + w@galacticstudio.com
3778| http-headers:
3779| Date: Fri, 06 Dec 2019 19:34:34 GMT
3780| Server: Apache/2.2.15 (CentOS)
3781| Cache-Control: max-age=0, no-cache
3782| Vary: Accept-Encoding
3783| Connection: close
3784| Content-Type: text/html; charset=utf-8
3785|
3786|_ (Request type: HEAD)
3787|_http-jsonp-detection: Couldn't find any JSONP endpoints.
3788| http-methods:
3789|_ Supported Methods: GET HEAD POST OPTIONS
3790|_http-mobileversion-checker: No mobile version detected.
3791| http-php-version: Logo query returned unknown hash d502107741f7ca4797d233654ee830af
3792| Credits query returned unknown hash 9aa7aac40429f5f8a1893f92cfd5c773
3793|_Version from header x-powered-by: PHP/5.6.40
3794| http-robots.txt: 15 disallowed entries
3795| /include/rate.php /include/functions.php
3796| /videos/Smarty /videos/admin /videos/bbclone /videos/docs
3797| /videos/email_template /videos/include /clink/ /reportcoms.php
3798|_/replycoms.php / /clink /blink /images
3799| http-security-headers:
3800| Cache_Control:
3801|_ Header: Cache-Control: max-age=0, no-cache
3802|_http-server-header: Apache/2.2.15 (CentOS)
3803| http-sitemap-generator:
3804| Directory structure:
3805| /
3806| Other: 1; html: 4
3807| /gallery/2262/
3808| html: 1
3809| /gallery/3192/
3810| html: 1
3811| /gallery/3238/
3812| html: 1
3813| /gallery/3281/
3814| html: 1
3815| /gallery/3290/
3816| html: 1
3817| /gallery/3526/
3818| html: 1
3819| /picture/2755/4/
3820| html: 1
3821| /picture/3065/4/
3822| html: 1
3823| /picture/3091/4/
3824| html: 1
3825| /picture/3281/4/
3826| html: 1
3827| /picture/3405/4/
3828| html: 1
3829| /picture/3503/4/
3830| html: 1
3831| /picture/3525/4/
3832| html: 1
3833| /picture/3616/4/
3834| html: 1
3835| /top50/
3836| Other: 1
3837| Longest directory structure:
3838| Depth: 3
3839| Dir: /picture/3091/4/
3840| Total files found (by extension):
3841|_ Other: 2; html: 18
3842|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
3843|_http-title: Teen Idols 4 You : Teen Entertainment News and Picture Galleries
3844| http-trace: TRACE is enabled
3845| Headers:
3846| Date: Fri, 06 Dec 2019 19:34:30 GMT
3847| Server: Apache/2.2.15 (CentOS)
3848| Connection: close
3849| Transfer-Encoding: chunked
3850|_Content-Type: message/http
3851| http-unsafe-output-escaping:
3852|_ Characters [> " '] reflected in parameter pe at http://www.teenidols4you.com:80/picture.html?g=Actors&pe=lucas-royalty&foto=554&act=3659&mv=4&pic=910651
3853| http-vhosts:
3854| 122 names had status 301
3855| mx0.teenidols4you.com
3856| devtest.teenidols4you.com
3857| cdn.teenidols4you.com : 200
3858| www.teenidols4you.com : 200
3859|_www2.teenidols4you.com : 200
3860|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
3861|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3862|_http-xssed: No previously reported XSS vuln.
3863| vulners:
3864| cpe:/a:apache:http_server:2.2.15:
3865| CVE-2011-3192 7.8 https://vulners.com/cve/CVE-2011-3192
3866| CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
3867| CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
3868| CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
3869| CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
3870| CVE-2013-2249 7.5 https://vulners.com/cve/CVE-2013-2249
3871| CVE-2012-0883 6.9 https://vulners.com/cve/CVE-2012-0883
3872| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
3873| CVE-2017-12171 6.4 https://vulners.com/cve/CVE-2017-12171
3874| CVE-2013-1862 5.1 https://vulners.com/cve/CVE-2013-1862
3875| CVE-2014-0231 5.0 https://vulners.com/cve/CVE-2014-0231
3876| CVE-2014-0098 5.0 https://vulners.com/cve/CVE-2014-0098
3877| CVE-2013-6438 5.0 https://vulners.com/cve/CVE-2013-6438
3878| CVE-2012-4557 5.0 https://vulners.com/cve/CVE-2012-4557
3879| CVE-2011-3368 5.0 https://vulners.com/cve/CVE-2011-3368
3880| CVE-2010-2068 5.0 https://vulners.com/cve/CVE-2010-2068
3881| CVE-2010-1452 5.0 https://vulners.com/cve/CVE-2010-1452
3882| CVE-2012-0031 4.6 https://vulners.com/cve/CVE-2012-0031
3883| CVE-2011-3607 4.4 https://vulners.com/cve/CVE-2011-3607
3884| CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
3885| CVE-2013-1896 4.3 https://vulners.com/cve/CVE-2013-1896
3886| CVE-2012-4558 4.3 https://vulners.com/cve/CVE-2012-4558
3887| CVE-2012-3499 4.3 https://vulners.com/cve/CVE-2012-3499
3888| CVE-2012-0053 4.3 https://vulners.com/cve/CVE-2012-0053
3889| CVE-2011-4317 4.3 https://vulners.com/cve/CVE-2011-4317
3890| CVE-2011-3639 4.3 https://vulners.com/cve/CVE-2011-3639
3891| CVE-2011-3348 4.3 https://vulners.com/cve/CVE-2011-3348
3892| CVE-2011-0419 4.3 https://vulners.com/cve/CVE-2011-0419
3893| CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
3894| CVE-2012-2687 2.6 https://vulners.com/cve/CVE-2012-2687
3895|_ CVE-2011-4415 1.2 https://vulners.com/cve/CVE-2011-4415
3896| vulscan: VulDB - https://vuldb.com:
3897| [75668] Apache Sling API/Sling Servlets Post up to 2.2.1 HtmlResponse cross site scripting
3898| [65386] Apache Solr up to 2.2.1 on TYPO3 cross site scripting
3899| [65385] Apache Solr up to 2.2.1 on TYPO3 unknown vulnerability
3900| [64466] Apache OpenJPA up to 2.2.1 Serialization memory corruption
3901| [63089] Apache HTTP Server up to 2.2.13 mod_proxy_ajp denial of service
3902| [59850] Apache Geronimo up to 2.2.1 denial of service
3903| [57435] Apache Struts up to 2.2.1.1 FileHandler.java cross site scripting
3904| [57425] Apache Struts up to 2.2.1.1 cross site scripting
3905| [54166] Apache HTTP Server up to 2.2.12 mod_cache Crash denial of service
3906| [49856] Apache HTTP Server 2.2.13 mod_proxy_ftp ap_proxy_ftp_handler denial of service
3907| [3130] Apache OpenOffice 2.2.1 RTF Document Heap-based memory corruption
3908| [135663] Apache Camel up to 2.23.x JSON-lib Library XML Data XML External Entity
3909| [134290] Apache UIMA DUCC up to 2.2.2 cross site scripting
3910| [134248] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
3911| [134247] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
3912| [124152] Apache Camel Mail up to 2.22.0 Path directory traversal
3913| [122889] Apache HTTP Server up to 2.2.31/2.4.23 mod_userdir HTTP Response Splitting privilege escalation
3914| [122456] Apache Camel up to 2.20.3/2.21.0 XSD Validator XML External Entity
3915| [106777] Apache HTTP Server up to 2.2.34/2.4.27 Limit Directive ap_limit_section HTTP Request information disclosure
3916| [103520] Apache HTTP Server up to 2.2.33/2.4.26 mod_auth_digest Authorization Header memory corruption
3917| [102698] Apache HTTP Server up to 2.2.32/2.4.25 mod_mime Content-Type memory corruption
3918| [102697] Apache HTTP Server 2.2.24/2.2.32 HTTP Strict Parsing ap_find_token Request Header memory corruption
3919| [102690] Apache HTTP Server up to 2.2.32/2.4.25 mod_ssl ap_hook_process_connection() denial of service
3920| [102689] Apache HTTP Server up to 2.2.32/2.4.25 ap_get_basic_auth_pw weak authentication
3921| [100162] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Commons Collections privilege escalation
3922| [100160] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Trinidad unknown vulnerability
3923| [87540] Apache Ambari up to 2.2.0 File Browser View information disclosure
3924| [12291] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
3925| [65313] Apache Sling 2.2.0/2.3.0 AbstractCreateOperation.java deepGetOrCreateNode denial of service
3926| [9891] Apache HTTP Server 2.2.22 suEXEC Feature .htaccess information disclosure
3927| [64485] Apache Struts up to 2.2.3.0 privilege escalation
3928| [64457] Apache Struts up to 2.2.3.0 cross site scripting
3929| [63646] Apache HTTP Server up to 2.2.23/2.4.3 mod_proxy_balancer.c balancer_handler cross site scripting
3930| [60352] Apache Struts up to 2.2.3 memory corruption
3931| [4583] Apache HTTP Server up to 2.2.21 Threaded MPM denial of service
3932| [4582] Apache HTTP Server up to 2.2.21 protocol.c information disclosure
3933| [59902] Apache Struts up to 2.2.3 Interfaces unknown vulnerability
3934| [4528] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
3935| [4527] Apache Struts up to 2.2.3 ExceptionDelegator cross site scripting
3936| [4512] Apache Struts up to 2.2.3 CookieInterceptor privilege escalation
3937| [4352] Apache HTTP Server 2.2.x APR apr_fnmatch denial of service
3938| [54394] Apache CXF up to 2.2.8 Memory Consumption denial of service
3939| [40502] Apache HTTP Server up to 2.2.5 mod_proxy_balancer memory corruption
3940| [40501] Apache HTTP Server 2.2.6 mod_proxy_balancer cross site request forgery
3941| [40398] Apache HTTP Server up to 2.2 mod_proxy_balancer cross site scripting
3942| [40397] Apache HTTP Server up to 2.2 mod_proxy_balancer balancer_handler denial of service
3943| [40221] Apache HTTP Server 2.2.6 information disclosure
3944|
3945| MITRE CVE - https://cve.mitre.org:
3946| [CVE-2010-2068] mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
3947| [CVE-2010-0434] The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
3948| [CVE-2010-0408] The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
3949| [CVE-2007-6750] The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
3950| [CVE-2013-1048] The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
3951| [CVE-2012-4557] The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
3952| [CVE-2012-0216] The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
3953| [CVE-2012-0021] The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
3954| [CVE-2011-5034] Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
3955| [CVE-2011-3639] The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
3956| [CVE-2011-3192] The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
3957| [CVE-2011-2088] XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
3958| [CVE-2011-1928] The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
3959| [CVE-2011-1176] The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
3960| [CVE-2011-0419] Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
3961| [CVE-2010-1452] The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
3962| [CVE-2010-0425] modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
3963| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
3964| [CVE-2009-3094] The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
3965| [CVE-2009-2699] The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
3966| [CVE-2009-1891] The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
3967| [CVE-2009-1195] The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
3968| [CVE-2009-1191] mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
3969|
3970| SecurityFocus - https://www.securityfocus.com/bid/:
3971| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
3972| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
3973|
3974| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3975| [75211] Debian GNU/Linux apache 2 cross-site scripting
3976|
3977| Exploit-DB - https://www.exploit-db.com:
3978| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
3979| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
3980| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
3981| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
3982| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
3983| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
3984| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
3985| [17691] Apache Struts < 2.2.0 - Remote Command Execution
3986| [15319] Apache 2.2 (Windows) Local Denial of Service
3987| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
3988|
3989| OpenVAS (Nessus) - http://www.openvas.org:
3990| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
3991|
3992| SecurityTracker - https://www.securitytracker.com:
3993| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
3994| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
3995| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
3996| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
3997| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
3998|
3999| OSVDB - http://www.osvdb.org:
4000| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
4001|_
4002Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4003Device type: VoIP adapter|general purpose
4004Running: Cisco embedded, Linux 2.6.X
4005OS CPE: cpe:/h:cisco:unified_call_manager cpe:/o:linux:linux_kernel:2.6
4006OS details: Cisco Unified Communications Manager VoIP adapter, Linux 2.6.18 - 2.6.22, Linux 2.6.26 (PCLinuxOS)
4007Uptime guess: 30.716 days (since Tue Nov 5 21:38:26 2019)
4008Network Distance: 14 hops
4009
4010TRACEROUTE (using port 80/tcp)
4011HOP RTT ADDRESS
40121 184.95 ms 10.250.204.1
40132 185.00 ms 104.245.145.177
40143 185.04 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
40154 150.51 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
40165 150.51 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
40176 150.50 ms ix-ae-16-0.tcore1.tnk-toronto.as6453.net (64.86.33.98)
40187 155.54 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
40198 155.57 ms if-ae-8-2.tcore1.ct8-chicago.as6453.net (66.110.48.2)
40209 155.60 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28)
402110 185.18 ms if-ae-12-2.tcore1.n75-new-york.as6453.net (66.110.96.5)
402211 66.51 ms 66.110.96.26
402312 ... 13
402414 83.37 ms teenidols4you.com (45.55.35.220)
4025
4026NSE: Script Post-scanning.
4027Initiating NSE at 14:48
4028Completed NSE at 14:48, 0.00s elapsed
4029Initiating NSE at 14:48
4030Completed NSE at 14:48, 0.00s elapsed
4031#################################################################################################
4032------------------------------------------------------------------------------------------------------------------------
4033
4034[ ! ] Starting SCANNER INURLBR 2.1 at [06-12-2019 14:49:10]
4035[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
4036It is the end user's responsibility to obey all applicable local, state and federal laws.
4037Developers assume no liability and are not responsible for any misuse or damage caused by this program
4038
4039[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.teenidols4you.com/output/inurlbr-www.teenidols4you.com ]
4040[ INFO ][ DORK ]::[ site:www.teenidols4you.com ]
4041[ INFO ][ SEARCHING ]:: {
4042[ INFO ][ ENGINE ]::[ GOOGLE - www.google.it ]
4043
4044[ INFO ][ SEARCHING ]::
4045-[:::]
4046[ INFO ][ ENGINE ]::[ GOOGLE API ]
4047
4048[ INFO ][ SEARCHING ]::
4049-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4050[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.tn ID: 006748068166572874491:55ez0c3j3ey ]
4051
4052[ INFO ][ SEARCHING ]::
4053-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4054
4055[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
4056
4057
4058 _[ - ]::--------------------------------------------------------------------------------------------------------------
4059|_[ + ] [ 0 / 100 ]-[14:49:25] [ - ]
4060|_[ + ] Target:: [ http://www.teenidols4you.com/ ]
4061|_[ + ] Exploit::
4062|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4063|_[ + ] More details:: / - / , ISP:
4064|_[ + ] Found:: UNIDENTIFIED
4065
4066 _[ - ]::--------------------------------------------------------------------------------------------------------------
4067|_[ + ] [ 1 / 100 ]-[14:49:27] [ - ]
4068|_[ + ] Target:: [ http://www.teenidols4you.com/top50/today ]
4069|_[ + ] Exploit::
4070|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4071|_[ + ] More details:: / - / , ISP:
4072|_[ + ] Found:: UNIDENTIFIED
4073
4074 _[ - ]::--------------------------------------------------------------------------------------------------------------
4075|_[ + ] [ 2 / 100 ]-[14:49:28] [ - ]
4076|_[ + ] Target:: [ http://www.teenidols4you.com/updates.html ]
4077|_[ + ] Exploit::
4078|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4079|_[ + ] More details:: / - / , ISP:
4080|_[ + ] Found:: UNIDENTIFIED
4081
4082 _[ - ]::--------------------------------------------------------------------------------------------------------------
4083|_[ + ] [ 3 / 100 ]-[14:49:29] [ - ]
4084|_[ + ] Target:: [ http://www.teenidols4you.com/uploaded.php ]
4085|_[ + ] Exploit::
4086|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4087|_[ + ] More details:: / - / , ISP:
4088|_[ + ] Found:: UNIDENTIFIED
4089
4090 _[ - ]::--------------------------------------------------------------------------------------------------------------
4091|_[ + ] [ 4 / 100 ]-[14:49:30] [ - ]
4092|_[ + ] Target:: [ http://www.teenidols4you.com/actor.html ]
4093|_[ + ] Exploit::
4094|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4095|_[ + ] More details:: / - / , ISP:
4096|_[ + ] Found:: UNIDENTIFIED
4097
4098 _[ - ]::--------------------------------------------------------------------------------------------------------------
4099|_[ + ] [ 5 / 100 ]-[14:49:31] [ - ]
4100|_[ + ] Target:: [ http://www.teenidols4you.com/news/enews1123.html ]
4101|_[ + ] Exploit::
4102|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4103|_[ + ] More details:: / - / , ISP:
4104|_[ + ] Found:: UNIDENTIFIED
4105
4106 _[ - ]::--------------------------------------------------------------------------------------------------------------
4107|_[ + ] [ 6 / 100 ]-[14:49:32] [ - ]
4108|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/174/daniel_radcliffe.html ]
4109|_[ + ] Exploit::
4110|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4111|_[ + ] More details:: / - / , ISP:
4112|_[ + ] Found:: UNIDENTIFIED
4113
4114 _[ - ]::--------------------------------------------------------------------------------------------------------------
4115|_[ + ] [ 7 / 100 ]-[14:49:33] [ - ]
4116|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/1475/asabutterfield.html ]
4117|_[ + ] Exploit::
4118|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4119|_[ + ] More details:: / - / , ISP:
4120|_[ + ] Found:: UNIDENTIFIED
4121
4122 _[ - ]::--------------------------------------------------------------------------------------------------------------
4123|_[ + ] [ 8 / 100 ]-[14:49:34] [ - ]
4124|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/54/hayden_christensen.html ]
4125|_[ + ] Exploit::
4126|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4127|_[ + ] More details:: / - / , ISP:
4128|_[ + ] Found:: UNIDENTIFIED
4129
4130 _[ - ]::--------------------------------------------------------------------------------------------------------------
4131|_[ + ] [ 9 / 100 ]-[14:49:35] [ - ]
4132|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/843/boo_boo_stewart.html ]
4133|_[ + ] Exploit::
4134|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4135|_[ + ] More details:: / - / , ISP:
4136|_[ + ] Found:: UNIDENTIFIED
4137
4138 _[ - ]::--------------------------------------------------------------------------------------------------------------
4139|_[ + ] [ 10 / 100 ]-[14:49:36] [ - ]
4140|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/189/joseph_cross.html ]
4141|_[ + ] Exploit::
4142|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4143|_[ + ] More details:: / - / , ISP:
4144|_[ + ] Found:: UNIDENTIFIED
4145
4146 _[ - ]::--------------------------------------------------------------------------------------------------------------
4147|_[ + ] [ 11 / 100 ]-[14:49:37] [ - ]
4148|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/218/shane_haboucha.html ]
4149|_[ + ] Exploit::
4150|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4151|_[ + ] More details:: / - / , ISP:
4152|_[ + ] Found:: UNIDENTIFIED
4153
4154 _[ - ]::--------------------------------------------------------------------------------------------------------------
4155|_[ + ] [ 12 / 100 ]-[14:49:39] [ - ]
4156|_[ + ] Target:: [ http://www.teenidols4you.com/uploaded.php?pg=10 ]
4157|_[ + ] Exploit::
4158|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4159|_[ + ] More details:: / - / , ISP:
4160|_[ + ] Found:: UNIDENTIFIED
4161
4162 _[ - ]::--------------------------------------------------------------------------------------------------------------
4163|_[ + ] [ 13 / 100 ]-[14:49:40] [ - ]
4164|_[ + ] Target:: [ http://www.teenidols4you.com/uploaded.php?pg=22 ]
4165|_[ + ] Exploit::
4166|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4167|_[ + ] More details:: / - / , ISP:
4168|_[ + ] Found:: UNIDENTIFIED
4169
4170 _[ - ]::--------------------------------------------------------------------------------------------------------------
4171|_[ + ] [ 14 / 100 ]-[14:49:41] [ - ]
4172|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/628/colin_ford.html ]
4173|_[ + ] Exploit::
4174|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4175|_[ + ] More details:: / - / , ISP:
4176|_[ + ] Found:: UNIDENTIFIED
4177
4178 _[ - ]::--------------------------------------------------------------------------------------------------------------
4179|_[ + ] [ 15 / 100 ]-[14:49:42] [ - ]
4180|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/652/aaron_altaras.html ]
4181|_[ + ] Exploit::
4182|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4183|_[ + ] More details:: / - / , ISP:
4184|_[ + ] Found:: UNIDENTIFIED
4185
4186 _[ - ]::--------------------------------------------------------------------------------------------------------------
4187|_[ + ] [ 16 / 100 ]-[14:49:43] [ - ]
4188|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/346/cameron_monaghan.html ]
4189|_[ + ] Exploit::
4190|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4191|_[ + ] More details:: / - / , ISP:
4192|_[ + ] Found:: UNIDENTIFIED
4193
4194 _[ - ]::--------------------------------------------------------------------------------------------------------------
4195|_[ + ] [ 17 / 100 ]-[14:49:45] [ - ]
4196|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/71/tim_redwine.html ]
4197|_[ + ] Exploit::
4198|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4199|_[ + ] More details:: / - / , ISP:
4200|_[ + ] Found:: UNIDENTIFIED
4201
4202 _[ - ]::--------------------------------------------------------------------------------------------------------------
4203|_[ + ] [ 18 / 100 ]-[14:49:46] [ - ]
4204|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/158/ryan_gosling.html ]
4205|_[ + ] Exploit::
4206|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4207|_[ + ] More details:: / - / , ISP:
4208|_[ + ] Found:: UNIDENTIFIED
4209
4210 _[ - ]::--------------------------------------------------------------------------------------------------------------
4211|_[ + ] [ 19 / 100 ]-[14:49:47] [ - ]
4212|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/50/eric_lloyd.html ]
4213|_[ + ] Exploit::
4214|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4215|_[ + ] More details:: / - / , ISP:
4216|_[ + ] Found:: UNIDENTIFIED
4217
4218 _[ - ]::--------------------------------------------------------------------------------------------------------------
4219|_[ + ] [ 20 / 100 ]-[14:49:48] [ - ]
4220|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/165/cyoung.html ]
4221|_[ + ] Exploit::
4222|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4223|_[ + ] More details:: / - / , ISP:
4224|_[ + ] Found:: UNIDENTIFIED
4225
4226 _[ - ]::--------------------------------------------------------------------------------------------------------------
4227|_[ + ] [ 21 / 100 ]-[14:49:49] [ - ]
4228|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2517/CameronBoyce.html ]
4229|_[ + ] Exploit::
4230|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4231|_[ + ] More details:: / - / , ISP:
4232|_[ + ] Found:: UNIDENTIFIED
4233
4234 _[ - ]::--------------------------------------------------------------------------------------------------------------
4235|_[ + ] [ 22 / 100 ]-[14:49:50] [ - ]
4236|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/98/reiley_mcclendon.html ]
4237|_[ + ] Exploit::
4238|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4239|_[ + ] More details:: / - / , ISP:
4240|_[ + ] Found:: UNIDENTIFIED
4241
4242 _[ - ]::--------------------------------------------------------------------------------------------------------------
4243|_[ + ] [ 23 / 100 ]-[14:49:51] [ - ]
4244|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/1392/sterlingknight.html ]
4245|_[ + ] Exploit::
4246|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4247|_[ + ] More details:: / - / , ISP:
4248|_[ + ] Found:: UNIDENTIFIED
4249
4250 _[ - ]::--------------------------------------------------------------------------------------------------------------
4251|_[ + ] [ 24 / 100 ]-[14:49:52] [ - ]
4252|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2104/colesprouse.html ]
4253|_[ + ] Exploit::
4254|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4255|_[ + ] More details:: / - / , ISP:
4256|_[ + ] Found:: UNIDENTIFIED
4257
4258 _[ - ]::--------------------------------------------------------------------------------------------------------------
4259|_[ + ] [ 25 / 100 ]-[14:49:53] [ - ]
4260|_[ + ] Target:: [ http://www.teenidols4you.com/uploaded.php?pg=12 ]
4261|_[ + ] Exploit::
4262|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4263|_[ + ] More details:: / - / , ISP:
4264|_[ + ] Found:: UNIDENTIFIED
4265
4266 _[ - ]::--------------------------------------------------------------------------------------------------------------
4267|_[ + ] [ 26 / 100 ]-[14:49:54] [ - ]
4268|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2078/robertclarenceirwin.html ]
4269|_[ + ] Exploit::
4270|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache/2.2.15 (CentOS) , IP:45.55.35.220:80
4271|_[ + ] More details:: / - / , ISP:
4272|_[ + ] Found:: UNIDENTIFIED
4273
4274 _[ - ]::--------------------------------------------------------------------------------------------------------------
4275|_[ + ] [ 27 / 100 ]-[14:49:55] [ - ]
4276|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/30/max_thieriot.html ]
4277|_[ + ] Exploit::
4278|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4279|_[ + ] More details:: / - / , ISP:
4280|_[ + ] Found:: UNIDENTIFIED
4281
4282 _[ - ]::--------------------------------------------------------------------------------------------------------------
4283|_[ + ] [ 28 / 100 ]-[14:49:56] [ - ]
4284|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/136/mattlawrence.html ]
4285|_[ + ] Exploit::
4286|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4287|_[ + ] More details:: / - / , ISP:
4288|_[ + ] Found:: UNIDENTIFIED
4289
4290 _[ - ]::--------------------------------------------------------------------------------------------------------------
4291|_[ + ] [ 29 / 100 ]-[14:49:56] [ - ]
4292|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/1571/zacharygordan.html ]
4293|_[ + ] Exploit::
4294|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4295|_[ + ] More details:: / - / , ISP:
4296|_[ + ] Found:: UNIDENTIFIED
4297
4298 _[ - ]::--------------------------------------------------------------------------------------------------------------
4299|_[ + ] [ 30 / 100 ]-[14:49:57] [ - ]
4300|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/1799/rebeccabrown.html ]
4301|_[ + ] Exploit::
4302|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4303|_[ + ] More details:: / - / , ISP:
4304|_[ + ] Found:: UNIDENTIFIED
4305
4306 _[ - ]::--------------------------------------------------------------------------------------------------------------
4307|_[ + ] [ 31 / 100 ]-[14:49:58] [ - ]
4308|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/1068/owenkline.html ]
4309|_[ + ] Exploit::
4310|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4311|_[ + ] More details:: / - / , ISP:
4312|_[ + ] Found:: UNIDENTIFIED
4313
4314 _[ - ]::--------------------------------------------------------------------------------------------------------------
4315|_[ + ] [ 32 / 100 ]-[14:49:59] [ - ]
4316|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2397/daviscleveland.html ]
4317|_[ + ] Exploit::
4318|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache/2.2.15 (CentOS) , IP:45.55.35.220:80
4319|_[ + ] More details:: / - / , ISP:
4320|_[ + ] Found:: UNIDENTIFIED
4321
4322 _[ - ]::--------------------------------------------------------------------------------------------------------------
4323|_[ + ] [ 33 / 100 ]-[14:50:04] [ - ]
4324|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/854/carter_page.html ]
4325|_[ + ] Exploit::
4326|_[ + ] Information Server:: , , IP::0
4327|_[ + ] More details::
4328|_[ + ] Found:: UNIDENTIFIED
4329
4330 _[ - ]::--------------------------------------------------------------------------------------------------------------
4331|_[ + ] [ 34 / 100 ]-[14:50:05] [ - ]
4332|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/1466/connietalbot.html ]
4333|_[ + ] Exploit::
4334|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4335|_[ + ] More details:: / - / , ISP:
4336|_[ + ] Found:: UNIDENTIFIED
4337
4338 _[ - ]::--------------------------------------------------------------------------------------------------------------
4339|_[ + ] [ 35 / 100 ]-[14:50:09] [ - ]
4340|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3349/jaeden-lieberher.html ]
4341|_[ + ] Exploit::
4342|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache/2.2.15 (CentOS) , IP:45.55.35.220:80
4343|_[ + ] More details:: / - / , ISP:
4344|_[ + ] Found:: UNIDENTIFIED
4345
4346 _[ - ]::--------------------------------------------------------------------------------------------------------------
4347|_[ + ] [ 36 / 100 ]-[14:50:10] [ - ]
4348|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3197/michael-campion.html ]
4349|_[ + ] Exploit::
4350|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4351|_[ + ] More details:: / - / , ISP:
4352|_[ + ] Found:: UNIDENTIFIED
4353
4354 _[ - ]::--------------------------------------------------------------------------------------------------------------
4355|_[ + ] [ 37 / 100 ]-[14:50:11] [ - ]
4356|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3136/tanner-buchanan.html ]
4357|_[ + ] Exploit::
4358|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4359|_[ + ] More details:: / - / , ISP:
4360|_[ + ] Found:: UNIDENTIFIED
4361
4362 _[ - ]::--------------------------------------------------------------------------------------------------------------
4363|_[ + ] [ 38 / 100 ]-[14:50:12] [ - ]
4364|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2755/joshua-rush.html ]
4365|_[ + ] Exploit::
4366|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4367|_[ + ] More details:: / - / , ISP:
4368|_[ + ] Found:: UNIDENTIFIED
4369
4370 _[ - ]::--------------------------------------------------------------------------------------------------------------
4371|_[ + ] [ 39 / 100 ]-[14:50:13] [ - ]
4372|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3183/jacob-tremblay.html ]
4373|_[ + ] Exploit::
4374|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4375|_[ + ] More details:: / - / , ISP:
4376|_[ + ] Found:: UNIDENTIFIED
4377
4378 _[ - ]::--------------------------------------------------------------------------------------------------------------
4379|_[ + ] [ 40 / 100 ]-[14:50:14] [ - ]
4380|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2764/johnny-orlando.html ]
4381|_[ + ] Exploit::
4382|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache/2.2.15 (CentOS) , IP:45.55.35.220:80
4383|_[ + ] More details:: / - / , ISP:
4384|_[ + ] Found:: UNIDENTIFIED
4385
4386 _[ - ]::--------------------------------------------------------------------------------------------------------------
4387|_[ + ] [ 41 / 100 ]-[14:50:15] [ - ]
4388|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3189/isaak-presley.html ]
4389|_[ + ] Exploit::
4390|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4391|_[ + ] More details:: / - / , ISP:
4392|_[ + ] Found:: UNIDENTIFIED
4393
4394 _[ - ]::--------------------------------------------------------------------------------------------------------------
4395|_[ + ] [ 42 / 100 ]-[14:50:16] [ - ]
4396|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2897/dylan-schmid.html ]
4397|_[ + ] Exploit::
4398|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4399|_[ + ] More details:: / - / , ISP:
4400|_[ + ] Found:: UNIDENTIFIED
4401
4402 _[ - ]::--------------------------------------------------------------------------------------------------------------
4403|_[ + ] [ 43 / 100 ]-[14:50:17] [ - ]
4404|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3287/breanna-yde.html ]
4405|_[ + ] Exploit::
4406|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4407|_[ + ] More details:: / - / , ISP:
4408|_[ + ] Found:: UNIDENTIFIED
4409
4410 _[ - ]::--------------------------------------------------------------------------------------------------------------
4411|_[ + ] [ 44 / 100 ]-[14:50:21] [ - ]
4412|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3120/thomas-kuc.html ]
4413|_[ + ] Exploit::
4414|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4415|_[ + ] More details:: / - / , ISP:
4416|_[ + ] Found:: UNIDENTIFIED
4417
4418 _[ - ]::--------------------------------------------------------------------------------------------------------------
4419|_[ + ] [ 45 / 100 ]-[14:50:22] [ - ]
4420|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3318/gabriel-bateman.html ]
4421|_[ + ] Exploit::
4422|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4423|_[ + ] More details:: / - / , ISP:
4424|_[ + ] Found:: UNIDENTIFIED
4425
4426 _[ - ]::--------------------------------------------------------------------------------------------------------------
4427|_[ + ] [ 46 / 100 ]-[14:50:23] [ - ]
4428|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2847/diego-velazquez.html ]
4429|_[ + ] Exploit::
4430|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache/2.2.15 (CentOS) , IP:45.55.35.220:80
4431|_[ + ] More details:: / - / , ISP:
4432|_[ + ] Found:: UNIDENTIFIED
4433
4434 _[ - ]::--------------------------------------------------------------------------------------------------------------
4435|_[ + ] [ 47 / 100 ]-[14:50:24] [ - ]
4436|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3743/luke-prael.html ]
4437|_[ + ] Exploit::
4438|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4439|_[ + ] More details:: / - / , ISP:
4440|_[ + ] Found:: UNIDENTIFIED
4441
4442 _[ - ]::--------------------------------------------------------------------------------------------------------------
4443|_[ + ] [ 48 / 100 ]-[14:50:25] [ - ]
4444|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3119/keean-johnson.html ]
4445|_[ + ] Exploit::
4446|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4447|_[ + ] More details:: / - / , ISP:
4448|_[ + ] Found:: UNIDENTIFIED
4449
4450 _[ - ]::--------------------------------------------------------------------------------------------------------------
4451|_[ + ] [ 49 / 100 ]-[14:50:26] [ - ]
4452|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3479/prestyn-bates.html ]
4453|_[ + ] Exploit::
4454|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4455|_[ + ] More details:: / - / , ISP:
4456|_[ + ] Found:: UNIDENTIFIED
4457
4458 _[ - ]::--------------------------------------------------------------------------------------------------------------
4459|_[ + ] [ 50 / 100 ]-[14:50:27] [ - ]
4460|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3556/matt-lintz.html ]
4461|_[ + ] Exploit::
4462|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4463|_[ + ] More details:: / - / , ISP:
4464|_[ + ] Found:: UNIDENTIFIED
4465
4466 _[ - ]::--------------------------------------------------------------------------------------------------------------
4467|_[ + ] [ 51 / 100 ]-[14:50:28] [ - ]
4468|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3286/harvey-cantwell.html ]
4469|_[ + ] Exploit::
4470|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache/2.2.15 (CentOS) , IP:45.55.35.220:80
4471|_[ + ] More details:: / - / , ISP:
4472|_[ + ] Found:: UNIDENTIFIED
4473
4474 _[ - ]::--------------------------------------------------------------------------------------------------------------
4475|_[ + ] [ 52 / 100 ]-[14:50:29] [ - ]
4476|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2969/jace-norman.html ]
4477|_[ + ] Exploit::
4478|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4479|_[ + ] More details:: / - / , ISP:
4480|_[ + ] Found:: UNIDENTIFIED
4481
4482 _[ - ]::--------------------------------------------------------------------------------------------------------------
4483|_[ + ] [ 53 / 100 ]-[14:50:30] [ - ]
4484|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3474/montana-jordan.html ]
4485|_[ + ] Exploit::
4486|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4487|_[ + ] More details:: / - / , ISP:
4488|_[ + ] Found:: UNIDENTIFIED
4489
4490 _[ - ]::--------------------------------------------------------------------------------------------------------------
4491|_[ + ] [ 54 / 100 ]-[14:50:31] [ - ]
4492|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2924/august-maturo.html ]
4493|_[ + ] Exploit::
4494|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4495|_[ + ] More details:: / - / , ISP:
4496|_[ + ] Found:: UNIDENTIFIED
4497
4498 _[ - ]::--------------------------------------------------------------------------------------------------------------
4499|_[ + ] [ 55 / 100 ]-[14:50:32] [ - ]
4500|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3733/vinicius-leal.html ]
4501|_[ + ] Exploit::
4502|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4503|_[ + ] More details:: / - / , ISP:
4504|_[ + ] Found:: UNIDENTIFIED
4505
4506 _[ - ]::--------------------------------------------------------------------------------------------------------------
4507|_[ + ] [ 56 / 100 ]-[14:50:33] [ - ]
4508|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3311/michael-ronda.html ]
4509|_[ + ] Exploit::
4510|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4511|_[ + ] More details:: / - / , ISP:
4512|_[ + ] Found:: UNIDENTIFIED
4513
4514 _[ - ]::--------------------------------------------------------------------------------------------------------------
4515|_[ + ] [ 57 / 100 ]-[14:50:34] [ - ]
4516|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3413/noah-jupe.html ]
4517|_[ + ] Exploit::
4518|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4519|_[ + ] More details:: / - / , ISP:
4520|_[ + ] Found:: UNIDENTIFIED
4521
4522 _[ - ]::--------------------------------------------------------------------------------------------------------------
4523|_[ + ] [ 58 / 100 ]-[14:50:35] [ - ]
4524|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3561/dylan-summerall.html ]
4525|_[ + ] Exploit::
4526|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4527|_[ + ] More details:: / - / , ISP:
4528|_[ + ] Found:: UNIDENTIFIED
4529
4530 _[ - ]::--------------------------------------------------------------------------------------------------------------
4531|_[ + ] [ 59 / 100 ]-[14:50:36] [ - ]
4532|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3435/brent-rivera.html ]
4533|_[ + ] Exploit::
4534|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4535|_[ + ] More details:: / - / , ISP:
4536|_[ + ] Found:: UNIDENTIFIED
4537
4538 _[ - ]::--------------------------------------------------------------------------------------------------------------
4539|_[ + ] [ 60 / 100 ]-[14:50:37] [ - ]
4540|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3074/owen-joyner.html ]
4541|_[ + ] Exploit::
4542|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4543|_[ + ] More details:: / - / , ISP:
4544|_[ + ] Found:: UNIDENTIFIED
4545
4546 _[ - ]::--------------------------------------------------------------------------------------------------------------
4547|_[ + ] [ 61 / 100 ]-[14:50:38] [ - ]
4548|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2769/tom-holland.html ]
4549|_[ + ] Exploit::
4550|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache/2.2.15 (CentOS) , IP:45.55.35.220:80
4551|_[ + ] More details:: / - / , ISP:
4552|_[ + ] Found:: UNIDENTIFIED
4553
4554 _[ - ]::--------------------------------------------------------------------------------------------------------------
4555|_[ + ] [ 62 / 100 ]-[14:50:38] [ - ]
4556|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3268/jacob-sartorius.html ]
4557|_[ + ] Exploit::
4558|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4559|_[ + ] More details:: / - / , ISP:
4560|_[ + ] Found:: UNIDENTIFIED
4561
4562 _[ - ]::--------------------------------------------------------------------------------------------------------------
4563|_[ + ] [ 63 / 100 ]-[14:50:39] [ - ]
4564|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3192/malachi-barton.html ]
4565|_[ + ] Exploit::
4566|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4567|_[ + ] More details:: / - / , ISP:
4568|_[ + ] Found:: UNIDENTIFIED
4569
4570 _[ - ]::--------------------------------------------------------------------------------------------------------------
4571|_[ + ] [ 64 / 100 ]-[14:50:40] [ - ]
4572|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3745/payton-moormeier.html ]
4573|_[ + ] Exploit::
4574|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4575|_[ + ] More details:: / - / , ISP:
4576|_[ + ] Found:: UNIDENTIFIED
4577
4578 _[ - ]::--------------------------------------------------------------------------------------------------------------
4579|_[ + ] [ 65 / 100 ]-[14:50:42] [ - ]
4580|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2644/mason-cook.html ]
4581|_[ + ] Exploit::
4582|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4583|_[ + ] More details:: / - / , ISP:
4584|_[ + ] Found:: UNIDENTIFIED
4585
4586 _[ - ]::--------------------------------------------------------------------------------------------------------------
4587|_[ + ] [ 66 / 100 ]-[14:50:43] [ - ]
4588|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3750/luke-roessler.html ]
4589|_[ + ] Exploit::
4590|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4591|_[ + ] More details:: / - / , ISP:
4592|_[ + ] Found:: UNIDENTIFIED
4593
4594 _[ - ]::--------------------------------------------------------------------------------------------------------------
4595|_[ + ] [ 67 / 100 ]-[14:50:43] [ - ]
4596|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3116/hunter-payton.html ]
4597|_[ + ] Exploit::
4598|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4599|_[ + ] More details:: / - / , ISP:
4600|_[ + ] Found:: UNIDENTIFIED
4601
4602 _[ - ]::--------------------------------------------------------------------------------------------------------------
4603|_[ + ] [ 68 / 100 ]-[14:50:44] [ - ]
4604|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3276/jagger-eaton.html ]
4605|_[ + ] Exploit::
4606|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4607|_[ + ] More details:: / - / , ISP:
4608|_[ + ] Found:: UNIDENTIFIED
4609
4610 _[ - ]::--------------------------------------------------------------------------------------------------------------
4611|_[ + ] [ 69 / 100 ]-[14:50:45] [ - ]
4612|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3091/carson-lueders.html ]
4613|_[ + ] Exploit::
4614|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4615|_[ + ] More details:: / - / , ISP:
4616|_[ + ] Found:: UNIDENTIFIED
4617
4618 _[ - ]::--------------------------------------------------------------------------------------------------------------
4619|_[ + ] [ 70 / 100 ]-[14:50:46] [ - ]
4620|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3377/avi-angel.html ]
4621|_[ + ] Exploit::
4622|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4623|_[ + ] More details:: / - / , ISP:
4624|_[ + ] Found:: UNIDENTIFIED
4625
4626 _[ - ]::--------------------------------------------------------------------------------------------------------------
4627|_[ + ] [ 71 / 100 ]-[14:50:49] [ - ]
4628|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3211/kj-apa.html ]
4629|_[ + ] Exploit::
4630|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4631|_[ + ] More details:: / - / , ISP:
4632|_[ + ] Found:: UNIDENTIFIED
4633
4634 _[ - ]::--------------------------------------------------------------------------------------------------------------
4635|_[ + ] [ 72 / 100 ]-[14:50:50] [ - ]
4636|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3591/dakota-lotus.html ]
4637|_[ + ] Exploit::
4638|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4639|_[ + ] More details:: / - / , ISP:
4640|_[ + ] Found:: UNIDENTIFIED
4641
4642 _[ - ]::--------------------------------------------------------------------------------------------------------------
4643|_[ + ] [ 73 / 100 ]-[14:50:51] [ - ]
4644|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3460/alex-ruygrok.html ]
4645|_[ + ] Exploit::
4646|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4647|_[ + ] More details:: / - / , ISP:
4648|_[ + ] Found:: UNIDENTIFIED
4649
4650 _[ - ]::--------------------------------------------------------------------------------------------------------------
4651|_[ + ] [ 74 / 100 ]-[14:50:52] [ - ]
4652|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2799/julian-mohn.html ]
4653|_[ + ] Exploit::
4654|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4655|_[ + ] More details:: / - / , ISP:
4656|_[ + ] Found:: UNIDENTIFIED
4657
4658 _[ - ]::--------------------------------------------------------------------------------------------------------------
4659|_[ + ] [ 75 / 100 ]-[14:50:53] [ - ]
4660|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3678/sawyer-sharbino.html ]
4661|_[ + ] Exploit::
4662|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4663|_[ + ] More details:: / - / , ISP:
4664|_[ + ] Found:: UNIDENTIFIED
4665
4666 _[ - ]::--------------------------------------------------------------------------------------------------------------
4667|_[ + ] [ 76 / 100 ]-[14:50:54] [ - ]
4668|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3514/romeo-beckham.html ]
4669|_[ + ] Exploit::
4670|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4671|_[ + ] More details:: / - / , ISP:
4672|_[ + ] Found:: UNIDENTIFIED
4673
4674 _[ - ]::--------------------------------------------------------------------------------------------------------------
4675|_[ + ] [ 77 / 100 ]-[14:50:55] [ - ]
4676|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3308/dalila-bela.html ]
4677|_[ + ] Exploit::
4678|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4679|_[ + ] More details:: / - / , ISP:
4680|_[ + ] Found:: UNIDENTIFIED
4681
4682 _[ - ]::--------------------------------------------------------------------------------------------------------------
4683|_[ + ] [ 78 / 100 ]-[14:50:56] [ - ]
4684|_[ + ] Target:: [ http://www.teenidols4you.com/picture/896/3780/selena_gomez.html ]
4685|_[ + ] Exploit::
4686|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4687|_[ + ] More details:: / - / , ISP:
4688|_[ + ] Found:: UNIDENTIFIED
4689
4690 _[ - ]::--------------------------------------------------------------------------------------------------------------
4691|_[ + ] [ 79 / 100 ]-[14:50:57] [ - ]
4692|_[ + ] Target:: [ http://www.teenidols4you.com/picture/2879/4/mattyb.html ]
4693|_[ + ] Exploit::
4694|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4695|_[ + ] More details:: / - / , ISP:
4696|_[ + ] Found:: UNIDENTIFIED
4697
4698 _[ - ]::--------------------------------------------------------------------------------------------------------------
4699|_[ + ] [ 80 / 100 ]-[14:50:58] [ - ]
4700|_[ + ] Target:: [ http://www.teenidols4you.com/bio/Actors/2699/melissa-benoist.html ]
4701|_[ + ] Exploit::
4702|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4703|_[ + ] More details:: / - / , ISP:
4704|_[ + ] Found:: UNIDENTIFIED
4705
4706 _[ - ]::--------------------------------------------------------------------------------------------------------------
4707|_[ + ] [ 81 / 100 ]-[14:50:59] [ - ]
4708|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/2879/mattyb.html?prefer_full_site=true ]
4709|_[ + ] Exploit::
4710|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache/2.2.15 (CentOS) , IP:45.55.35.220:80
4711|_[ + ] More details:: / - / , ISP:
4712|_[ + ] Found:: UNIDENTIFIED
4713
4714 _[ - ]::--------------------------------------------------------------------------------------------------------------
4715|_[ + ] [ 82 / 100 ]-[14:51:02] [ - ]
4716|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3430/william-franklyn-miller.html ]
4717|_[ + ] Exploit::
4718|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4719|_[ + ] More details:: / - / , ISP:
4720|_[ + ] Found:: UNIDENTIFIED
4721
4722 _[ - ]::--------------------------------------------------------------------------------------------------------------
4723|_[ + ] [ 83 / 100 ]-[14:51:06] [ - ]
4724|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3522/why-dont-we.html ]
4725|_[ + ] Exploit::
4726|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4727|_[ + ] More details:: / - / , ISP:
4728|_[ + ] Found:: UNIDENTIFIED
4729
4730 _[ - ]::--------------------------------------------------------------------------------------------------------------
4731|_[ + ] [ 84 / 100 ]-[14:51:06] [ - ]
4732|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/1800/roberttsai.html?prefer_full_site=true ]
4733|_[ + ] Exploit::
4734|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache/2.2.15 (CentOS) , IP:45.55.35.220:80
4735|_[ + ] More details:: / - / , ISP:
4736|_[ + ] Found:: UNIDENTIFIED
4737
4738 _[ - ]::--------------------------------------------------------------------------------------------------------------
4739|_[ + ] [ 85 / 100 ]-[14:51:08] [ - ]
4740|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3204/robert-daniel-sloan.html ]
4741|_[ + ] Exploit::
4742|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4743|_[ + ] More details:: / - / , ISP:
4744|_[ + ] Found:: UNIDENTIFIED
4745
4746 _[ - ]::--------------------------------------------------------------------------------------------------------------
4747|_[ + ] [ 86 / 100 ]-[14:51:09] [ - ]
4748|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3398/jack-dylan-grazer.html ]
4749|_[ + ] Exploit::
4750|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4751|_[ + ] More details:: / - / , ISP:
4752|_[ + ] Found:: UNIDENTIFIED
4753
4754 _[ - ]::--------------------------------------------------------------------------------------------------------------
4755|_[ + ] [ 87 / 100 ]-[14:51:10] [ - ]
4756|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3319/finn-wolfhard-.html ]
4757|_[ + ] Exploit::
4758|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4759|_[ + ] More details:: / - / , ISP:
4760|_[ + ] Found:: UNIDENTIFIED
4761
4762 _[ - ]::--------------------------------------------------------------------------------------------------------------
4763|_[ + ] [ 88 / 100 ]-[14:51:11] [ - ]
4764|_[ + ] Target:: [ http://www.teenidols4you.com/filmo/Actors/3488/joshua-bassett.html ]
4765|_[ + ] Exploit::
4766|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4767|_[ + ] More details:: / - / , ISP:
4768|_[ + ] Found:: UNIDENTIFIED
4769
4770 _[ - ]::--------------------------------------------------------------------------------------------------------------
4771|_[ + ] [ 89 / 100 ]-[14:51:12] [ - ]
4772|_[ + ] Target:: [ http://www.teenidols4you.com/gallery/3342/christopher-paul-richards.html ]
4773|_[ + ] Exploit::
4774|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4775|_[ + ] More details:: / - / , ISP:
4776|_[ + ] Found:: UNIDENTIFIED
4777
4778 _[ - ]::--------------------------------------------------------------------------------------------------------------
4779|_[ + ] [ 90 / 100 ]-[14:51:13] [ - ]
4780|_[ + ] Target:: [ http://www.teenidols4you.com/picture/3270/4/asher-angel.html ]
4781|_[ + ] Exploit::
4782|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4783|_[ + ] More details:: / - / , ISP:
4784|_[ + ] Found:: UNIDENTIFIED
4785
4786 _[ - ]::--------------------------------------------------------------------------------------------------------------
4787|_[ + ] [ 91 / 100 ]-[14:51:14] [ - ]
4788|_[ + ] Target:: [ http://www.teenidols4you.com/picture/3597/4/rush-holland.html ]
4789|_[ + ] Exploit::
4790|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4791|_[ + ] More details:: / - / , ISP:
4792|_[ + ] Found:: UNIDENTIFIED
4793
4794 _[ - ]::--------------------------------------------------------------------------------------------------------------
4795|_[ + ] [ 92 / 100 ]-[14:51:15] [ - ]
4796|_[ + ] Target:: [ http://www.teenidols4you.com/pictures.html?g=Actors&pe=justinb ]
4797|_[ + ] Exploit::
4798|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4799|_[ + ] More details:: / - / , ISP:
4800|_[ + ] Found:: UNIDENTIFIED
4801
4802 _[ - ]::--------------------------------------------------------------------------------------------------------------
4803|_[ + ] [ 93 / 100 ]-[14:51:16] [ - ]
4804|_[ + ] Target:: [ http://www.teenidols4you.com/pictures.html?g=Actors&pe=matthew_underwood ]
4805|_[ + ] Exploit::
4806|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4807|_[ + ] More details:: / - / , ISP:
4808|_[ + ] Found:: UNIDENTIFIED
4809
4810 _[ - ]::--------------------------------------------------------------------------------------------------------------
4811|_[ + ] [ 94 / 100 ]-[14:51:17] [ - ]
4812|_[ + ] Target:: [ http://www.teenidols4you.com/pictures.html?g=Actors&pe=graham_phillips ]
4813|_[ + ] Exploit::
4814|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4815|_[ + ] More details:: / - / , ISP:
4816|_[ + ] Found:: UNIDENTIFIED
4817
4818 _[ - ]::--------------------------------------------------------------------------------------------------------------
4819|_[ + ] [ 95 / 100 ]-[14:51:18] [ - ]
4820|_[ + ] Target:: [ http://www.teenidols4you.com/picture/3754/4/nickolas-wolf.html ]
4821|_[ + ] Exploit::
4822|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4823|_[ + ] More details:: / - / , ISP:
4824|_[ + ] Found:: UNIDENTIFIED
4825
4826 _[ - ]::--------------------------------------------------------------------------------------------------------------
4827|_[ + ] [ 96 / 100 ]-[14:51:19] [ - ]
4828|_[ + ] Target:: [ http://www.teenidols4you.com/pictures.html?g=Actors&pe=shane_haboucha ]
4829|_[ + ] Exploit::
4830|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4831|_[ + ] More details:: / - / , ISP:
4832|_[ + ] Found:: UNIDENTIFIED
4833
4834 _[ - ]::--------------------------------------------------------------------------------------------------------------
4835|_[ + ] [ 97 / 100 ]-[14:51:20] [ - ]
4836|_[ + ] Target:: [ http://www.teenidols4you.com/picture/2582/4/austin-mahone.html ]
4837|_[ + ] Exploit::
4838|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4839|_[ + ] More details:: / - / , ISP:
4840|_[ + ] Found:: UNIDENTIFIED
4841
4842 _[ - ]::--------------------------------------------------------------------------------------------------------------
4843|_[ + ] [ 98 / 100 ]-[14:51:21] [ - ]
4844|_[ + ] Target:: [ http://www.teenidols4you.com/picture/2675/4/nick-merico.html ]
4845|_[ + ] Exploit::
4846|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4847|_[ + ] More details:: / - / , ISP:
4848|_[ + ] Found:: UNIDENTIFIED
4849
4850 _[ - ]::--------------------------------------------------------------------------------------------------------------
4851|_[ + ] [ 99 / 100 ]-[14:51:22] [ - ]
4852|_[ + ] Target:: [ http://www.teenidols4you.com/picture/3017/4/zac-mann.html ]
4853|_[ + ] Exploit::
4854|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.6.40, IP:45.55.35.220:80
4855|_[ + ] More details:: / - / , ISP:
4856|_[ + ] Found:: UNIDENTIFIED
4857
4858[ INFO ] [ Shutting down ]
4859[ INFO ] [ End of process INURLBR at [06-12-2019 14:51:22]
4860[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
4861[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.teenidols4you.com/output/inurlbr-www.teenidols4you.com ]
4862|_________________________________________________________________________________________
4863
4864\_________________________________________________________________________________________/
4865#################################################################################################
4866Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-06 14:51 EST
4867Nmap scan report for www.teenidols4you.com (45.55.35.220)
4868Host is up (0.076s latency).
4869rDNS record for 45.55.35.220: teenidols4you.com
4870
4871PORT STATE SERVICE VERSION
4872123/udp open ntp NTP v4 (secondary server)
4873| ntp-info:
4874|_ receive time stamp: 2019-12-06T19:51:44
4875| vulscan: VulDB - https://vuldb.com:
4876| [133843] ntp Port unknown vulnerability
4877| [128043] InfoVista VistaPortal SE 5.1 EditCurrentPresentSpace.jsp Parameter cross site scripting
4878| [128042] InfoVista VistaPortal SE 5.1 EditCurrentPool.jsp Parameter cross site scripting
4879| [128036] InfoVista VistaPortal SE 5.1 EditCurrentPresentSpace.jsp Parameter cross site scripting
4880| [105145] ntp up to 4.2.8p2-RC1/4.3.11 on Big Endian MD5 Key Generator ntp-keygen.c Variable weak encryption
4881| [96331] OpenNTPD up to 6.0 CN Validator weak authentication
4882| [95322] ntpd up to 4.2.8p8 Initial Sync Calculation unknown vulnerability
4883| [89036] Microsoft Windows up to Vista SP2 Print Spooler ntprint.dll PSetupDownloadAndInstallLegacyDriver privilege escalation
4884| [89035] Microsoft Windows up to Vista SP2 Print Spooler ntprint.dll PSetupDownloadAndInstallLegacyDriver memory corruption
4885| [87754] ntpd up to 4.2.8p7 Crypto-NAK Packet valid_NAK denial of service
4886| [87751] ntpd up to 4.2.8p7 Validation ntp_proto.c receive privilege escalation
4887| [60308] UTC Fire & Security GE-MC100-NTP/GPS-ZB Hardcoded Credentials unknown vulnerability
4888| [91177] WebTitan Appliance v3.50.x NTP Server Persistent cross site scripting
4889| [3368] Microsoft Windows up to Vista NNTP Response Heap-based memory corruption
4890| [141110] Cisco NX-OS ntp Packet Flooding denial of service
4891| [139263] Polycom Obihai Obi1022 5.1.11 NTP POST Request command injection
4892| [138862] Terracotta Quartz Scheduler up to 2.3.0 XML Data XMLSchedulingDataProcessor.java initDocumentParser XML External Entity
4893| [136554] Foxit Reader SDK Professsional 5.4.0.1031 Textbox IReader_ContentProvider PDF File memory corruption
4894| [136165] Foxit Reader SDK Professsional 5.4.0.1031 TextBox IReader_ContentProvider PDF File memory corruption
4895| [135088] ntp up to 4.2.8p12 NULL Pointer Dereference denial of service
4896| [131170] D-Link DIR-825 Rev.B 2.10 ntp_sync.cgi POST Request privilege escalation
4897| [129795] NTPsec up to 1.1.2 ntpd ntp_control.c denial of service
4898| [129794] NTPsec up to 1.1.2 ntp_control.c process_control() memory corruption
4899| [129793] NTPsec up to 1.1.2 ntp_control.c read_sysvars memory corruption
4900| [129792] NTPsec up to 1.1.2 ntpd ntp_config.c Request memory corruption
4901| [128241] jco.ir Karma 6.0.0 ContentPlaceHolder1_uxTitle ArchiveNews.aspx Parameter sql injection
4902| [124080] D-Link DIR-816 A2 1.10 B05 /goform/NTPSyncWithHost handler Shell Metacharacter command injection
4903| [122955] btrfsmaintenance up to 0.4.1 evaluate_auto_mountpoint Code Execution
4904| [121557] NeoMutt Message Data nntp.c memory corruption
4905| [121556] NeoMutt newsrc.c nntp_add_group memory corruption
4906| [119727] ntp 4.2.8p11 ntpq/ntpdc Long String Stack-based memory corruption
4907| [118765] Apple iOS up to 11.3.1 FontParser memory corruption
4908| [118715] Apple watchOS up to 4.3.0 FontParser memory corruption
4909| [117884] Foxit Reader 9.0.0.29935 PrintParams memory corruption
4910| [117883] Foxit Reader 9.0.0.29935 PrintParams memory corruption
4911| [114231] ntp 4.2.8p6/4.2.8p7/4.2.8p8/4.2.8p9/4.2.8p10 Symmetric Mode decodearr memory corruption
4912| [114140] ntp up to 4.2.8p11 Protocol Engine Source IP Address denial of service
4913| [114139] ntp up to 4.2.8p11 ntpd Timestamp denial of service
4914| [114138] ntp up to 4.2.8p11 ntpd ctl_getitem Packet denial of service
4915| [114137] ntp up to 4.2.8p6/4.3.91 ntpd Sybil privilege escalation
4916| [111779] Wireshark up to 2.4.3 JSON/XML/NTP/XMPP/GDB epan/tvbparse.c denial of service
4917| [104358] ntp up to 4.2.7 ntpd ntpd/ntp_config.c denial of service
4918| [98857] Apple tvOS up to 10.1 FontParser information disclosure
4919| [98856] Apple tvOS up to 10.1 FontParser memory corruption
4920| [98855] Apple tvOS up to 10.1 FontParser memory corruption
4921| [98854] Apple tvOS up to 10.1 FontParser memory corruption
4922| [98823] Apple watchOS up to 3.1 FontParser Out-of-Bounds information disclosure
4923| [98822] Apple watchOS up to 3.1 FontParser memory corruption
4924| [98821] Apple watchOS up to 3.1 FontParser memory corruption
4925| [98820] Apple watchOS up to 3.1 FontParser memory corruption
4926| [98741] Apple iOS up to 10.2 FontParser Out-of-Bounds information disclosure
4927| [98740] Apple iOS up to 10.2 FontParser memory corruption
4928| [98739] Apple iOS up to 10.2 FontParser memory corruption
4929| [98738] Apple iOS up to 10.2 FontParser memory corruption
4930| [98630] Apple macOS up to 10.12.3 FontParser Out-of-Bounds memory corruption
4931| [98629] Apple macOS up to 10.12.3 FontParser memory corruption
4932| [98628] Apple macOS up to 10.12.3 FontParser memory corruption
4933| [98627] Apple macOS up to 10.12.3 FontParser memory corruption
4934| [98552] ntp up to 4.2.8p9 Timestamp Origin Check spoofing
4935| [98551] ntp up to 4.2.8p9 ntpq Stack-based memory corruption
4936| [98550] ntp up to 4.2.8p9 Legacy MX4200 refclock mx4200_send memory corruption
4937| [98549] ntp up to 4.2.8p9 ctl_put memory corruption
4938| [98548] ntp up to 4.2.8p9 on Windows Data Structure denial of service
4939| [98545] ntp up to 4.2.8p9 Config Directive Segmentation Fault denial of service
4940| [98543] ntp up to 4.2.8p9 Configuration Directive denial of service
4941| [97826] Joomla CMS com_frontpage sql injection
4942| [95890] Apple watchOS up to 3.1.2 FontParser memory corruption
4943| [95889] Apple watchOS up to 3.1.2 FontParser memory corruption
4944| [95334] ntpd up to 4.2.8p8 on Windows UDP Packet denial of service
4945| [95333] ntpd up to 4.2.8p8 NULL Pointer Dereference denial of service
4946| [95332] ntpd up to 4.2.8p8 Control Mode privilege escalation
4947| [95321] ntpd up to 4.2.8p8 Origin Timestamp Protection Bypass privilege escalation
4948| [95320] ntpd up to 4.2.8p8 Source denial of service
4949| [95319] ntpd up to 4.2.8p8 Broadcast Packet denial of service
4950| [95318] ntpd up to 4.2.8p8 Broadcast Mode Replay Prevention denial of service
4951| [95317] ntpd up to 4.2.8p8 Rate Limit spoofing denial of service
4952| [94382] Apple macOS up to 10.12.1 FontParser memory corruption
4953| [94381] Apple macOS up to 10.12.1 FontParser memory corruption
4954| [94255] Apple tvOS up to 10.0 FontParser memory corruption
4955| [94254] Apple tvOS up to 10.0 FontParser memory corruption
4956| [94180] Apple iOS up to 10.1.1 FontParser memory corruption
4957| [94179] Apple iOS up to 10.1.1 FontParser memory corruption
4958| [93993] BusyBox NTP Packet networking/ntpd.c recv_and_process_client_pkt denial of service
4959| [93745] ntpd up to 4.2.8p8/4.3.93 UDP Packet NULL Pointer Dereference denial of service
4960| [93087] Apple watchOS up to 3.0 FontParser User information disclosure
4961| [93076] Apple tvOS up to 10.0 FontParser Out-of-Bounds information disclosure
4962| [93064] Apple macOS 10.12.0 FontParser Out-of-Bounds information disclosure
4963| [93044] Apple iOS up to 10.0.3 FontParser Out-of-Bounds information disclosure
4964| [92853] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 NTP denial of service
4965| [92127] Apple tvOS up to 9.x FontParser Memory information disclosure
4966| [92108] Apple watchOS up to 2.x FontParser Memory information disclosure
4967| [92076] Apple macOS up to 10.11 FontParser memory corruption
4968| [91998] Apple iOS up to 10 FontParser memory corruption
4969| [91519] Microsoft Internet Explorer 9/10/11 MSHTML HandleStyleComponentProperty memory corruption
4970| [90452] Cisco IOS 15.5(3)S3/15.6(1)S2/15.6(2)S1/15.6(2)T1 NTP Interface Queue denial of service
4971| [88542] Meinberg IMS-LANTIME up to 6.20 NTP Time Server privilege escalation
4972| [88541] Meinberg IMS-LANTIME up to 6.20 NTP Time Server POST Request Stack-Based memory corruption
4973| [88540] Meinberg IMS-LANTIME up to 6.20 NTP Time Server POST Request Stack-Based memory corruption
4974| [87753] ntpd up to 4.2.8p7 Synchronization denial of service
4975| [87752] ntpd up to 4.2.8p7 Autokey denial of service
4976| [87750] ntpd up to 4.2.8p7 MAC denial of service
4977| [82989] ntp 4.2.8 ctl_getitem denial of service
4978| [82988] ntp 4.2.8 MATCH_ASSOC denial of service
4979| [82987] ntp 4.2.8 Trusted Key denial of service
4980| [82986] ntp 4.2.8 unconfig Directive denial of service
4981| [82985] ntp 4.2.8 IPv4 Bogon Packet privilege escalation
4982| [82983] ntp 4.2.8 Ephemeral Association privilege escalation
4983| [82982] ntp 4.2.8 ntpd Client privilege escalation
4984| [82981] ntp 4.2.8 Crypto NAK denial of service
4985| [82723] Cisco IOS/IOS XE ntp Time privilege escalation
4986| [81486] Apple iOS up to 9.2 FontParser memory corruption
4987| [81435] Apple Mac OS X up to 10.11.3 FontParser memory corruption
4988| [80654] ntp 4.2.8p5 ntpq Replay privilege escalation
4989| [80653] ntp 4.2.8p5 ntpq/ntpdc information disclosure
4990| [80652] ntp 4.2.8p5 ntpq Infinite Loop denial of service
4991| [80651] ntp 4.2.8p5 Origin Timestamp privilege escalation
4992| [80650] ntp 4.2.8p5 Authenticated Broadcast Mode privilege escalation
4993| [80649] ntp 4.2.8p5 reslist Command Stack-Based denial of service
4994| [80648] ntp 4.2.8p5 ntpdc NULL Pointer Dereference denial of service
4995| [80647] ntp 4.2.8p5 ntpq privilege escalation
4996| [80645] ntp 4.2.8p5 Key Checker spoofing
4997| [80644] ntp 4.2.8p5 Broadcast privilege escalation
4998| [78936] ntpd up to 4.2.8p5/4.3.78 ntp_crypto.c privilege escalation
4999| [78938] ntpd 4.2.8 sntp denial of service
5000| [78937] ntpd 4.2.8 logconfig Command Crash denial of service
5001| [78859] ntpd 4.2.8 autokey ntp_crypto.c denial of service
5002| [78858] ntpd 4.2.8 autokey ntp_crypto.c denial of service
5003| [78857] ntpd 4.2.8 ntp_crypto.c Extension Field denial of service
5004| [78856] ntpd 4.2.8 decodenetnum denial of service
5005| [78855] ntpd 4.2.8 KoD Packet denial of service
5006| [78854] ntpd 4.2.8 Rate Limit denial of service
5007| [78853] ntpd 4.2.8 Configuration Directive directory traversal
5008| [78852] ntpd 4.2.8 CRYPTO_ASSOC information disclosure
5009| [78851] ntpd 4.2.8 Private Mode Integer denial of service
5010| [78850] ntpd 4.2.8 Password Management Key File Use-After-Free memory corruption
5011| [78849] ntpd 4.2.8 Remote Configuration denial of service
5012| [78848] ntpd 4.2.8 URL Request save_config directory traversal
5013| [78847] ntpd 4.2.8 cookedprint memory corruption
5014| [78846] ntpd 4.2.8 refclock memory corruption
5015| [78845] ntpd 4.2.8 Password Management Heap-based memory corruption
5016| [78844] ntpd 4.2.8 Crypto-NAK Packet Logic privilege escalation
5017| [78808] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5018| [78807] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5019| [78806] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5020| [78805] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5021| [78804] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5022| [78803] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5023| [78802] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5024| [78801] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5025| [78800] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5026| [78799] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5027| [78798] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5028| [78797] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
5029| [78745] Apple iOS up to 9.0 FontParser Font File memory corruption
5030| [78744] Apple iOS up to 9.0 FontParser Font File memory corruption
5031| [78743] Apple iOS up to 9.0 FontParser Font File memory corruption
5032| [78742] Apple iOS up to 9.0 FontParser Font File memory corruption
5033| [78741] Apple iOS up to 9.0 FontParser Font File memory corruption
5034| [78740] Apple iOS up to 9.0 FontParser Font File memory corruption
5035| [78739] Apple iOS up to 9.0 FontParser Font File memory corruption
5036| [78738] Apple iOS up to 9.0 FontParser Font File memory corruption
5037| [78737] Apple iOS up to 9.0 FontParser Font File memory corruption
5038| [78736] Apple iOS up to 9.0 FontParser Font File memory corruption
5039| [78735] Apple iOS up to 9.0 FontParser Font File memory corruption
5040| [78734] Apple iOS up to 9.0 FontParser Font File memory corruption
5041| [78200] ntp up to 4.2.7 on Linux/OS X ntpd ntp_io.c spoofing
5042| [78199] ntp up to 4.2.7 ntpd ntp_crypto.c memory corruption
5043| [77314] pfSense up to 2.2.2 services_ntpd.php cross site scripting
5044| [77193] Apple Mac OS X up to 10.10.4 FontParser memory corruption
5045| [77192] Apple Mac OS X up to 10.10.4 FontParser memory corruption
5046| [77191] Apple Mac OS X up to 10.10.4 FontParser memory corruption
5047| [77147] Apple iOS up to 8.4.0 FontParser memory corruption
5048| [77146] Apple iOS up to 8.4.0 FontParser memory corruption
5049| [77145] Apple iOS up to 8.4.0 FontParser memory corruption
5050| [76265] Apple Mac OS X up to 10.10.3 FontParser TrueTypeScaler Font File memory corruption
5051| [75452] Apple Watch OS 1.0 FontParser memory corruption
5052| [74740] Apple MacOS X up to 10.10.2 ntp weak authentication
5053| [74718] Apple MacOS X up to 10.10.2 FontParser memory corruption
5054| [74665] ntpd up to 4.2.8 Symmetric Mode denial of service
5055| [74664] ntpd up to 4.2.8 MAC Checker weak authentication
5056| [74290] Dell Asset Manager GetClientPackage.aspx sql injection
5057| [69165] Red Hat JBoss Enterprise Application Platform 6.3.3 RESTEasy DocumentProvider XML External Entity
5058| [68927] Apple iOS up to 8.1.2 FontParser memory corruption
5059| [68926] Apple iOS up to 8.1.2 FontParser memory corruption
5060| [68879] Apple Mac OS X 10.8.5/10.9.5/10.10/10.10.1 FontParser memory corruption
5061| [68878] Apple Mac OS X 10.8.5/10.9.5/10.10/10.10.1 FontParser memory corruption
5062| [68456] NTP Daemon up to 4.2.7 Random Generator ntp_config.c config_auth weak authentication
5063| [68641] NTP Daemon 4.2.7 PRNG Crash information disclosure
5064| [68640] NTP Daemon 4.2.7 PRNG spoofing
5065| [68457] NTP Daemon up to 4.2.7 Random Generator weak authentication
5066| [68455] NTP Daemon up to 4.2.7 ntp_proto.c receive denial of service
5067| [68454] NTP Daemon up to 4.2.7 configure memory corruption
5068| [68453] NTP Daemon up to 4.2.7 ctl_putdata memory corruption
5069| [68452] NTP Daemon up to 4.2.7 crypto_recv memory corruption
5070| [71475] wEPISDParentPortal 1.0 X.509 Certificate spoofing
5071| [67032] Cisco IOS/IOS XE 15.2/15.4 NTP Service privilege escalation
5072| [11702] NTP Project ntpd 4.2.6 monlist Functionality ntp_request.c query denial of service
5073| [65493] Dlink DSL-2760U sntpcfg.cgi cross site scripting
5074| [10540] Google Chrome 29.0.1547.76 XML Document xmldocumentparser.cpp append memory corruption
5075| [10494] Cisco IOS/IOS XE NTP denial of service
5076| [9806] TRENDnet TEW-812DRU Input Sanitizer setNTP.cgi cross site scripting
5077| [11630] Python 2.6.8/2.7.5/3.3.2 nntplib readline denial of service
5078| [60183] Instantphp lknSupport Search Module cross site scripting
5079| [59298] Instantphp Jobs Pro 1.6.4 search_jobs.html sql injection
5080| [58483] CMU Cyrus IMAP Server up to 2.4.4 nntpd.c split_wildmats memory corruption
5081| [56769] IBM WebSphere Application Server up to 6.1.0.10 getACRWorkElementPtr denial of service
5082| [5339] WebMaster Solutions WmsCms 2.0 printpage.asp Eingabe sql injection
5083| [52232] PaymentProcessorScript PPScript shop.htm sql injection
5084| [51585] TYPO3 mjseventpro 0.2.1 sql injection
5085| [4078] Sun Solaris NTP Mode 7 Request denial of service
5086| [48235] ntp up to 4.2.x ntp_crypto.c crypto_recv memory corruption
5087| [47706] ntp up to 4.2.4p7 ntpq/ntpq.c cookedprint memory corruption
5088| [45910] Goople CMS 1.8.2 frontpage.php sql injection
5089| [45837] Goople CMS up to 1.8.2 frontpage.php sql injection
5090| [45794] NTP up to 4.2.4p4 EVP_VerifyFinal memory corruption
5091| [43343] Alain Barbet Filesys Smbclientparser up to 2.6 SMB Server filesys::smbclientparser memory corruption
5092| [41522] XOOPS Tutoriais Module up to 2.1b printpage.php sql injection
5093| [40320] Agares Media phpAutoVideo 2.21 frontpage_right.php privilege escalation
5094| [40250] Agares Media Arcadem 2.04 frontpage_right.php privilege escalation
5095| [36948] Johntp adsense-deluxe 0.x on WordPress adsense-deluxe.php cross site request forgery
5096| [35867] Free Php Scripts Free Image Hosting up to 2.0 Login frontpage.php privilege escalation
5097| [34928] HP Mercury Performance Center Agent 8.0 magentproc.exe memory corruption
5098| [34504] Uberghey CMS 0.3.1 frontpage.php privilege escalation
5099| [32641] Dan Jensen Travelsized CMS up to 0.4 frontpage.php privilege escalation
5100|
5101| MITRE CVE - https://cve.mitre.org:
5102| [CVE-2013-1997] Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
5103| [CVE-2013-1984] Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
5104| [CVE-2012-4258] Multiple SQL injection vulnerabilities in MYRE Real Estate Software (2012 Q2) allow remote attackers to execute arbitrary SQL commands via the (1) link_idd parameter to 1_mobile/listings.php or (2) userid parameter to 1_mobile/agentprofile.php.
5105| [CVE-2012-3375] The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.
5106| [CVE-2012-1288] The UTC Fire & Security GE-MC100-NTP/GPS-ZB Master Clock device uses hardcoded credentials for an administrative account, which makes it easier for remote attackers to obtain access via an HTTP session.
5107| [CVE-2011-4859] The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port.
5108| [CVE-2011-3208] Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command.
5109| [CVE-2011-2724] The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547.
5110| [CVE-2011-1313] Double free vulnerability in IBM WebSphere Application Server (WAS) 6.1.0.x before 6.1.0.35 and 7.x before 7.0.0.15 allows remote backend IIOP servers to cause a denial of service (S0C4 ABEND and storage corruption) by rejecting IIOP requests at opportunistic time instants, as demonstrated by requests associated with an ORB_Request::getACRWorkElementPtr function call.
5111| [CVE-2011-1082] fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
5112| [CVE-2010-4539] The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
5113| [CVE-2010-3879] FUSE, possibly 2.8.5 and earlier, allows local users to create mtab entries with arbitrary pathnames, and consequently unmount any filesystem, via a symlink attack on the parent directory of the mountpoint of a FUSE filesystem, a different vulnerability than CVE-2010-0789.
5114| [CVE-2010-2896] IBM FileNet Content Manager (CM) 4.0.0, 4.0.1, 4.5.0, and 4.5.1 before FP4 does not properly manage the InheritParentPermissions setting during an upgrade from 3.x, which might allow attackers to bypass intended folder permissions via unspecified vectors.
5115| [CVE-2010-2121] Opera 9.52 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.
5116| [CVE-2010-2119] Microsoft Internet Explorer 6.0.2900.2180 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid nntp:// URIs.
5117| [CVE-2010-2117] Mozilla Firefox 3.0.19, 3.5.x, and 3.6.x allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.
5118| [CVE-2010-1721] SQL injection vulnerability in the Intellectual Property (aka IProperty or com_iproperty) component 1.5.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an agentproperties action to index.php.
5119| [CVE-2010-1708] Multiple SQL injection vulnerabilities in agentadmin.php in Free Realty allow remote attackers to execute arbitrary SQL commands via the (1) login field (aka agentname parameter) or (2) password field (aka agentpassword parameter).
5120| [CVE-2010-1078] SQL injection vulnerability in archive.php in XlentProjects SphereCMS 1.1 alpha allows remote attackers to execute arbitrary SQL commands via encoded null bytes ("%00") in the view parameter, which bypasses a protection mechanism.
5121| [CVE-2010-0790] sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary files via the mountpoint name.
5122| [CVE-2010-0789] fusermount in FUSE before 2.7.5, and 2.8.x before 2.8.2, allows local users to unmount an arbitrary FUSE filesystem share via a symlink attack on a mountpoint.
5123| [CVE-2010-0787] client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
5124| [CVE-2010-0547] client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
5125| [CVE-2010-0340] SQL injection vulnerability in the MJS Event Pro (mjseventpro) extension 0.2.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
5126| [CVE-2010-0296] The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
5127| [CVE-2010-0293] The client logging functionality in chronyd in Chrony before 1.23.1 does not restrict the amount of memory used for storage of client information, which allows remote attackers to cause a denial of service (memory consumption) via spoofed (1) NTP or (2) cmdmon packets.
5128| [CVE-2010-0182] The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
5129| [CVE-2009-4724] SQL injection vulnerability in shop.htm in PaymentProcessorScript.net PPScript allows remote attackers to execute arbitrary SQL commands via the cid parameter.
5130| [CVE-2009-3562] Cross-site scripting (XSS) vulnerability in Xerver HTTP Server 4.32 allows remote attackers to inject arbitrary web script or HTML via the currentPath parameter in a chooseDirectory action.
5131| [CVE-2009-3561] Directory traversal vulnerability in Xerver HTTP Server 4.32 allows remote attackers to read arbitrary files via a full pathname with a drive letter in the currentPath parameter in a chooseDirectory action.
5132| [CVE-2009-2869] Unspecified vulnerability in Cisco IOS 12.2XNA, 12.2XNB, 12.2XNC, 12.2XND, 12.4MD, 12.4T, 12.4XZ, and 12.4YA allows remote attackers to cause a denial of service (device reload) via a crafted NTPv4 packet, aka Bug IDs CSCsu24505 and CSCsv75948.
5133| [CVE-2009-1252] Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
5134| [CVE-2009-0159] Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
5135| [CVE-2009-0121] SQL injection vulnerability in frontpage.php in Goople CMS 1.8.2 allows remote attackers to execute arbitrary SQL commands via the password parameter. NOTE: the provenance of this information is unknown
5136| [CVE-2009-0111] SQL injection vulnerability in frontpage.php in Goople CMS 1.8.2 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.
5137| [CVE-2009-0021] NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
5138| [CVE-2008-6982] Cross-site scripting (XSS) vulnerability in index.php in devalcms 1.4a allows remote attackers to inject arbitrary web script or HTML via the currentpath parameter.
5139| [CVE-2008-6865] SQL injection vulnerability in modules.php in the Sectionsnew module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the artid parameter in a printpage action.
5140| [CVE-2008-6728] SQL injection vulnerability in the Sections module in PHP-Nuke, probably before 8.0, allows remote attackers to execute arbitrary SQL commands via the artid parameter in a printpage action to modules.php.
5141| [CVE-2008-6255] Multiple SQL injection vulnerabilities in vBulletin 3.7.4 allow remote authenticated administrators to execute arbitrary SQL commands via the (1) answer parameter to admincp/verify.php, (2) extension parameter in an edit action to admincp/attachmentpermission.php, and the (3) iperm parameter to admincp/image.php.
5142| [CVE-2008-5362] The DefineConstantPool action in the ActionScript 2 virtual machine in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0, and Adobe AIR before 1.5, accepts an untrusted input value for a "constant count," which allows remote attackers to read sensitive data from process memory via a crafted PDF file.
5143| [CVE-2008-5361] The ActionScript 2 virtual machine in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0, and Adobe AIR before 1.5, does not verify a member element's size when performing (1) DefineConstantPool, (2) ActionJump, (3) ActionPush, (4) ActionTry, and unspecified other actions, which allows remote attackers to read sensitive data from process memory via a crafted PDF file.
5144| [CVE-2008-5066] PHP remote file inclusion vulnerability in upload/admin/frontpage_right.php in Agares Media ThemeSiteScript 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter.
5145| [CVE-2008-4253] The FlexGrid ActiveX control in Microsoft Visual Basic 6.0, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, Office FrontPage 2002 SP3, and Office Project 2003 SP3 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "FlexGrid Control Memory Corruption Vulnerability."
5146| [CVE-2008-4174] Multiple cross-site scripting (XSS) vulnerabilities in index.php in Dynamic MP3 Lister 2.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) currentpath, (2) invert, (3) search, and (4) sort parameters.
5147| [CVE-2008-3970] pam_mount 0.10 through 0.45, when luserconf is enabled, does not verify mountpoint and source ownership before mounting a user-defined volume, which allows local users to bypass intended access restrictions via a local mount.
5148| [CVE-2008-3285] The Filesys::SmbClientParser module 2.7 and earlier for Perl allows remote SMB servers to execute arbitrary code via a folder name containing shell metacharacters.
5149| [CVE-2008-2931] The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.
5150| [CVE-2008-2913] Directory traversal vulnerability in func.php in Devalcms 1.4a, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the currentpath parameter, in conjunction with certain ... (triple dot) and ..... sequences in the currentfile parameter, to index.php.
5151| [CVE-2008-2751] Multiple cross-site scripting (XSS) vulnerabilities in the Glassfish webadmin interface in Sun Java System Application Server 9.1_01 allow remote attackers to inject arbitrary web script or HTML via the (1) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiProp:JndiNew, (2) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:resTypeProp:resType, (3) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:factoryClassProp:factoryClass, or (4) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:descProp:desc parameter to (a) resourceNode/customResourceNew.jsf
5152| [CVE-2008-2649] Multiple PHP remote file inclusion vulnerabilities in DesktopOnNet 3 Beta allow remote attackers to execute arbitrary PHP code via a URL in the app_path parameter to (1) don3_requiem.don3app/don3_requiem.php and (2) frontpage.don3app/frontpage.php.
5153| [CVE-2008-1351] SQL injection vulnerability in the Tutorials 2.1b module for XOOPS allows remote attackers to execute arbitrary SQL commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php.
5154| [CVE-2008-1053] Multiple SQL injection vulnerabilities in the Kose_Yazilari module for PHP-Nuke allow remote attackers to execute arbitrary SQL commands via the artid parameter in a (1) viewarticle or (2) printpage action to modules.php.
5155| [CVE-2008-0435] Directory traversal vulnerability in index.php in OZJournals 2.1.1 allows remote attackers to read portions of arbitrary files via a .. (dot dot) in the id parameter in a printpreview action.
5156| [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
5157| [CVE-2007-6614] PHP remote file inclusion vulnerability in admin/frontpage_right.php in Agares Media phpAutoVideo 2.21 allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter, a related issue to CVE-2007-6542.
5158| [CVE-2007-6542] PHP remote file inclusion vulnerability in admin/frontpage_right.php in Arcadem LE 2.04 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter.
5159| [CVE-2007-6499] Unspecified vulnerability in Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote authenticated users to uninstall the FrontPage extensions of an arbitrary account via a request to fp2002/UNINSTAL.asp with a "host id (IIS) value."
5160| [CVE-2007-6455] Multiple cross-site scripting (XSS) vulnerabilities in index.php in Mambo 4.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) Itemid parameter in a com_frontpage option and the (2) option parameter.
5161| [CVE-2007-4841] Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to execute arbitrary commands via a (1) mailto, (2) nntp, (3) news, or (4) snews URI with invalid "%" encoding, related to improper file type handling on Windows XP with Internet Explorer 7 installed, a variant of CVE-2007-3845.
5162| [CVE-2007-4042] Multiple argument injection vulnerabilities in Netscape Navigator 9 allow remote attackers to execute arbitrary commands via a NULL byte (%00) and shell metacharacters in a (1) mailto, (2) nntp, (3) news, (4) snews, or (5) telnet URI, a similar issue to CVE-2007-3670.
5163| [CVE-2007-4041] Multiple argument injection vulnerabilities in Mozilla Firefox 2.0.0.5 and 3.0alpha allow remote attackers to execute arbitrary commands via a NULL byte (%00) and shell metacharacters in a (1) mailto, (2) nntp, (3) news, (4) snews, or (5) telnet URI, a similar issue to CVE-2007-3670.
5164| [CVE-2007-3897] Heap-based buffer overflow in Microsoft Outlook Express 6 and earlier, and Windows Mail for Vista, allows remote Network News Transfer Protocol (NNTP) servers to execute arbitrary code via long NNTP responses that trigger memory corruption.
5165| [CVE-2007-3109] The CERN Image Map Dispatcher (htimage.exe) in Microsoft FrontPage allows remote attackers to determine the existence, and possibly partial contents, of arbitrary files under the web root via a relative pathname in the PATH_INFO.
5166| [CVE-2007-1715] PHP remote file inclusion vulnerability in frontpage.php in Free Image Hosting 2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: the forgot_pass.php vector is already covered by CVE-2006-5670, and the login.php vector overlaps CVE-2006-5763.
5167| [CVE-2007-1560] The clientProcessRequest() function in src/client_side.c in Squid 2.6 before 2.6.STABLE12 allows remote attackers to cause a denial of service (daemon crash) via crafted TRACE requests that trigger an assertion error.
5168| [CVE-2007-0604] Cross-site scripting (XSS) vulnerability in Movable Type (MT) before 3.34 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the MTCommentPreviewIsStatic tag, which can open the "comment entry screen," a different vulnerability than CVE-2007-0231.
5169| [CVE-2007-0446] Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.
5170| [CVE-2007-0359] PHP remote file inclusion vulnerability in frontpage.php in Uberghey CMS 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the setup_folder parameter.
5171| [CVE-2006-7160] The Sandbox.sys driver in Outpost Firewall PRO 4.0, and possibly earlier versions, does not validate arguments to hooked SSDT functions, which allows local users to cause a denial of service (crash) via invalid arguments to the (1) NtAssignProcessToJobObject,, (2) NtCreateKey, (3) NtCreateThread, (4) NtDeleteFile, (5) NtLoadDriver, (6) NtOpenProcess, (7) NtProtectVirtualMemory, (8) NtReplaceKey, (9) NtTerminateProcess, (10) NtTerminateThread, (11) NtUnloadDriver, and (12) NtWriteVirtualMemory functions.
5172| [CVE-2006-6187] Multiple SQL injection vulnerabilities in ClickTech Click Gallery allow remote attackers to execute arbitrary SQL commands via the (1) currentpage or (2) gallery_id parameter to (a) view_gallery.asp, the (3) image_id parameter to (b) download_image.asp, the currentpage or (5) orderby parameter to (c) gallery.asp, or the currentpage parameter to (d) view_recent.asp.
5173| [CVE-2006-5864] Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.
5174| [CVE-2006-5182] PHP remote file inclusion vulnerability in frontpage.php in Dan Jensen Travelsized CMS 0.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the setup_folder parameter.
5175| [CVE-2006-5020] Multiple PHP remote file inclusion vulnerabilities in SolidState 0.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the base_path parameter in manager/pages/ scripts including (1) AccountsPage.class.php, (2) AddInvoicePage.class.php, (3) AddIPAddressPage.class.php, (4) AddPaymentPage.class.php, (5) AddTaxRulePage.class.php, (6) AssignDomainPage.class.php, (7) AssignHostingPage.class.php, (8) AssignProductPage.class.php, (9) BillingPage.class.php, (10) BillingPaymentPage.class.php, (11) BrowseAccountsPage.class.php, (12) BrowseInvoicesPage.class.php, (13) ConfigureEditUserPage.class.php, (14) ConfigureNewUserPage.class.php, (15) ConfigureNewUserReceiptPage.class.php, (16) ConfigureUsersPage.class.php, (17) DeleteAccountPage.class.php, (18) DeleteDomainServicePage.class.php, (19) DeleteHostingServicePage.class.php, (20) DeleteInvoicePage.class.php, (21) DeleteProductPage.class.php, (22) DeleteServerPage.class.php, (23) DomainServicesPage.class.php, (24) DomainsPage.class.php, (25) EditAccountPage.class.php, (26) EditDomainPage.class.php, (27) EditDomainServicePage.class.php, (28) EditHostingServicePage.class.php, (29) EditPaymentPage.class.php, (30) EditProductPage.class.php, (31) EditServerPage.class.php, (32) EmailInvoicePage.class.php, (33) ExecuteOrderPage.class.php, (34) ExpiredDomainsPage.class.php, (35) FulfilledOrdersPage.class.php, (36) GenerateInvoicesPage.class.php, (37) HomePage.class.php, (38) InactiveAccountsPage.class.php, (39) IPManagerPage.class.php, (40) LoginPage.class.php, (41) LogPage.class.php, (42) ModulesPage.class.php, (43) NewAccountPage.class.php, (44) NewDomainServicePage.class.php, (45) NewProductPage.class.php, (46) OutstandingInvoicesPage.class.php, (47) PendingAccountsPage.class.php, (48) PendingOrdersPage.class.php, (49) PrintInvoicePage.class.php, (50) ProductsPage.class.php, (51) RegisterDomainPage.class.php, (52) RegisteredDomainsPage.class.php, (53) ServersPage.class.php, (54) ServicesHostingServicesPage.class.php, (55) ServicesNewHostingPage.class.php, (56) ServicesPage.class.php, (57) ServicesWebHostingPage.class.php, (58) SettingsPage.class.php, (59) TaxesPage.class.php, (60) TransferDomainPage.class.php, (61) ViewAccountPage.class.php, (62) ViewDomainServicePage.class.php, (63) ViewHostingServicePage.class.php, (64) ViewInvoicePage.class.php, (65) ViewLogMessagePage.class.php, (66) ViewOrderPage.class.php, (67) ViewProductPage.class.php, (68) ViewServerPage.class.php, (69) WelcomeEmailPage.class.php
5176| [CVE-2006-4286] ** DISPUTED ** PHP remote file inclusion vulnerability in contentpublisher.php in the contentpublisher component (com_contentpublisher) for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by third parties who state that contentpublisher.php protects against direct request in the most recent version. The original researcher is known to be frequently inaccurate.
5177| [CVE-2006-4103] PHP remote file inclusion vulnerability in article-raw.php in Jason Alexander phNNTP 1.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the file_newsportal parameter.
5178| [CVE-2006-4055] Multiple PHP remote file inclusion vulnerabilities in Olaf Noehring The Search Engine Project (TSEP) 0.942 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the tsep_config[absPath] parameter to (1) include/colorswitch.php, (2) contentimages.class.php, (3) ipfunctions.php, (4) configfunctions.php, (5) printpagedetails.php, or (6) log.class.php. NOTE: the copyright.php vector is already covered by CVE-2006-3993.
5179| [CVE-2006-3628] Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
5180| [CVE-2006-3026] Multiple cross-site scripting (XSS) vulnerabilities in ClickGallery 5.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) gallery_id parameter in gallery.asp and (2) parentcurrentpage parameter in view_gallery.asp.
5181| [CVE-2006-2490] Multiple cross-site scripting (XSS) vulnerabilities in Mobotix IP Network Cameras M1 1.9.4.7 and M10 2.0.5.2, and other versions before 2.2.3.18 for M10/D10 and 3.0.3.31 for M22, allow remote attackers to inject arbitrary web script or HTML via URL-encoded values in (1) the query string to help/help, (2) the get_image_info_abspath parameter to control/eventplayer, and (3) the source_ip parameter to events.tar.
5182| [CVE-2006-1662] The frontpage option in Limbo CMS 1.0.4.2 and 1.0.4.1 allows remote attackers to execute arbitrary PHP commands via the Itemid parameter in index.php.
5183| [CVE-2006-1437] UPOINT @1 Event Publisher stores sensitive information under the web document root with insufifcient access control, which allows remote attackers to read private comments via a direct request to eventpublisher.txt.
5184| [CVE-2006-1436] Multiple cross-site scripting (XSS) vulnerabilities in UPOINT @1 Event Publisher allow remote attackers to inject arbitrary web script or HTML via the (1) Event, (2) Description, (3) Time, (4) Website, and (5) Public Remarks fields to (a) eventpublisher_admin.htm and (b) eventpublisher_usersubmit.htm.
5185| [CVE-2006-0375] Advantage Century Telecommunication (ACT) P202S IP Phone 1.01.21 running firmware 1.1.21 on VxWorks uses a hardcoded Network Time Protocol (NTP) server in Taiwan, which could allow remote attackers to provide false time information, block access to time information, or conduct other attacks.
5186| [CVE-2006-0015] Cross-site scripting (XSS) vulnerability in _vti_bin/_vti_adm/fpadmdll.dll in Microsoft FrontPage Server Extensions 2002 and SharePoint Team Services allows remote attackers to inject arbitrary web script or HTML, then leverage the attack to execute arbitrary programs or create new accounts, via the (1) operation, (2) command, and (3) name parameters.
5187| [CVE-2005-4716] Hitachi TP1/Server Base and TP1/NET/Library 2 on IBM AIX allow remote attackers to (1) cause a denial of service (OpenTP1 system outage) via invalid data to a port used by a system-server process, and (2) cause a denial of service (process failure) via invalid data to a port used by any of certain other processes.
5188| [CVE-2005-3356] The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice ("double decrement") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors.
5189| [CVE-2005-3120] Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
5190| [CVE-2005-2658] Buffer overflow in utility.cpp in Turquoise SuperStat (turqstat) 2.2.4 and earlier might allow remote NNTP servers to execute arbitrary code via a date with a long month.
5191| [CVE-2005-2428] Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
5192| [CVE-2005-1363] Multiple SQL injection vulnerabilities in MetaCart 2.0 for PayFlow allow remote attackers to execute arbitrary commands via (1) intCatalogID, (2) strSubCatalogID, or (3) strSubCatalog_NAME parameter to productsByCategory.asp, (4) curCatalogID, (5) strSubCatalog_NAME, (6) intCatalogID, or (7) page parameter to productsByCategory.asp or (8) intProdID parameter to product.asp.
5193| [CVE-2005-1362] Multiple SQL injection vulnerabilities in MetaCart 2.0 for Paypal allow remote attackers to execute arbitrary SQL commands via the (1) intProdID parameter to product.asp, (2) intCatalogID or (3) strSubCatalogID parameters to productsByCategory.asp, (4) chkText, (5) strText, (6) chkPrice, (7) intPrice, (8) chkCat, or (9) strCat parameters to searchAction.asp.
5194| [CVE-2005-1361] Multiple SQL injection vulnerabilities in MetaCart e-Shop 8.0 allow remote attackers to execute arbitrary SQL commands via the (1) intProdID parameter in product.asp or (2) strCatalog_NAME parameter to productsByCategory.asp.
5195| [CVE-2005-1213] Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.
5196| [CVE-2005-0807] Multiple buffer overflows in Cain & Abel before 2.67 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via (1) an IKE packet with a large ID field that is not properly handled by the PSK sniffer filter, (2) the HTTP sniffer filter, or the (3) POP3, (4) SMTP, (5) IMAP, (6) NNTP, or (7) TDS sniffer filters.
5197| [CVE-2005-0785] Cross-site scripting (XSS) vulnerability in usersrecentposts in YaBB 2.0 rc1 allows remote attackers to inject arbitrary web script or HTML via the username parameter.
5198| [CVE-2005-0741] Cross-site scripting (XSS) vulnerability in YaBB.pl for YaBB 2.0 RC1 allows remote attackers to inject arbitrary web script or HTML via the username parameter in a usersrecentposts action.
5199| [CVE-2005-0736] Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
5200| [CVE-2005-0719] Unknown vulnerability in the systems message queue in HP Tru64 Unix 4.0F PK8 through 5.1B-2/PK4 allows local users to cause a denial of service (process crash) for processes such as nfsstat, pfstat, arp, ogated, rarpd, route, sendmail, srconfig, strsetup, trpt, netstat, and xntpd.
5201| [CVE-2005-0101] Buffer overflow in the socket_getline function in Newspost 2.1.1 and earlier allows remote malicious NNTP servers to execute arbitrary code via a long string without a newline character.
5202| [CVE-2004-2068] fetchnews in leafnode 1.9.47 and earlier allows remote attackers to cause a denial of service (process hang) via an emptry NNTP news article with missing mandatory headers.
5203| [CVE-2004-1719] Multiple cross-site scripting (XSS) vulnerabilities in Merak Webmail Server 5.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) category, (2) cserver, (3) ext, (4) global, (5) showgroups, (6) or showlite parameters to address.html, or the (7) spage or (8) autoresponder parameters to settings.html, the (9) folder parameter to readmail.html, or the (10) attachmentpage_text_error parameter to attachment.html, (11) folder, (12) ct, or (13) cv parameters to calendar.html, (14) an <img> tag, or (15) the subject of an e-mail message.
5204| [CVE-2004-1610] SalesLogix 6.1 uses client-specified pathnames for writing certain files, which might allow remote authenticated users to create arbitrary files and execute code via the (1) vMME.AttachmentPath or (2) vMME.LibraryPath variables.
5205| [CVE-2004-1316] Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.
5206| [CVE-2004-0574] The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.
5207| [CVE-2003-1266] The (1) FTP, (2) POP3, (3) SMTP, and (4) NNTP servers in EServer 2.92 through 2.97, and possibly 2.98, allow remote attackers to cause a denial of service (crash) via a large amount of data.
5208| [CVE-2003-0824] Unknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.
5209| [CVE-2003-0822] Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
5210| [CVE-2003-0744] The fetchnews NNTP client in leafnode 1.9.3 to 1.9.41 allows remote attackers to cause a denial of service (process hang and termination) via certain malformed Usenet news articles that cause fetchnews to hang while waiting for input.
5211| [CVE-2002-2317] Memory leak in the (1) httpd, (2) nntpd, and (3) vpn driver in VelociRaptor 1.0 allows remote attackers to cause a denial of service (memory consumption) via an unknown method.
5212| [CVE-2002-2305] SQL injection vulnerability in agentadmin.php in Immobilier allows remote attackers to execute arbitrary SQL commands via the (1) agentname or (2) agentpassword parameter.
5213| [CVE-2002-2262] Unspecified vulnerability in xntpd of HP-UX 10.20 through 11.11 allows remote attackers to cause a denial of service (hang) via unknown attack vectors.
5214| [CVE-2002-1789] Format string vulnerability in newsx NNTP client before 1.4.8 allows local users to execute arbitrary code via format string specifiers that are not properly handled in a call to the syslog function.
5215| [CVE-2002-1788] Format string vulnerability in the nn_exitmsg function in nn 6.6.0 through 6.6.3 allows remote NNTP servers to execute arbitrary code via format strings in server responses.
5216| [CVE-2002-1718] Microsoft Internet Information Server (IIS) 5.1 may allow remote attackers to view the contents of a Frontpage Server Extension (FPSE) file, as claimed using an HTTP request for colegal.htm that contains .. (dot dot) sequences.
5217| [CVE-2002-0913] Format string vulnerability in log_doit function of Slurp NNTP client 1.1.0 allows a malicious news server to execute arbitrary code on the client via format strings in a server response.
5218| [CVE-2002-0909] Multiple buffer overflows in mnews 1.22 and earlier allow (1) a remote NNTP server to execute arbitrary code via long responses, or local users can gain privileges via long command line arguments (2) -f, (3) -n, (4) -D, (5) -M, or (6) -P, or via long environment variables (7) JNAMES or (8) MAILSERVER.
5219| [CVE-2002-0692] Buffer overflow in SmartHTML Interpreter (shtml.dll) in Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to cause a denial of service (CPU consumption) or run arbitrary code, respectively, via a certain type of web file request.
5220| [CVE-2002-0525] Format string vulnerabilities in (1) inews or (2) rnews for INN 2.2.3 and earlier allow local users and remote malicious NNTP servers to gain privileges via format string specifiers in NTTP responses.
5221| [CVE-2002-0002] Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
5222| [CVE-2001-1204] Directory traversal vulnerability in phprocketaddin in Total PC Solutions PHP Rocket Add-in for FrontPage 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter.
5223| [CVE-2001-0764] Buffer overflow in ntping in scotty 2.1.0 allows local users to execute arbitrary code via a long hostname as a command line argument.
5224| [CVE-2001-0543] Memory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed posts.
5225| [CVE-2001-0414] Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.
5226| [CVE-2001-0341] Buffer overflow in Microsoft Visual Studio RAD Support sub-component of FrontPage Server Extensions allows remote attackers to execute arbitrary commands via a long registration request (URL) to fp30reg.dll.
5227| [CVE-2001-0096] FrontPage Server Extensions (FPSE) in IIS 4.0 and 5.0 allows remote attackers to cause a denial of service via a malformed form, aka the "Malformed Web Form Submission" vulnerability.
5228| [CVE-2000-0438] Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
5229| [CVE-2000-0431] Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files.
5230| [CVE-2000-0341] ATRIUM Cassandra NNTP Server 1.10 allows remote attackers to cause a denial of service via a long login name.
5231| [CVE-2000-0256] Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the "Server-Side Image Map Components" vulnerability.
5232| [CVE-2000-0153] FrontPage Personal Web Server (PWS) allows remote attackers to read files via a .... (dot dot) attack.
5233| [CVE-2000-0122] Frontpage Server Extensions allows remote attackers to determine the physical path of a virtual directory via a GET request to the htimage.exe CGI program.
5234| [CVE-2000-0114] Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
5235| [CVE-1999-1016] Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.
5236| [CVE-1999-0681] Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL.
5237| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
5238| [CVE-2009-3563] ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
5239| [CVE-2006-2334] The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.
5240| [CVE-2006-1711] Plone 2.0.5, 2.1.2, and 2.5-beta1 does not restrict access to the (1) changeMemberPortrait, (2) deletePersonalPortrait, and (3) testCurrentPassword methods, which allows remote attackers to modify portraits.
5241| [CVE-2005-2496] The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.
5242| [CVE-2005-1911] The fetchnews NNTP client in leafnode 1.11.2 and earlier can hang while waiting for input that never arrives, which allows remote NNTP servers to cause a denial of service (news loss).
5243| [CVE-2005-1453] fetchnews in leafnode 1.9.48 to 1.11.1 allows remote NNTP servers to cause a denial of service (crash) by closing the connection while fetchnews is reading (1) an article header or (2) an article body, which also prevents fetchnews from querying other servers.
5244| [CVE-2004-0657] Integer overflow in the NTP daemon (NTPd) before 4.0 causes the NTP server to return the wrong date/time offset when a client requests a date/time that is more than 34 years away from the server's time.
5245| [CVE-2002-0427] Buffer overflows in fpexec in mod_frontpage before 1.6.1 may allow attackers to gain root privileges.
5246| [CVE-2000-0710] The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers determine the physical path of the server components by requesting an invalid URL whose name includes a standard DOS device name.
5247| [CVE-2000-0709] The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers to cause a denial of service in some components by requesting a URL whose name includes a standard DOS device name.
5248| [CVE-2000-0413] The shtml.exe program in the FrontPage extensions package of IIS 4.0 and 5.0 allows remote attackers to determine the physical path of HTML, HTM, ASP, and SHTML files by requesting a file that does not exist, which generates an error message that reveals the path.
5249| [CVE-1999-1376] Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands.
5250| [CVE-1999-1052] Microsoft FrontPage stores form results in a default location in /_private/form_results.txt, which is world-readable and accessible in the document root, which allows remote attackers to read possibly sensitive information submitted by other users.
5251| [CVE-1999-1043] Microsoft Exchange Server 5.5 and 5.0 does not properly handle (1) malformed NNTP data, or (2) malformed SMTP data, which allows remote attackers to cause a denial of service (application error).
5252| [CVE-1999-0386] Microsoft Personal Web Server and FrontPage Personal Web Server in some Windows systems allows a remote attacker to read files on the server by using a nonstandard URL.
5253|
5254| SecurityFocus - https://www.securityfocus.com/bid/:
5255| [104517] NTP CVE-2018-12327 Stack Buffer Overflow Vulnerability
5256| [103351] NTP CVE-2018-7183 Buffer Overflow Vulnerability
5257| [103339] NTP CVE-2018-7185 Denial of Service Vulnerability
5258| [103194] NTP CVE-2018-7170 Incomplete Fix Remote Security Vulnerability
5259| [103192] NTP CVE-2018-7184 Denial of Service Vulnerability
5260| [103191] NTP CVE-2018-7182 Information Disclosure Vulnerability
5261| [97078] NTP CVE-2017-6452 Local Stack Based Buffer Overflow Vulnerability
5262| [97076] NTP CVE-2017-6459 Local Denial of Service Vulnerability
5263| [97074] NTP CVE-2017-6455 Local Denial of Service Vulnerability
5264| [97058] NTP CVE-2017-6451 Local Denial of Service Vulnerability
5265| [97052] NTP CVE-2017-6460 Stack Buffer Overflow Vulnerability
5266| [97051] NTP CVE-2017-6458 Buffer Overflow Vulnerability
5267| [97050] NTP CVE-2017-6464 Denial of Service Vulnerability
5268| [97049] NTP CVE-2017-6463 Denial of Service Vulnerability
5269| [97046] NTP CVE-2016-9042 Denial of Service Vulnerability
5270| [97045] NTP CVE-2017-6462 Local Buffer Overflow Vulnerability
5271| [94455] NTP CVE-2016-7433 Local Denial of Service Vulnerability
5272| [94454] NTP CVE-2016-7431 Denial of Service Vulnerability
5273| [94453] NTP CVE-2016-7429 Local Denial of Service Vulnerability
5274| [94452] NTP CVE-2016-9310 Denial of Service Vulnerability
5275| [94451] NTP CVE-2016-7426 Local Denial of Service Vulnerability
5276| [94450] NTP CVE-2016-9312 Denial of Service Vulnerability
5277| [94448] NTP CVE-2016-7434 Local Denial of Service Vulnerability
5278| [94447] NTP CVE-2016-7427 Denial of Service Vulnerability
5279| [94446] NTP CVE-2016-7428 Denial of Service Vulnerability
5280| [94444] NTP CVE-2016-9311 NULL Pointer Dereference Denial of Service Vulnerability
5281| [92277] BusyBox 'networking/ntpd.c' Remote Denial of Service Vulnerability
5282| [91400] Meinberg NTP Time Server Multiple Privilege Escalation and Buffer Overflow Vulnerabilities
5283| [91180] Foxit Reader 'CPDF_StreamContentParser::~CPDF_StreamContentParser' Memory Corruption Vulnerability
5284| [91010] NTP CVE-2016-4953 Denial of Service Vulnerability
5285| [91009] NTP CVE-2016-4956 Incomplete Fix Denial of Service Vulnerability
5286| [91007] NTP CVE-2016-4955 Denial of Service Vulnerability
5287| [90818] OpenNTPD 'ntpd/constraint.c' Certificate Validation Security Bypass Vulnerability
5288| [88276] NTP CVE-2016-1547 Denial of Service Vulnerability
5289| [88264] NTP CVE-2016-1548 Security Bypass Vulnerability
5290| [88261] NTP CVE-2016-1550 Local Security Bypass Vulnerability
5291| [88226] NTP CVE-2016-2518 Denial of Service Vulnerability
5292| [88219] NTP CVE-2016-1551 Remote Security Vulnerability
5293| [88204] NTP CVE-2016-2519 Denial of Service Vulnerability
5294| [88200] NTP CVE-2016-1549 Remote Security Vulnerability
5295| [88189] NTP CVE-2016-2517 Denial of Service Vulnerability
5296| [88180] NTP CVE-2016-2516 Denial of Service Vulnerability
5297| [88081] Microsoft FrontPage CVE-1999-1052 Information Disclosure Vulnerability
5298| [86089] Microsoft FrontPage CVE-2007-3109 Remote Security Vulnerability
5299| [83193] NTP CVE-2004-0657 Remote Security Vulnerability
5300| [82105] NTP CVE-2015-8139 Security Bypass Vulnerability
5301| [82102] NTP CVE-2015-8140 Security Bypass Vulnerability
5302| [81963] NTP CVE-2015-7973 Security Bypass Vulnerability
5303| [81962] NTP CVE-2015-7978 Denial of Service Vulnerability
5304| [81960] NTP CVE-2015-7974 Symmetric Key Encryption Authentication Security Bypass Vulnerability
5305| [81959] NTP CVE-2015-7975 Local Denial of Service Vulnerability
5306| [81816] NTP CVE-2015-7979 Denial of Service Vulnerability
5307| [81815] NTP CVE-2015-7977 NULL Pointer Dereference Denial of Service Vulnerability
5308| [81814] NTP CVE-2015-8158 Denial of Service Vulnerability
5309| [81811] NTP CVE-2015-8138 Denial of Service Vulnerability
5310| [81552] NTP Cronjob Script CVE-2016-0727 Local Privilege Escalation Vulnerability
5311| [77288] Network Time Protocol 'ntpq.c' Memory Corruption Vulnerability
5312| [77286] NTP CVE-2015-7702 Incomplete Fix Denial of Service Vulnerability
5313| [77285] NTP CVE-2015-7692 Incomplete Fix Denial of Service Vulnerability
5314| [77282] Network Time Protocol 'ntp_control.c' Directory Traversal Vulnerability
5315| [77281] NTP CVE-2015-7701 Denial of Service Vulnerability
5316| [77278] NTP Multiple Arbitrary File Overwrite Vulnerabilities
5317| [77274] NTP CVE-2015-7691 Incomplete Fix Denial of Service Vulnerability
5318| [76476] RETIRED: NTP CVE-2015-5196 Multiple Arbitrary File Overwrite Vulnerabilities
5319| [76475] NTP CVE-2015-5194 Denial of Service Vulnerability
5320| [76474] NTP 'ntpd/ntp_config.c' Remote Denial of Service Vulnerability
5321| [76473] NTP CVE-2015-5219 Denial of Service Vulnerability
5322| [75589] NTP CVE-2015-5146 Denial of Service Vulnerability
5323| [73951] NTP CVE-2015-1798 Man in the Middle Security Bypass Vulnerability
5324| [73950] NTP CVE-2015-1799 Denial of Service Vulnerability
5325| [73713] Mjseventpro CVE-2010-0340 SQL-Injection Vulnerability
5326| [72584] NTP 'ntp_io.c' Authentication Security Bypass Vulnerability
5327| [72583] NTP 'ntp_crypto.c' Information Disclosure Vulnerability
5328| [71969] Network Time Protocol ntpdc Local Buffer Overflow Vulnerability
5329| [65434] Apache Subversion 'mod_dav_svn' Module SVNListParentPath Denial of Service Vulnerability
5330| [64692] NTP 'ntp_request.c' Remote Denial of Service Vulnerability
5331| [62185] Microsoft FrontPage CVE-2013-3137 Information Disclosure Vulnerability
5332| [55561] IFOBS 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities
5333| [54283] Linux Kernel 'fs/eventpoll.c' Local Denial of Service Vulnerability
5334| [52083] UTC Fire & Security GE-MC100-NTP/GPS-ZB Default Credentials Authentication Bypass Vulnerability
5335| [46630] Linux Kernel epoll Subsystem 'eventpoll.c' Multiple Local Denial of Service Vulnerabilities
5336| [45792] HP LoadRunner 'magentproc.exe' Remote Code Execution Vulnerability
5337| [41798] IBM FileNet Content Manager 'InheritParentPermissions' Flag Security Bypass Vulnerability
5338| [39479] Mozilla Firefox/Thunderbird/SeaMonkey 'nsIContentPolicy' Security Bypass Vulnerability
5339| [38309] XlentProjects SphereCMS 'archive.php' SQL Injection Vulnerability
5340| [37781] TYPO3 MJS Event Pro (mjseventpro) Unspecified SQL Injection Vulnerability
5341| [37255] NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
5342| [36502] Cisco IOS NTPv4 Reply Packet Remote Denial of Service Vulnerability
5343| [36457] Xerver Administration Interface 'currentPath' Parameter Cross Site Scripting Vulnerability
5344| [35017] NTP 'ntpd' Autokey Stack Buffer Overflow Vulnerability
5345| [34481] NTP 'ntpq' Stack Buffer Overflow Vulnerability
5346| [33290] TimeTools NTP Time Server Syslog Monitor Remote Denial of Service Vulnerability
5347| [33135] Goople CMS 'frontpage.php' SQL Injection Vulnerability
5348| [32352] vBulletin 'admincp/attachmentpermission.php' SQL Injection Vulnerability
5349| [31959] Agares Media ThemeSiteScript 'frontpage_right.php' Remote File Include Vulnerability
5350| [30290] SmbClientParser Perl Module Remote Command Execution Vulnerability
5351| [28297] Travelsized CMS 'frontpage.php' and 'index.php' Multiple Input Validation Vulnerabilities
5352| [28230] XOOPS MyTutorials Module 'printpage.php' SQL Injection Vulnerability
5353| [27375] OZ Journals 'printpreview' Local File Disclosure Vulnerability
5354| [26986] Arcadem LE 'frontpage_right.php' Remote File Include Vulnerability
5355| [25908] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability
5356| [22223] Hitachi OpenTP1 Unspecified Remote Denial of Service Vulnerability
5357| [22098] Uberghey Frontpage.PHP Remote File Include Vulnerability
5358| [20321] Travelsized CMS Frontpage.PHP Remote File Include Vulnerability
5359| [20044] Limbo CMS Frontpage Arbitrary File Upload Vulnerability
5360| [19423] phNNTP File_newsportal Remote File Include Vulnerability
5361| [17452] Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
5362| [16902] Limbo CMS Frontpage Arbitrary PHP Command Execution Vulnerability
5363| [15117] Lynx NNTP Article Header Buffer Overflow Vulnerability
5364| [15093] Hitachi OpenTP1 Denial Of Service Vulnerability
5365| [14673] NTPD Insecure Privileges Vulnerability
5366| [13951] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow Vulnerability
5367| [13376] MetaCart E-Shop V-8 IntProdID Parameter Remote SQL Injection Vulnerability
5368| [12756] YaBB Remote UsersRecentPosts Cross-Site Scripting Vulnerability
5369| [12141] Microsoft FrontPage 2000 Internet Publishing Service Provider DAV File Upload Vulnerability
5370| [11412] Microsoft Frontpage Asycpict.DLL JPEG Handling Remote Denial of Service Vulnerabilities
5371| [11379] Microsoft NNTP Component Heap Overflow Vulnerability
5372| [9008] Microsoft FrontPage Server Extensions SmartHTML Interpreter Denial Of Service Vulnerability
5373| [9007] Microsoft FrontPage Server Extensions Remote Debug Buffer Overrun Vulnerability
5374| [6522] EType EServ NNTP Remote Denial Of Service Vulnerability
5375| [6356] HP-UX xntpd Unspecified Denial Of Service Vulnerability
5376| [5804] Microsoft FrontPage Server Extensions SmartHTML Buffer Overflow Vulnerability
5377| [5240] NewsX NNTP SysLog Format String Vulnerability
5378| [5160] Kim Storm NN NNTP Error Message Format String Vulnerability
5379| [4251] Improved mod_frontpage Buffer Overflow Vulnerability
5380| [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
5381| [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
5382| [3751] Total PC Solutions PHP Rocket Add-in for FrontPage Directory Traversal Vulnerability
5383| [3183] Microsoft Windows NNTP Denial of Service Vulnerability
5384| [2911] Juergen Schoenwaelder scotty ntping Buffer Overflow Vulnerability
5385| [2540] Ntpd Remote Buffer Overflow Vulnerability
5386| [1608] Microsoft FrontPage Server Extensions MS-DOS Device Name Denial Of Service Vulnerability
5387| [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
5388| [1435] Microsoft FrontPage 2000 Server Extensions Denial Of Service Vulnerability
5389| [1205] Microsoft FrontPage Extensions .pwd File Permissions Vulnerability
5390| [1174] Microsoft Frontpage Server Extensions Path Disclosure Vulnerability
5391| [1156] Cassandra NNTPServer v1.10 Buffer Overflow Vulnerability
5392| [1141] MS Frontpage htimage.exe File Existence Disclosure Vulnerability
5393| [1117] MS Frontpage Image Mapper Buffer Overflow Vulnerability
5394| [1109] MS IIS FrontPage 98 Extensions Buffer Overflow Vulnerability
5395| [1108] MS IIS FrontPage 98 Extensions Filename Obfuscation Vulnerability
5396| [989] Microsoft FrontPage PWS Directory Traversal Vulnerability
5397| [964] MS Frontpage htimage.exe Path Leak Vulnerability
5398| [568] Microsoft FrontPage PWS DoS Vulnerability
5399| [74045] NTP 'ntp-keygen.c' Predictable Random Number Generator Weakness
5400| [71762] NTP 'ntp-keygen.c' Predictable Random Number Generator Weakness
5401| [71757] NTP 'ntp_config.c' Insufficient Entropy Security Weakness
5402| [10980] Microsoft NTP Time Synchronization Spoof Weakness
5403|
5404| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5405| [82317] ownCloud viewer.php and addMountPoint.php cross-site scripting
5406| [52238] Microsoft FrontPage Server Extensions Vital Information Leakage
5407| [36554] Wireshark NTP dissector format string vulnerable Windows version detected
5408| [6730] Microsoft FrontPage Server Extensions Visual Studio RAD Support sub-component buffer overflow
5409| [86041] TRENDnet TEW-812DRU uapply.cgi and setNTP.cgi cross-site request forgery
5410| [82084] IB-NAS5220 and IB-NAS4220-B ntp_name parameter cross-site scripting
5411| [78636] IFOBS regclientprint.jsp cross-site scripting
5412| [76340] MYRE Real Estate Mobile listings.php and agentprofile.php SQL injection
5413| [75403] MYRE Real Estate Mobile listings.php and agentprofile.php SQL injection
5414| [73583] Moodle frontpage security bypass
5415| [70325] Cyrus IMAPd NNTP security bypass
5416| [66589] Linux Kernel eventpoll.c denial of service
5417| [66034] Linux NTP buffer overflow
5418| [65872] Linux Kernel eventpoll.c denial of service
5419| [62765] Plesk Small Business Manager currentPageId SQL injection
5420| [60481] IBM FileNet Content Manager InheritParentPermissions security bypass
5421| [59090] Opera news:// and nntp:// URI denial of service
5422| [59088] Microsoft Internet Explorer nntp:// URIs denial of service
5423| [59086] Mozilla Firefox news:// and nntp:// URI denial of service
5424| [58364] HP LoadRunner Agent magentproc.exe code execution
5425| [57822] Magneto Software SntpGetReply buffer overflow
5426| [54650] NTP mode7 (MODE_PRIVATE) denial of service
5427| [53675] XLink Omni-NFS Enterprise ntpd.exe buffer overflow
5428| [53663] Xerver currentPath directory traversal
5429| [53662] Xerver currentPath cross-site scripting
5430| [53455] Cisco IOS NTPv4 denial of service
5431| [52468] TGS Content Management index.php and frontpage_ception.php SQL injection
5432| [52237] Microsoft FrontPage Server Extensions To Do List Found
5433| [52236] Microsoft FrontPage Server Extensions Machine Name Disclosure
5434| [52235] Microsoft FrontPage Configuration Information Leakage
5435| [52234] Microsoft FrontPage '_vti_cnf' Information Leakage
5436| [50617] NTP ntpd buffer overflow
5437| [50258] Drupal frontpage forms information disclosure
5438| [49838] NTP cookedprint() buffer overflow
5439| [48023] Windows NTP Time Server Syslog Monitor syslog message denial of service
5440| [47773] Goople CMS frontpage.php SQL injection
5441| [47244] Adobe AIR and Adobe Flash Player DefineConstantPool information disclosure
5442| [46174] ThemeSiteScript frontpage_right.php file include
5443| [44940] devalcms currentpath parameter cross-site scripting
5444| [43910] Filesys::SmbClientParser directory command execution
5445| [43418] Avaya Messaging Storage Server date, time and NTP server command execution
5446| [41538] Perlbal ClientProxy.pm denial of service
5447| [41181] tutorials module for XOOPS printpage.php and index.php SQL injection
5448| [40129] Leafnode fetchnews NNTP client denial of service
5449| [39414] WordPress XMLRPC metaWeblog.getRecentPosts function informaiton disclosure
5450| [39266] phpAutoVideo frontpage_right.php file include
5451| [39228] Arcadem LE frontpage_right.php file include
5452| [36811] Microsoft Outlook Express and Windows Mail NNTP response code execution
5453| [34720] Microsoft FrontPage Personal Web Server CERN Image Map Dispatcher buffer overflow
5454| [34719] Microsoft FrontPage CERN Image Map Dispatcher information disclosure
5455| [33124] Squid clientProcessRequest() function denial of service
5456| [32247] RHSA-2006:0393 updates for ntp not installed
5457| [32076] Microsoft Frontpage Extensions directory /_vti_pvt/ present
5458| [31553] Uberghey CMS frontpage.php file include
5459| [29337] Travelsized CMS frontpage.php file include
5460| [28271] phNNTP article-raw.php file include
5461| [27828] Wireshark (Ethereal) NTP dissector format string
5462| [25965] @1 Event Publisher eventpublisher.txt information disclosure
5463| [25537] Microsoft FrontPage Server Extensions HTML cross-site scripting
5464| [22748] Hitachi OpenTP1 denial of service
5465| [22035] NTP incorrect group permissions
5466| [21537] Microsoft FrontPage style tag denial of service
5467| [20830] Microsoft Outlook Express NNTP Response Parsing buffer overflow
5468| [20283] MetaCart e-Shop intProdID and intCatalogID parameters SQL injection
5469| [19186] newsfetch NNTP responses buffer overflow
5470| [18711] Mozilla NNTP buffer overflow
5471| [17739] Microsoft FrontPage and Internet Explorer asycpict.dll JPEG denial of service
5472| [17641] Microsoft Windows NNTP buffer overflow
5473| [15406] NTP integer buffer overflow
5474| [13680] Microsoft FrontPage Server Extensions SmartHTML Interpreter denial of service
5475| [13674] Microsoft FrontPage Server Extensions debug buffer overflow
5476| [11873] Microsoft Internet Explorer, Outlook, and FrontPage shlwapi.dll library denial of service
5477| [10942] Leafnode NNTP server denial of service
5478| [10836] HP-UX xntpd denial of service
5479| [10195] Microsoft FrontPage Server Extensions (FPSE) 2002 SmartHTML Interpreter buffer overflow
5480| [10194] Microsoft FrontPage Server Extensions (FPSE) 2000 SmartHTML Interpreter denial of service
5481| [9583] newsx NNTP client syslog() local format string
5482| [9491] nn NNTP error message format string
5483| [9270] slurp NNTP client syslog() format string
5484| [9226] mnews NNTP response remote buffer overflow
5485| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
5486| [8733] SNTP time broadcast audit
5487| [8517] NNTP port probe
5488| [8513] SNTP malformed packet
5489| [8411] NTP servers from which the router obtains time are set
5490| [8410] NTP server is enabled on the router
5491| [8400] Apache HTTP Server mod_frontpage buffer overflows
5492| [8362] Microsoft FrontPage form_results.txt is world readable
5493| [7951] Shell metacharacters in NNTP fields
5494| [7795] Microsoft FrontPage Server Extensions (FPSE) "
5495| [7788] Microsoft FrontPage Server Extensions (FPSE) "
5496| [7749] PHP Rocket Add-in for FrontPage "
5497| [7710] NNTP Subject
5498| [6977] Microsoft Windows NT and 2000 NNTP memory leak denial of service
5499| [6735] Scotty ntping buffer overflow could allow the execution of arbitrary code
5500| [6321] Ntpd server readvar control message buffer overflow
5501| [5494] Microsoft FrontPage 98 Server Extensions fpcount.exe CGI can be remotely crashed
5502| [5124] Microsoft FrontPage Server Extensions device name denial of service
5503| [4899] Microsoft FrontPage Extensions shtml.dll multiple access denial of service
5504| [4484] Microsoft FrontPage Server Extensions image mapping components allow remote code execution
5505| [4439] Microsoft FrontPage Server Extensions"
5506| [4410] CASSANDRA NNTP server buffer overflow
5507| [4333] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file buffer overflow
5508| [4268] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file could allow remote ASP source retrieval
5509| [3393] Microsoft FrontPage Extensions authors.pwd file could reveal encrypted passwords
5510| [3391] Microsoft FrontPage Extensions service.pwd file could reveal encrypted passwords
5511| [3178] Exchange NNTP server unauthenticated command
5512| [3174] Exchange NNTP server dropped connection
5513| [3117] Microsoft FrontPage long URL buffer overflow
5514| [1223] Microsoft Exchange Server SMTP and NNTP denial of service
5515| [908] Microsoft FrontPage extensions under Unix create world readable password files
5516| [670] NNTP username
5517| [669] NNTP password
5518| [668] NNTP group
5519| [561] Microsoft FrontPage 1.1 allows users to write to executable directories
5520| [438] NNTP daemon
5521| [89] NNTP reading
5522| [88] NNTP posting
5523|
5524| Exploit-DB - https://www.exploit-db.com:
5525| [27620] Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
5526| [25536] MetaCart E-Shop V-8 IntProdID Parameter Remote SQL Injection Vulnerability
5527| [25199] YaBB 2.0 - Remote UsersRecentPosts Cross-Site Scripting Vulnerability
5528| [22124] EType EServ 1.9x NNTP Remote Denial of Service Vulnerability
5529| [20960] Juergen Schoenwaelder scotty 2.1.x ntping Buffer Overflow Vulnerability
5530| [20727] Ntpd Remote Buffer Overflow Vulnerability
5531| [19897] FrontPage 2000,IIS 4.0/5.0 Server Extensions Path Disclosure Vulnerability
5532| [19884] Atrium Software Cassandra NNTP Server 1.10 Buffer Overflow Vulnerability
5533| [19846] MS FrontPage 98 Server Extensions for IIS,MS InterDev 1.0 - Buffer Overflow Vulnerability
5534| [19445] Microsoft FrontPage Personal WebServer 1.0 PWS DoS Vulnerability
5535| [16960] Linux NTP query client 4.2.6p1 - Heap Overflow Vulnerability
5536| [5245] XOOPS Module tutorials (printpage.php) SQL Injection Vulnerability
5537| [3147] Uberghey 0.3.1 (frontpage.php) Remote File Include Vulnerability
5538| [2148] phNNTP <= 1.3 (article-raw.php) Remote File Include Vulnerability
5539| [28809] HP LoadRunner magentproc.exe Overflow
5540| [27894] obotix IP Camera M1 1.9.4 .7/M10 2.0.5 .2 eventplayer get_image_info_abspath Parameter XSS
5541| [24379] Merak Mail Server 7.4.5 attachment.html attachmentpage_text_error Parameter XSS
5542| [19877] FrontPage 98/Personal WebServer 1.0,Personal Web Server 2.0 htimage.exe File Existence Disclosure
5543| [19853] FrontPage 97/98 Server Image Mapper Buffer Overflow
5544| [19845] MS FrontPage 98 Server Extensions for IIS,MS InterDev 1.0 Filename Obfuscation
5545| [19753] ms frontpage personal webserver 1.0/personal web server 4.0 - Directory Traversal
5546| [19605] Linux Kernel fs/eventpoll.c Local Denial of Service
5547| [16379] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow
5548| [16356] Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow
5549| [16285] NTP daemon readvar Buffer Overflow
5550| [15838] OpenClassifieds 1.7.0.3 Chained: Captcha Bypass->SQLi->Persistent XSS on Frontpage
5551| [12204] MagnetoSoft SNTP 4.0.0.7 - ActiveX SntpSendRequest Crash PoC
5552| [12203] MagnetoSoft SNTP 4.0.0.7 - ActiveX SntpGetReply BOF
5553| [9940] ntpd 4.0.99j-k readvar Buffer Overflow
5554| [7683] Goople <= 1.8.2 (frontpage.php) Blind SQL Injection Exploit
5555| [2471] Travelsized CMS <= 0.4 (frontpage.php) Remote File Include Exploit
5556| [1066] MS Outlook Express NNTP Buffer Overflow Exploit (MS05-030)
5557| [578] MS Windows NNTP Service (XPAT) Denial of Service Exploit (MS04-036)
5558| [121] MS Frontpage Server Extensions fp30reg.dll Exploit (MS03-051)
5559|
5560| OpenVAS (Nessus) - http://www.openvas.org:
5561| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
5562| [900652] NTP 'ntpd' Autokey Stack Overflow Vulnerability
5563| [900623] NTP Stack Buffer Overflow Vulnerability
5564| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
5565| [800408] NTP EVP_VerifyFinal() Security Bypass Vulnerability
5566| [800407] NTP Version Detection (Linux)
5567| [100399] NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
5568| [56769] FreeBSD Ports: frontpage -- cross site scripting vulnerability
5569| [10884] NTP read variables
5570| [880846] CentOS Update for ntp CESA-2009:1648 centos4 i386
5571| [880814] CentOS Update for ntp CESA-2009:0046 centos5 i386
5572| [880810] CentOS Update for ntp CESA-2009:1648 centos5 i386
5573| [880762] CentOS Update for ntp CESA-2009:1039 centos5 i386
5574| [880690] CentOS Update for ntp CESA-2009:1651 centos3 i386
5575| [855775] Solaris Update for usr/sbin/ntpq 141396-01
5576| [855676] Solaris Update for ntpq 141911-01
5577| [855649] Solaris Update for ntpq 141910-01
5578| [855628] Solaris Update for usr/sbin/ntpq 141397-01
5579| [855247] Solaris Update for /usr/lib/inet/xntpd and /usr/sbin/ntpdate 109668-07
5580| [855010] Solaris Update for /usr/lib/inet/xntpd and /usr/sbin/ntpdate 109667-07
5581| [835252] HP-UX Update for XNTP HPSBUX02639
5582| [835204] HP-UX Update for XNTP HPSBUX02437
5583| [835161] HP-UX Update for xntpd HPSBUX00232
5584| [835070] HP-UX Update for xntpd(1M) HPSBUX00148
5585| [100608] Windows NT NNTP Component Buffer Overflow
5586| [66662] FreeBSD Security Advisory (FreeBSD-SA-10:02.ntpd.asc)
5587| [66639] Gentoo Security Advisory GLSA 201001-01 (ntp)
5588| [66527] CentOS Security Advisory CESA-2009:1648 (ntp)
5589| [66526] CentOS Security Advisory CESA-2009:1651 (ntp)
5590| [66519] Slackware Advisory SSA:2009-343-01 ntp
5591| [66515] Debian Security Advisory DSA 1948-1 (ntp)
5592| [66511] Fedora Core 10 FEDORA-2009-13121 (ntp)
5593| [66507] Fedora Core 11 FEDORA-2009-13090 (ntp)
5594| [66501] Fedora Core 12 FEDORA-2009-13046 (ntp)
5595| [66368] Mandriva Security Advisory MDVSA-2009:309 (ntp)
5596| [65948] SLES10: Security update for xntp
5597| [65773] SLES10: Security update for xntp
5598| [65666] SLES11: Security update for ntp
5599| [65606] SLES9: Security update for xntp
5600| [65578] SLES9: Security update for xntp
5601| [65238] SLES9: Security update for xntp, xntp-doc
5602| [64225] Fedora Core 11 FEDORA-2009-5674 (ntp)
5603| [64207] FreeBSD Security Advisory (FreeBSD-SA-09:11.ntpd.asc)
5604| [64146] Ubuntu USN-777-1 (ntp)
5605| [64128] Mandrake Security Advisory MDVSA-2009:117 (ntp)
5606| [64116] Slackware Advisory SSA:2009-154-01 ntp
5607| [64114] Gentoo Security Advisory GLSA 200905-08 (ntp)
5608| [64098] Fedora Core 9 FEDORA-2009-5275 (ntp)
5609| [64095] Fedora Core 10 FEDORA-2009-5273 (ntp)
5610| [64050] CentOS Security Advisory CESA-2009:1039 (ntp)
5611| [64046] FreeBSD Ports: ntp
5612| [64032] Debian Security Advisory DSA 1801-1 (ntp)
5613| [63770] Mandrake Security Advisory MDVSA-2009:092 (ntp)
5614| [63743] Gentoo Security Advisory GLSA 200904-05 (ntp)
5615| [63343] CentOS Security Advisory CESA-2009:0046 (ntp)
5616| [63267] Fedora Core 10 FEDORA-2009-0544 (ntp)
5617| [63266] Fedora Core 9 FEDORA-2009-0547 (ntp)
5618| [63242] FreeBSD Security Advisory (FreeBSD-SA-09:03.ntpd.asc)
5619| [63230] Slackware Advisory SSA:2009-014-03 ntp
5620| [63194] Mandrake Security Advisory MDVSA-2009:007 (ntp)
5621| [63163] Ubuntu USN-705-1 (ntp)
5622| [63149] Debian Security Advisory DSA 1702-1 (ntp)
5623| [55233] Debian Security Advisory DSA 801-1 (ntp)
5624| [53863] Debian Security Advisory DSA 045-1 (ntp)
5625| [52235] mozilla -- heap overflow in NNTP handler
5626| [17229] NNTP password overflow
5627| [17228] NNTP message headers overflow
5628| [14773] Identifies services like FTP, SMTP, NNTP...
5629| [10699] IIS FrontPage DoS II
5630| [10585] IIS FrontPage DoS
5631|
5632| SecurityTracker - https://www.securitytracker.com:
5633| [1021533] NTP Signature Validation Flaw Lets Remote Users Bypass Validation Checks
5634| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
5635| [1013420] YaBB Input Validation Error in 'usersrecentposts' Lets Remote Users Conduct Cross-Site Scripting Attacks
5636| [1011762] cPanel Backup and FrontPage Management Bugs Let Remote Authenticated Users View, Edit, and Own Arbitrary Files
5637| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
5638| [1026143] Cyrus IMAP Server NNTP Service Lets Remote Users Bypass Authentication
5639| [1026031] Cyrus IMAP Server Buffer Overflow in NNTP Daemon Lets Remote Users Execute Arbitrary Code
5640| [1024934] Subversion SVNParentPath Collection Processing Error Lets Remote Users Execute Arbitrary Code
5641| [1023298] NTP Mode 7 Packet Processing Flaw Lets Remote Users Deny Service
5642| [1022930] Cisco IOS H.323, SIP, NTP, Tunneling, and Encrypted Packet Processing Flaws Let Remote Users Deny Service
5643| [1022243] ntp crypto_recv() Autokey Stack Overflow Lets Remote Users Execute Arbitrary Code
5644| [1022033] ntp Buffer Overflow in ntpq cookedprint() Lets Remote Users Execute Arbitrary Code
5645| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
5646| [1018785] Windows Mail Bug in Parsing NNTP Responses Lets Remote Users Execute Arbitrary Code
5647| [1016679] xntpd '-u' Switch May Cause the Daemon to Run With Incorrect Group Privileges
5648| [1016668] phNNTP Include File Flaw in 'file_newsportal' Parameter Lets Remote Users Execute Arbitrary Code
5649| [1015065] Lynx Buffer Overflow in HTrjis() in Processing NNTP Headers Lets Remote Users Execute Arbitrary Code
5650| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
5651| [1012726] Mozilla Buffer Overflow in Processing NNTP URLs Lets Remote Users Execute Arbitrary Code
5652| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
5653| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
5654| [1009336] Network Time Protocol (NTP) Server Integer Overflow May Return the Incorrect Time
5655| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
5656| [1005865] Leafnode NNTP News Server Lets Remote Users Deny Service
5657| [1005786] Xntpd Time Daemon on HP-UX May Crash or Degrade
5658| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
5659| [1004266] Cisco BTS 10200 Softswitch Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device or Execute Arbitrary Code
5660| [1004265] Cisco IP Manager Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device or Execute Arbitrary Code
5661| [1004264] Cisco Media Gateway Controller (MGC) Product Line Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device
5662| [1004244] Cisco IOS Systems Contain Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device
5663| [1003767] 'mod_frontpage' Module for Apache Web Server Has Buffer Overlow in 'fpexec.c' That Allows Remote Users to Execute Arbitrary Code on the System with Root Privileges
5664| [1003071] PHP Rocket Add-in for FrontPage Discloses Files on the Server to Remote Users
5665| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
5666| [1001770] Scotty Tcl Interpreter's ntping Utility Lets Local Users Obtain Root Privileges
5667| [1001237] The Network Time Protocol Daemon (ntpd) Allows Remote Users to Execute Arbitrary Code on the Server - Typically to Gain Root Privileges on the Server
5668|
5669| OSVDB - http://www.osvdb.org:
5670| [52917] Adobe Flash Player ActionScript 2 VM DefineConstantPool Action Crafted PDF File Handling Memory Disclosure
5671| [37179] Free Image Hosting frontpage.php AD_BODY_TEMP Variable Remote
5672| [31138] SolidState ViewAccountPage.class.php base_path Parameter Remote File Inclusion
5673| [30764] ClickGallery view_recent.asp currentpage Parameter SQL Injection
5674| [26417] ClickGallery view_gallery.asp parentcurrentpage Parameter XSS
5675| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
5676| [805] NTP ntpd readvar Variable Remote Overflow
5677| [577] FrontPage Server Extensions Visual Studio RAD Support Overflow
5678| [95804] TRENDnet TEW-812DRU setNTP.cgi Multiple Field Command Injection
5679| [93712] Zavio IP Cameras /opt/cgi/view/param sub_C8C8 Function General.Time.NTP.Server Parameter Remote Command Execution
5680| [92877] Vivotek PT7135 IP Camera farseer.out system.ntp Parameter Remote Command Execution
5681| [91972] GNOME Evolution-Data-Server NNTP Encryption Option Failure Remote Credential Disclosure
5682| [91630] Rosewill RSVA11001 NTP Host Manipulation Remote Command Execution
5683| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
5684| [90495] ownCloud /apps/files_external/addMountPoint.php mountpoint Parameter XSS
5685| [90267] Evolution NNTP STARTTLS Encryption Regression Remote Cleartext Credential Disclosure
5686| [90219] Raidsonic Multiple Product /cgi/time/time.cgi ntp_name Parameter XSS
5687| [85705] iFOBS ifobsClient/regclientprint.jsp Multiple Parameter XSS
5688| [83687] Linux Kernel fs/eventpoll.c Local DoS
5689| [83643] Knews Multilingual Newsletters Plugin for WordPress wp-content/plugins/knews/wysiwyg/fontpicker/index.php ff Parameter XSS
5690| [81824] MYRE Real Estate Mobile 1_mobile/agentprofile.php userid Parameter SQL Injection
5691| [81644] WebKit XMLDocumentParser::exitText Function XML Parsing Use-after-free Issue
5692| [78467] WebTitan NTP Server (Display) Module Unspecified XSS
5693| [77996] Contentpapst admin.php Multiple Parameter XSS
5694| [77872] Parallels Plesk Small Business Panel Site Editor (SiteBuilder) Feature /Wizard/Edit/Html currentPageId Parameter SQL Injection
5695| [76829] Calibre calibre-mount-helper Utility Arbitrary Directory / Mountpoint Manipulation
5696| [76338] WebKit XMLDocumentParser::insertErrorMessageBlock Use-after-free Issue
5697| [76336] WebKit XMLDocumentParser::endElementNs / XMLDocumentParser::parseEndElement Use-after-free Issue
5698| [76057] Cyrus IMAP Server NNTP AUTHINFO USER Command Parsing Authentication Bypass Arbitrary Command Execution
5699| [75307] Cyrus IMAP Server map/nntpd.c split_wildmats() Function NNTP Command Parsing Remote Overflow
5700| [73053] Linux Kernel fs/eventpoll.c epoll Data Structure File Descriptor Local DoS
5701| [70332] Apache Subversion Apache HTTP Server mod_dav_svn repos.c walk FunctionSVNParentPath Collection Remote DoS
5702| [69870] Lantern CMS 11-login.asp intPassedLocationID Parameter XSS
5703| [66859] Adobe Reader / Acrobat CoolType.dll maxp Table maxComponentPoints Field Font Handling Overflow
5704| [66448] IBM FileNet Content Manager InheritParentPermissions Security Inheritance Weakness
5705| [66268] InstantPhp Jobs Component for Joomla! index.php detailed_results Parameter SQL Injection
5706| [65465] WMS-CMS printpage.asp Multiple Parameter SQL Injection
5707| [65111] Opera Invalid news / nntp URI IFRAME Element Handling Remote DoS
5708| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
5709| [65109] Mozilla Firefox Invalid news / nntp URI IFRAME Element Handling Remote DoS
5710| [64437] HP Mercury LoadRunner Agent magentproc.exe Remote Arbitrary Code Execution
5711| [63620] Mozilla Multiple Products XMLDocument::load Function nsIContentPolicy Check Restriction Bypass
5712| [63472] Apple Safari on Mac OS X libFontParser.dylib TType1ParsingContext::SpecialEncoding() Function Arbitrary Code Execution (PWN2OWN)
5713| [62909] ncpfs ncpumount sutil/ncpumount.c Mountpoint Name Local File Disclosure
5714| [60847] NTP ntpd Mode 7 Request Crafted Packet Reply Loop Remote DoS
5715| [60827] e107 e107_admin/frontpage.php Unspecified Parameter XSS
5716| [60349] Etype EServ NNTP Service Large Request Remote DoS
5717| [60142] HP-UX xntpd Unspecified Remote DoS
5718| [58758] Apache River GrantPermission Policy Manipulation Privilege Escalation
5719| [58645] Xerver HTTP Server chooseDirectory Action currentPath Parameter XSS
5720| [58644] Xerver HTTP Server chooseDirectory Action currentPath Parameter Traversal Arbitrary File Access
5721| [58342] Cisco IOS Network Time Protocol (NTP) Crafted Packet Remote DoS
5722| [57478] TGS Content Management cms/frontpage_ception.ph Multiple Parameter SQL Injection
5723| [56015] NTP on Windows SO_EXCLUSIVEADDRUSE Unspecified Issue
5724| [56014] NTP EVP_VerifyFinal() Check Unspecified Issue
5725| [54576] NTP ntpd/ntp_crypto.c crypto_recv() Function Remote Overflow
5726| [54294] eFront studentpage.php / professorpage.php File Upload Arbitrary Code Execution
5727| [53593] NTP ntpq/ntpq.c cookedprint() Function Remote Overflow
5728| [51244] Goople CMS frontpage.php Multiple Parameter SQL Injection
5729| [50015] Easyedit CMS news.php intPageID Parameter SQL Injection
5730| [50014] Easyedit CMS page.php intPageID Parameter SQL Injection
5731| [49921] vBulletin admincp/attachmentpermission.php extension Parameter SQL Injection
5732| [49856] ThemeSiteScript upload/admin/frontpage_right.php loadadminpage Parameter Remote File Inclusion
5733| [47971] DevalCMS index.php currentpath Parameter XSS
5734| [47502] Perl Filesys::SmbClientParser Folder Name Arbitrary Shell Command Injection
5735| [47001] Linux Kernel fs/namespace.c do_change_type Function Mountpoint Manipulation Local Privilege Escalation
5736| [46124] DesktopOnNet frontpage.don3app/frontpage.php app_path Parameter Remote File Inclusion
5737| [45449] ACT P202S IP Phone Hardcoded NTP Server IP Time Subversion
5738| [43913] Perlbal lib/Perlbal/ClientProxy.pm Chunked Upload File Upload Handling Overflow DoS
5739| [42913] Hosting Controller UNINSTAL.asp Crafted Host Header Arbitrary Site Frontpage Extension Manipulation
5740| [42876] Tutorials Module for XOOPS printpage.php tid Parameter SQL Injection
5741| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
5742| [39802] Arcadem LE frontpage_right.php loadadminpage Parameter Remote File Inclusion
5743| [39617] phpAutoVideo admin/frontpage_right.php loadadminpage Parameter Remote File Inclusion
5744| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
5745| [34367] Squid src/client_side.c clientProcessRequest() function TRACE Request DoS
5746| [33553] Uberghey CMS frontpage.php setup_folder Parameter Remote File Inclusion
5747| [32987] Movable Type MTCommentPreviewIsStatic Tag XSS
5748| [32962] Hitachi OpenTP1 Invalid Data DoS
5749| [31200] SolidState DeleteAccountPage.class.php base_path Parameter Remote File Inclusion
5750| [31193] SolidState BillingPaymentPage.class.php base_path Parameter Remote File Inclusion
5751| [31187] SolidState AddPaymentPage.class.php base_path Parameter Remote File Inclusion
5752| [31119] SolidState NewAccountPage.class.php base_path Parameter Remote File Inclusion
5753| [31104] SolidState EditAccountPage.class.php base_path Parameter Remote File Inclusion
5754| [31103] SolidState EditPaymentPage.class.php base_path Parameter Remote File Inclusion
5755| [30763] ClickGallery gallery.asp currentpage Parameter SQL Injection
5756| [29490] Travelsized CMS frontpage.php setup_folder Parameter Remote File Inclusion
5757| [29098] TSEP printpagedetails.php tsep_config[absPath] Parameter Remote File Inclusion
5758| [28355] Joomla! Frontpage Content Submission Unspecified Injection
5759| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
5760| [28093] contentpublisher for Mambo contentpublisher.php mosConfig_absolute_path Parameter Remote File Inclusion
5761| [27856] phNNTP article-raw.php file_newsportal Parameter Remote File Inclusion
5762| [27369] Wireshark NTP Dissector Format String Flaw
5763| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
5764| [25623] Mobotix IP Network Camera eventplayer get_image_info_abspath Parameter XSS
5765| [24674] Mozilla Multiple Products XPCWrappedNativeScope::SystemIsBeingShutDown compareDocumentPosition Handling Memory Corruption
5766| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
5767| [24237] @1 Event Publisher eventpublisher.txt Direct Request Private Comment Disclosure
5768| [24236] @1 Event Publisher eventpublisher_usersubmit.htm Multiple Parameter XSS
5769| [24235] @1 Event Publisher eventpublisher_admin.htm Multiple Parameter XSS
5770| [22822] Linux Kernel mq_open System Call mntput Function Local DoS
5771| [21038] FUSE fusermount Crafted Mountpoint mtab Corruption DoS
5772| [20143] lmtp2nntp l2_spec() Function Format String
5773| [20142] lmtp2nntp lib_cfg Function Unspecified Issue
5774| [20019] Lynx NNTP HTrjis() Function Remote Overflow
5775| [19428] IBM Lotus Domino CitiPayPro.nsf SubPaymentProcessingFS Src Parameter XSS
5776| [19419] Turquoise SuperStat Date Parser Crafted NNTP Server Response Overflow
5777| [19055] NTP ntpd -u Group Permission Weakness
5778| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
5779| [15975] NTP ntpd Date/Time Request Remote Overflow
5780| [15870] MetaCart product.asp intProdID Parameter SQL Injection
5781| [15596] Oracle Collaboration Suite Email Server Unspecified NNTP DoS
5782| [14827] YaBB2 YaBB.pl usersrecentposts Action username Parameter XSS
5783| [14456] Slurp NNTP Client log_doit Function Format String
5784| [14410] mod_frontpage for Apache HTTP Server fpexec Remote Overflow
5785| [13353] newsfetch NNTP Response Handling Overflow DoS
5786| [12637] Mozilla nsNNTPProtocol.cpp NNTP news:// URI Handling Overflow DoS
5787| [10962] cPanel Frontpage _private Symlink Arbitrary File Permission Modification
5788| [10961] cPanel Frontpage .htaccess Hardlink Arbitrary File Owernship Modification
5789| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
5790| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
5791| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
5792| [9040] IceWarp WebMail attachment.html attachmentpage_text_error Parameter XSS
5793| [4345] Mnews NNTP Response Remote Overflow
5794| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
5795| [3501] Microsoft FrontPage form_results Information Disclosure
5796| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
5797| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
5798| [3384] Microsoft FrontPage htimage.exe Overflow
5799| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
5800| [3381] Microsoft FrontPage imagemap.exe Overflow
5801| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
5802| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
5803| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
5804| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
5805| [1928] Microsoft Windows NNTP Malformed Post DoS
5806| [1879] scotty ntping Hostname Handling Local Overflow
5807| [1304] ATRIUM Cassandra NNTP Server Login Name Remote Overflow
5808| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
5809| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
5810| [694] PHP Rocket for FrontPage phprocketaddin page Parameter Traversal Arbitrary File Access
5811| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
5812| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
5813| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
5814| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
5815| [68] Microsoft FrontPage Extensions .pwd File Permissions
5816| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
5817|_
5818Too many fingerprints match this host to give specific OS details
5819Network Distance: 14 hops
5820
5821TRACEROUTE (using port 123/udp)
5822HOP RTT ADDRESS
58231 88.96 ms 10.250.204.1
58242 119.67 ms 104.245.145.177
58253 57.53 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
58264 98.05 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
58275 125.52 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
58286 125.48 ms ix-ae-16-0.tcore1.tnk-toronto.as6453.net (64.86.33.98)
58297 125.57 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
58308 125.60 ms if-ae-8-2.tcore1.ct8-chicago.as6453.net (66.110.48.2)
58319 125.63 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28)
583210 125.66 ms if-ae-12-2.tcore1.n75-new-york.as6453.net (66.110.96.5)
583311 125.59 ms 66.110.96.22
583412 ... 13
583514 54.15 ms teenidols4you.com (45.55.35.220)
5836#################################################################################################
5837-port3306.txt: Aucun fichier ou dossier de ce type
5838Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-06 14:51 EST
5839Stats: 0:06:54 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
5840NSE Timing: About 79.41% done; ETC: 15:00 (0:01:45 remaining)
5841Nmap scan report for www.teenidols4you.com (45.55.35.220)
5842Host is up (0.12s latency).
5843rDNS record for 45.55.35.220: teenidols4you.com
5844
5845PORT STATE SERVICE VERSION
58463306/tcp open mysql MySQL (unauthorized)
5847| mysql-brute:
5848| Accounts: No valid accounts found
5849|_ Statistics: Performed 50009 guesses in 486 seconds, average tps: 98.0
5850|_mysql-empty-password: Host '104.245.145.182' is not allowed to connect to this MySQL server
5851| mysql-enum:
5852| Accounts: No valid accounts found
5853|_ Statistics: Performed 10 guesses in 1 seconds, average tps: 10.0
5854|_mysql-vuln-cve2012-2122: ERROR: Script execution failed (use -d to debug)
5855| vulscan: VulDB - https://vuldb.com:
5856| [141414] LibreNMS up to 1.47 inventory.inc.php mysqli_escape_real_string Parameter cross site scripting
5857| [140101] Yandex ClickHouse MySQL Client information disclosure
5858| [139468] cPanel up to 60.0.24 MySQL Upgrade File privilege escalation
5859| [139350] cPanel up to 64.0.20 convert_roundcube_mysql2sqlite privilege escalation
5860| [139349] cPanel up to 64.0.20 convert_roundcube_mysql2sqlite privilege escalation
5861| [139308] cPanel up to 67.9999.102 WHM MySQL Password Change Interfaces Stored cross site scripting
5862| [138305] SaltStack Salt 2018.3/2019.2 mysqluser_chpass sql injection
5863| [138102] Oracle MySQL Server up to 8.0.16 InnoDB unknown vulnerability
5864| [138101] Oracle MySQL Server up to 8.0.16 Privileges unknown vulnerability
5865| [138100] Oracle MySQL Server up to 5.6.44/5.7.18 Privileges unknown vulnerability
5866| [138099] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 Compiling information disclosure
5867| [138098] Oracle MySQL Server up to 5.7.26/8.0.16 Audit Plug-in unknown vulnerability
5868| [138097] Oracle MySQL Server up to 5.7.26/8.0.16 Client programs denial of service
5869| [138096] Oracle MySQL Server up to 8.0.16 Roles denial of service
5870| [138095] Oracle MySQL Server up to 8.0.16 Privileges denial of service
5871| [138094] Oracle MySQL Server up to 5.7.25/8.0.15 Replication denial of service
5872| [138093] Oracle MySQL Server up to 8.0.16 Options denial of service
5873| [138092] Oracle MySQL Server up to 8.0.16 Optimizer denial of service
5874| [138091] Oracle MySQL Server up to 8.0.16 Optimizer denial of service
5875| [138090] Oracle MySQL Server up to 8.0.16 Optimizer denial of service
5876| [138089] Oracle MySQL Server up to 8.0.16 Optimizer denial of service
5877| [138088] Oracle MySQL Server up to 8.0.16 Optimizer denial of service
5878| [138087] Oracle MySQL Server up to 8.0.16 Optimizer denial of service
5879| [138086] Oracle MySQL Server up to 8.0.16 Optimizer denial of service
5880| [138085] Oracle MySQL Server up to 5.7.26/8.0.16 Optimizer denial of service
5881| [138084] Oracle MySQL Server up to 5.7.26/8.0.16 Optimizer denial of service
5882| [138083] Oracle MySQL Server up to 8.0.12 GIS denial of service
5883| [138082] Oracle MySQL Server up to 8.0.16 FTS denial of service
5884| [138081] Oracle MySQL Server up to 8.0.16 DML denial of service
5885| [138080] Oracle MySQL Server up to 8.0.16 Components denial of service
5886| [138079] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 Pluggable Auth denial of service
5887| [138078] Oracle MySQL Server up to 8.0.16 InnoDB denial of service
5888| [138077] Oracle MySQL Server up to 8.0.15 InnoDB denial of service
5889| [138076] Oracle MySQL Server up to 8.0.16 InnoDB denial of service
5890| [138074] Oracle MySQL Server up to 8.0.12 Roles denial of service
5891| [138073] Oracle MySQL Server up to 5.7.26/8.0.16 Audit Log denial of service
5892| [138072] Oracle MySQL Server up to 5.7.26/8.0.16 Privileges unknown vulnerability
5893| [138071] Oracle MySQL Server up to 5.7.23 Replication unknown vulnerability
5894| [138070] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 Audit unknown vulnerability
5895| [138069] Oracle MySQL Server up to 5.7.26/8.0.16 InnoDB unknown vulnerability
5896| [138068] Oracle MySQL Workbench up to 8.0.16 OpenSSL information disclosure
5897| [138067] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 XML denial of service
5898| [138066] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 Parser denial of service
5899| [138065] Oracle MySQL Server up to 8.0.16 Optimizer denial of service
5900| [138064] Oracle MySQL Server up to 8.0.16 Optimizer denial of service
5901| [138063] Oracle MySQL Server up to 8.0.12 Data Dictionary denial of service
5902| [138062] Oracle MySQL Server up to 8.0.16 Charsets denial of service
5903| [138061] Oracle MySQL Server up to 8.0.16 Replication unknown vulnerability
5904| [138060] Oracle MySQL Server up to 8.0.16 InnoDB Cluster unknown vulnerability
5905| [138059] Oracle MySQL Enterprise Monitor up to 4.0.9/8.0.14 Spring Framework denial of service
5906| [138058] Oracle MySQL Server up to 5.7.26/8.0.15 cURL unknown vulnerability
5907| [133701] Oracle MySQL Server up to 8.0.15 Replication denial of service
5908| [133700] Oracle MySQL Server up to 8.0.15 Replication denial of service
5909| [133698] Oracle MySQL Server up to 8.0.15 Group Replication Plugin denial of service
5910| [133697] Oracle MySQL Server up to 8.0.15 Roles denial of service
5911| [133695] Oracle MySQL Server up to 8.0.15 Privileges denial of service
5912| [133691] Oracle MySQL Server up to 8.0.15 Replication denial of service
5913| [133687] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5914| [133686] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5915| [133685] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5916| [133684] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5917| [133683] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5918| [133682] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5919| [133681] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5920| [133680] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5921| [133677] Oracle MySQL Server up to 8.0.15 Information Schema denial of service
5922| [133676] Oracle MySQL Server up to 8.0.15 DDL denial of service
5923| [133675] Oracle MySQL Server up to 8.0.15 DDL denial of service
5924| [133672] Oracle MySQL Server up to 8.0.15 InnoDB denial of service
5925| [133668] Oracle MySQL Server up to 8.0.15 Replication denial of service
5926| [133666] Oracle MySQL Server up to 8.0.15 Options denial of service
5927| [133662] Oracle MySQL Connectors up to 8.0.15 Connector/J unknown vulnerability
5928| [133661] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5929| [133660] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5930| [133659] Oracle MySQL Server up to 8.0.15 Optimizer denial of service
5931| [129647] Oracle MySQL Server up to 5.7.24/8.0.13 Privileges denial of service
5932| [129646] Oracle MySQL Server up to 5.7.24/8.0.13 Privileges denial of service
5933| [129645] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Replication denial of service
5934| [129644] Oracle MySQL Server up to 5.7.24/8.0.13 Partition denial of service
5935| [129643] Oracle MySQL Server up to 8.0.13 Optimizer denial of service
5936| [129642] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Optimizer denial of service
5937| [129641] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Optimizer denial of service
5938| [129640] Oracle MySQL Server up to 5.7.24/8.0.13 Optimizer denial of service
5939| [129639] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 DDL denial of service
5940| [129638] Oracle MySQL Server up to 8.0.13 DDL denial of service
5941| [129637] Oracle MySQL Server up to 8.0.13 DDL denial of service
5942| [129636] Oracle MySQL Server up to 8.0.13 Connection denial of service
5943| [129635] Oracle MySQL Server up to 5.7.24/8.0.13 InnoDB denial of service
5944| [129634] Oracle MySQL Server up to 8.0.13 InnoDB denial of service
5945| [129631] Oracle MySQL Server up to 8.0.13 Replication denial of service
5946| [129630] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Connection Handling denial of service
5947| [129629] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Parser denial of service
5948| [129628] Oracle MySQL Server up to 5.7.24/8.0.13 Parser denial of service
5949| [129627] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 PS denial of service
5950| [129626] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Optimizer denial of service
5951| [129625] Oracle MySQL Server up to 8.0.13 Privileges unknown vulnerability
5952| [129624] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Replication unknown vulnerability
5953| [129623] Oracle MySQL Workbench up to 8.0.13 OpenSSL denial of service
5954| [129622] Oracle MySQL Connectors up to 2.1.8/8.0.13 Connector/Python unknown vulnerability
5955| [129621] Oracle MySQL Workbench up to 8.0.13 unknown vulnerability
5956| [127905] Open Dental up to 18.3 MySQL Database Default Credentials weak authentication
5957| [127404] Drobo 5N2 NAS 4.0.5-13.28.96115 MySQL API Error Page cross site scripting
5958| [127403] Drobo 5N2 NAS 4.0.5-13.28.96115 /mysql/api/droboapp/data information disclosure
5959| [127400] Drobo 5N2 NAS 4.0.5-13.28.96115 Access Control /mysql/api/logfile.php Parameter information disclosure
5960| [127396] Drobo 5N2 NAS 4.0.5-13.28.96115 Access Control /mysql/api/drobo.php information disclosure
5961| [127395] Drobo 5N2 NAS 4.0.5-13.28.96115 Access Control /mysql/api/diags.php Parameter information disclosure
5962| [127350] Dell OpenManage Network Manager up to 6.4.x MySQL privilege escalation
5963| [126982] LAOBANCMS 2.0 install/mysql_hy.php directory traversal
5964| [126687] LAOBANCMS 2.0 mysql_hy.php privilege escalation
5965| [125937] mysql-binuuid-rails up to 1.1.0 Database Column sql injection
5966| [125825] ThinkPHP 3.2.4 Mysql.class.php parseKey Parameter sql injection
5967| [125568] Oracle MySQL Server up to 8.0.12 Privileges unknown vulnerability
5968| [125567] Oracle MySQL Server up to 5.7.23/8.0.12 Logging denial of service
5969| [125566] Oracle MySQL Server up to 5.7.23/8.0.12 InnoDB denial of service
5970| [125565] Oracle MySQL Server up to 8.0.12 Windows denial of service
5971| [125564] Oracle MySQL Server up to 5.5.61/5.6.41/5.7.23/8.0.12 Storage Engines denial of service
5972| [125563] Oracle MySQL Server up to 8.0.12 Roles denial of service
5973| [125562] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 RBR denial of service
5974| [125561] Oracle MySQL Server up to 5.7.23/8.0.12 Partition denial of service
5975| [125560] Oracle MySQL Server up to 8.0.12 Optimizer denial of service
5976| [125559] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 Memcached denial of service
5977| [125558] Oracle MySQL Server up to 8.0.12 JSON denial of service
5978| [125557] Oracle MySQL Server up to 8.0.12 Information Schema denial of service
5979| [125556] Oracle MySQL Server up to 8.0.12 DDL denial of service
5980| [125555] Oracle MySQL Server up to 5.7.23/8.0.12 InnoDB denial of service
5981| [125554] Oracle MySQL Server up to 5.7.23/8.0.12 InnoDB denial of service
5982| [125553] Oracle MySQL Server up to 5.7.23/8.0.12 InnoDB denial of service
5983| [125552] Oracle MySQL Server up to 5.7.23/8.0.12 InnoDB denial of service
5984| [125551] Oracle MySQL Server up to 5.7.23/8.0.12 Partition denial of service
5985| [125549] Oracle MySQL Server up to 5.7.23/8.0.12 Optimizer denial of service
5986| [125548] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 Merge denial of service
5987| [125547] Oracle MySQL Server up to 8.0.12 DDL denial of service
5988| [125546] Oracle MySQL Server up to 5.7.23/8.0.12 InnoDB denial of service
5989| [125545] Oracle MySQL Server up to 5.7.23/8.0.12 Audit denial of service
5990| [125544] Oracle MySQL Server up to 8.0.12 Parser denial of service
5991| [125543] Oracle MySQL Server up to 5.5.61/5.6.41/5.7.23/8.0.12 Parser denial of service
5992| [125542] Oracle MySQL Server up to 8.0.12 Optimizer denial of service
5993| [125541] Oracle MySQL Server up to 8.0.12 Optimizer denial of service
5994| [125540] Oracle MySQL Server up to 8.0.12 DML denial of service
5995| [125539] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 InnoDB denial of service
5996| [125538] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 InnoDB denial of service
5997| [125537] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 InnoDB denial of service
5998| [125536] Oracle MySQL Server up to 5.7.23/8.0.12 Parser denial of service
5999| [125535] Oracle MySQL Server up to 5.5.61/5.6.41/5.7.23/8.0.12 InnoDB unknown vulnerability
6000| [125534] Oracle MySQL Enterprise Monitor up to 3.4.9.4237/4.0.6.5281/8.0.2.8191 Monitoring unknown vulnerability
6001| [125533] Oracle MySQL Connectors up to 8.0.12 Connector/J unknown vulnerability
6002| [125532] Oracle MySQL Enterprise Monitor up to 3.4.9.4237/4.0.6.5281/8.0.2.8191 Monitoring unknown vulnerability
6003| [125531] Oracle MySQL Enterprise Monitor up to 3.4.9.4237/4.0.6.5281/8.0.2.8191 Monitoring unknown vulnerability
6004| [125415] Oracle Enterprise Manager for MySQL Database 13.2 EM Plugin unknown vulnerability
6005| [122549] PHP up to 7.1.5 mysqli_real_escape_string memory corruption
6006| [122201] mysql_user Module up to 2.2.0 on Ansible Password Change weak authentication
6007| [121802] Oracle MySQL Server up to 8.0.11 DDL unknown vulnerability
6008| [121800] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Encryption weak encryption
6009| [121799] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Options unknown vulnerability
6010| [121798] Oracle MySQL Workbench up to 6.3.10 Encryption weak encryption
6011| [121797] Oracle MySQL Server up to 5.7.22/8.0.11 Privileges unknown vulnerability
6012| [121796] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 MyISAM information disclosure
6013| [121795] Oracle MySQL Server up to 8.0.11 Privileges denial of service
6014| [121794] Oracle MySQL Server up to 5.5.60 Privileges denial of service
6015| [121793] Oracle MySQL Server up to 8.0.11 Replication denial of service
6016| [121792] Oracle MySQL Server up to 5.7.22 DML denial of service
6017| [121791] Oracle MySQL Server up to 8.0.11 DDL denial of service
6018| [121790] Oracle MySQL Server up to 8.0.11 DDL denial of service
6019| [121789] Oracle MySQL Server up to 5.7.22/8.0.11 DDL denial of service
6020| [121788] Oracle MySQL Server up to 5.7.22/8.0.11 DDL denial of service
6021| [121787] Oracle MySQL Server up to 8.0.11 InnoDB denial of service
6022| [121786] Oracle MySQL Server up to 5.7.22 Audit Log denial of service
6023| [121785] Oracle MySQL Client up to 5.5.60/5.6.40/5.7.22/8.0.11 Client Programs denial of service
6024| [121784] Oracle MySQL Server up to 5.6.40/5.7.22/8.0.11 Memcached denial of service
6025| [121783] Oracle MySQL Server up to 8.0.11 Roles denial of service
6026| [121782] Oracle MySQL Workbench up to 8.0.11 denial of service
6027| [121781] Oracle MySQL Server up to 8.0.11 Optimizer denial of service
6028| [121780] Oracle MySQL Server up to 5.6.40/5.7.22/8.0.11 Installing denial of service
6029| [121779] Oracle MySQL Server up to 5.7.22/8.0.11 DML denial of service
6030| [121778] Oracle MySQL Server up to 5.7.22/8.0.11 InnoDB denial of service
6031| [121777] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Client mysqldump denial of service
6032| [121776] Oracle MySQL Enterprise Monitor up to 3.4.7.4297/4.0.4.5235/8.0.0.8131 Monitoring denial of service
6033| [121775] Oracle MySQL Connectors up to 5.3.10/8.0.11 Connector/ODBC denial of service
6034| [121774] Oracle MySQL Server up to 5.6.40/5.7.22/8.0.11 InnoDB denial of service
6035| [121773] Oracle MySQL Workbench up to 8.0.11 unknown vulnerability
6036| [121772] Oracle MySQL Enterprise Monitor up to 3.4.7.4297/4.0.4.5235/8.0.0.8131 Service Manager unknown vulnerability
6037| [121613] Oracle Enterprise Manager for MySQL Database up to 13.2.2.0.0 EM Plugin unknown vulnerability
6038| [120277] query-mysql 0.0.0/0.0.1/0.0.2 on Node.js sql injection
6039| [118340] mysqljs on Node.js Backdoor privilege escalation
6040| [118305] MySQL Module up to v2.0.0-alpha7 on Node.js mysql.escape sql injection
6041| [117517] MySQL Multi-Master Replication Manager 2.2.1 on Solaris mmm_agentd send_arp MMM Protocol Message command injection
6042| [117516] MySQL Multi-Master Replication Manager 2.2.1 on FreeBSD mmm_agentd clear_ip MMM Protocol Message command injection
6043| [117515] MySQL Multi-Master Replication Manager 2.2.1 on Solaris mmm_agentd clear_ip MMM Protocol Message command injection
6044| [117514] MySQL Multi-Master Replication Manager 2.2.1 on Linux mmm_agentd clear_ip MMM Protocol Message command injection
6045| [117513] MySQL Multi-Master Replication Manager 2.2.1 on FreeBSD mmm_agentd add_ip MMM Protocol Message command injection
6046| [117512] MySQL Multi-Master Replication Manager 2.2.1 on Solaris mmm_agentd add_ip MMM Protocol Message command injection
6047| [117511] MySQL Multi-Master Replication Manager 2.2.1 on Linux mmm_agentd add_ip MMM Protocol Message command injection
6048| [117510] MySQL Multi-Master Replication Manager 2.2.1 mmm_agentd _execute MMM Protocol Message command injection
6049| [117387] CSP MySQL User Manager 2.3.1 Username sql injection
6050| [116762] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 DDL information disclosure
6051| [116761] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Locking denial of service
6052| [116759] Oracle MySQL Server up to 5.7.21 Group Replication GCS denial of service
6053| [116758] Oracle MySQL Server up to 5.7.21 Pluggable Auth denial of service
6054| [116757] Oracle MySQL Server up to 5.7.21 Performance Schema denial of service
6055| [116756] Oracle MySQL Server up to 5.7.21 Optimizer denial of service
6056| [116755] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Optimizer denial of service
6057| [116754] Oracle MySQL Server up to 5.7.21 Optimizer denial of service
6058| [116753] Oracle MySQL Server up to 5.7.21 Optimizer denial of service
6059| [116752] Oracle MySQL Server up to 5.7.21 DML denial of service
6060| [116751] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Privileges denial of service
6061| [116750] Oracle MySQL Server up to 5.7.21 InnoDB denial of service
6062| [116749] Oracle MySQL Server up to 5.7.21 InnoDB denial of service
6063| [116748] Oracle MySQL Server up to 5.6.39/5.7.21 InnoDB denial of service
6064| [116747] Oracle MySQL Server up to 5.7.21 InnoDB denial of service
6065| [116745] Oracle MySQL Server up to 5.7.21 Optimizer denial of service
6066| [116744] Oracle MySQL Server up to 5.6.39/5.7.21 InnoDB denial of service
6067| [116743] Oracle MySQL Server up to 5.7.21 InnoDB denial of service
6068| [116742] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Client programs denial of service
6069| [116741] Oracle MySQL Enterprise Monitor up to 3.3.7.3306/3.4.5.4248/4.0.2.5168 Monitoring: Agent (OpenSSL) information disclosure
6070| [116740] Oracle MySQL Server up to 5.7.21 Optimizer denial of service
6071| [116739] Oracle MySQL Server up to 5.7.21 Optimizer denial of service
6072| [116738] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 DDL denial of service
6073| [116737] Oracle MySQL Server up to 5.6.39/5.7.21 Privileges denial of service
6074| [116736] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 InnoDB denial of service
6075| [116735] Oracle MySQL Server up to 5.6.39/5.7.21 InnoDB denial of service
6076| [116734] Oracle MySQL Server up to 5.6.39/5.7.21 InnoDB denial of service
6077| [116733] Oracle MySQL Server up to 5.6.39 GIS Extension denial of service
6078| [116622] Oracle Enterprise Manager for MySQL Database 12.1.0.4 EM Plugin: General (Apache Tomcat) unknown vulnerability
6079| [116620] Oracle Enterprise Manager for MySQL Database 12.1.0.4 EM Plugin: General (Spring Framework) unknown vulnerability
6080| [116619] Oracle Enterprise Manager for MySQL Database 12.1.0.4 EM Plugin: General unknown vulnerability
6081| [115836] Juniper Junos Space up to 13.3R1.7 MySQL Server Default Credentials weak authentication
6082| [115216] MySQL for PCF Tiles up to 1.7.9 AWS Access Key privilege escalation
6083| [114055] Couch up to 2.0 mysql2i.func.php Request information disclosure
6084| [112112] Oracle MySQL Server up to 5.6.38/5.7.20 Performance Schema information disclosure
6085| [112111] Oracle MySQL Server up to 5.6.38/5.7.20 Performance Schema denial of service
6086| [112110] Oracle MySQL Server up to 5.7.20 Optimizer denial of service
6087| [112109] Oracle MySQL Server up to 5.7.20 Optimizer denial of service
6088| [112108] Oracle MySQL Server up to 5.7.20 InnoDB denial of service
6089| [112107] Oracle MySQL Server up to 5.7.20 DML denial of service
6090| [112106] Oracle MySQL Server up to 5.7.20 DML denial of service
6091| [112105] Oracle MySQL Server up to 5.7.20 DML denial of service
6092| [112104] Oracle MySQL Server up to 5.6.38/5.7.19 Partition denial of service
6093| [112103] Oracle MySQL Server up to 5.6.38/5.7.20 Replication denial of service
6094| [112102] Oracle MySQL Server up to 5.6.38/5.7.20 Packaging information disclosure
6095| [112101] Oracle MySQL Enterprise Monitor up to 3.3.6.3293/3.4.4.4226/4.0.0.5135 Monitoring information disclosure
6096| [112100] Oracle MySQL Connectors up to 5.3.9 ODBC Connector information disclosure
6097| [112099] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 Optimizer denial of service
6098| [112098] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 Optimizer denial of service
6099| [112097] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 Optimizer denial of service
6100| [112096] Oracle MySQL Server up to 5.6.38/5.7.20 GIS denial of service
6101| [112095] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 DDL denial of service
6102| [112094] Oracle MySQL Server up to 5.6.38/5.7.20 Privileges denial of service
6103| [112093] Oracle MySQL Server up to 5.6.38/5.7.20 InnoDB denial of service
6104| [112092] Oracle MySQL Server up to 5.6.38/5.7.20 Stored Procedure denial of service
6105| [112091] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.19 Partition denial of service
6106| [112090] Oracle MySQL Server up to 5.6.38/5.7.20 Privileges denial of service
6107| [112089] Oracle MySQL Connectors up to 6.9.9/6.10.4 Connector/Net denial of service
6108| [112088] Oracle MySQL Enterprise Monitor up to 3.3.6.3293/3.4.4.4226/4.0.0.5135 Monitoring privilege escalation
6109| [110974] puppetlabs-mysql up to 3.6.0 Parameter weak authentication
6110| [108192] Oracle MySQL Server up to 5.7.18 InnoDB denial of service
6111| [108190] Oracle MySQL Server up to 5.6.37/5.7.19 InnoDB denial of service
6112| [108189] Oracle MySQL Server up to 5.7.18 Stored Procedure denial of service
6113| [108188] Oracle MySQL Server up to 5.7.19 Replication denial of service
6114| [108187] Oracle MySQL Server up to 5.6.37/5.7.19 Optimizer denial of service
6115| [108186] Oracle MySQL Server up to 5.6.36/5.7.18 Optimizer denial of service
6116| [108185] Oracle MySQL Server up to 5.6.37/5.7.19 Optimizer denial of service
6117| [108184] Oracle MySQL Server up to 5.6.37/5.7.19 Memcached denial of service
6118| [108183] Oracle MySQL Server up to 5.7.19 InnoDB denial of service
6119| [108182] Oracle MySQL Server up to 5.7.19 FTS denial of service
6120| [108181] Oracle MySQL Server up to 5.7.18 DML denial of service
6121| [108180] Oracle MySQL Server up to 5.7.19 Group Replication GCS denial of service
6122| [108179] Oracle MySQL Server up to 5.6.37/5.7.19 Performance Schema denial of service
6123| [108178] Oracle MySQL Connectors up to 6.9.9 Connector/Net denial of service
6124| [108177] Oracle MySQL Connectors up to 6.9.9 Connector/Net unknown vulnerability
6125| [108176] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.11 Optimizer denial of service
6126| [108175] Oracle MySQL Server up to 5.7.19 Optimizer denial of service
6127| [108174] Oracle MySQL Server up to 5.6.37/5.7.19 FTS denial of service
6128| [108173] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.19 DDL denial of service
6129| [108172] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.19 Client programs information disclosure
6130| [108171] Oracle MySQL Server up to 5.6.35/5.7.18 OpenSSL denial of service
6131| [108170] Oracle MySQL Server up to 5.6.37/5.7.19 Pluggable Auth denial of service
6132| [108169] Oracle MySQL Enterprise Monitor up to 3.2.8.2223/3.3.4.3247/3.4.2.4181 Apache Tomcat unknown vulnerability
6133| [108168] Oracle MySQL Enterprise Monitor up to 3.2.8.2223/3.3.4.3247/3.4.2.4181 Web unknown vulnerability
6134| [104089] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 DDL unknown vulnerability
6135| [104088] Oracle MySQL Server up to 5.7.18 C API information disclosure
6136| [104087] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 DDL unknown vulnerability
6137| [104086] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 Client mysqldump unknown vulnerability
6138| [104085] Oracle MySQL Server up to 5.6.36/5.7.18 Replication denial of service
6139| [104084] Oracle MySQL Server up to 5.6.36/5.7.18 Replication denial of service
6140| [104083] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 Charsets denial of service
6141| [104082] Oracle MySQL Cluster up to 7.3.5 CLSTCONF memory corruption
6142| [104081] Oracle MySQL Server up to 5.7.16 X Plugin denial of service
6143| [104080] Oracle MySQL Server up to 5.7.18 Optimizer denial of service
6144| [104079] Oracle MySQL Server up to 5.7.18 Optimizer denial of service
6145| [104078] Oracle MySQL Server up to 5.7.18 Optimizer denial of service
6146| [104077] Oracle MySQL Server up to 5.7.18 DML denial of service
6147| [104076] Oracle MySQL Server up to 5.7.18 DML denial of service
6148| [104075] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 DML denial of service
6149| [104074] Oracle MySQL Server up to 5.7.18 DML denial of service
6150| [104073] Oracle MySQL Server up to 5.7.18 DML denial of service
6151| [104072] Oracle MySQL Server up to 5.7.18 X Plugin denial of service
6152| [104071] Oracle MySQL Server up to 5.7.18 UDF denial of service
6153| [104069] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 C API denial of service
6154| [104068] Oracle MySQL Connectors up to 6.1.10 Connector/C denial of service
6155| [104067] Oracle MySQL Server up to 5.6.35/5.7.17 OpenSSL unknown vulnerability
6156| [104066] Oracle MySQL Connectors up to 5.3.7 OpenSSL unknown vulnerability
6157| [104065] Oracle MySQL Connectors up to 6.1.9 OpenSSL unknown vulnerability
6158| [104064] Oracle MySQL Server up to 5.6.36/5.7.18 DML denial of service
6159| [104063] Oracle MySQL Server up to 5.6.36/5.7.18 Memcached denial of service
6160| [104062] Oracle MySQL Enterprise Monitor up to 3.3.3.1199 Apache Tomcat unknown vulnerability
6161| [104061] Oracle MySQL Enterprise Monitor up to 3.2.7.1204/3.3.3.1199 Apache Tomcat unknown vulnerability
6162| [104060] Oracle MySQL Enterprise Monitor up to 3.1.5.7958/3.2.5.1141/3.3.2.1162 Apache Struts 2 unknown vulnerability
6163| [103583] phpMyAdmin 4.0/4.4/4.6 MySQL Database Connection privilege escalation
6164| [103578] MySQL Dumper 1.24 Stored cross site scripting
6165| [102980] DBD::mysql Module up to 4.043 on Perl SSL weak encryption
6166| [102979] DBD::mysql Module up to 4.043 on Perl Error Use-After-Free memory corruption
6167| [102618] KBVault Mysql Free Knowledge Base 0.16a File Upload Explorer.aspx privilege escalation
6168| [100915] Accellion FTA communication_p2p.php mysql_real_escape_string sql injection
6169| [100543] Oracle MySQL up to 5.1.40 Connector/J privilege escalation
6170| [100232] Oracle MySQL Server up to 5.7.17 Encryption weak encryption
6171| [100231] Oracle MySQL Enterprise Monitor up to 3.1.6.8003/3.2.1182/3.3.2.1162 Monitoring denial of service
6172| [100228] Oracle MySQL Workbench up to 6.3.8 Encryption information disclosure
6173| [100227] Oracle MySQL Server up to 5.7.17 C API information disclosure
6174| [100226] Oracle MySQL Server up to 5.7.17 Privileges unknown vulnerability
6175| [100225] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 DDL unknown vulnerability
6176| [100224] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Privileges denial of service
6177| [100223] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Privileges denial of service
6178| [100222] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Privileges denial of service
6179| [100221] Oracle MySQL Server up to 5.7.17 Optimizer denial of service
6180| [100220] Oracle MySQL Server up to 5.7.17 DML denial of service
6181| [100219] Oracle MySQL Server up to 5.7.17 DML denial of service
6182| [100218] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 DML denial of service
6183| [100217] Oracle MySQL Server up to 5.7.17 Audit Plug-in denial of service
6184| [100215] Oracle MySQL Server up to 5.5.54/5.6.35 C API information disclosure
6185| [100214] Oracle MySQL Server up to 5.7.17 Privileges unknown vulnerability
6186| [100213] Oracle MySQL Cluster up to 7.2.27/7.3.16/7.4.14/7.5.5 DD denial of service
6187| [100212] Oracle MySQL Server up to 5.7.17 InnoDB denial of service
6188| [100211] Oracle MySQL Enterprise Monitor up to 3.1.6.8003/3.2.1182/3.3.2.1162 OpenSSL information disclosure
6189| [100210] Oracle MySQL Enterprise Backup up to 3.12.3/4.0.3 ENTRBACK information disclosure
6190| [100209] Oracle MySQL Connectors up to 5.1.41 Connector/J unknown vulnerability
6191| [100208] Oracle MySQL Server up to 5.6.35 Optimizer denial of service
6192| [100207] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Optimizer denial of service
6193| [100206] Oracle MySQL Server up to 5.7.17 DML denial of service
6194| [100205] Oracle MySQL Enterprise Monitor up to 3.1.6.8003/3.2.1182/3.3.2.1162 Apache Commons FileUpload denial of service
6195| [100204] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Client mysqldump unknown vulnerability
6196| [100203] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Thread Pooling denial of service
6197| [100202] Oracle MySQL Server up to 5.6.35/5.7.17 Pluggable Auth Integer denial of service
6198| [100201] Oracle MySQL Server up to 5.6.35/5.7.17 Memcached denial of service
6199| [100200] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Optimizer denial of service
6200| [100199] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 DML denial of service
6201| [100198] Oracle MySQL Workbench up to 6.3.7 OpenSSL memory corruption
6202| [100197] Oracle MySQL Enterprise Backup up to 3.12.2/4.0.1 ENTRBACK memory corruption
6203| [100196] Oracle MySQL Enterprise Monitor up to 3.1.6.8003/3.2.1182/3.3.2.1162 Monitoring: Server denial of service
6204| [100195] Oracle MySQL Workbench up to 6.3.8 OpenSSL denial of service
6205| [100194] Oracle MySQL Enterprise Monitor up to 3.1.6.8003/3.2.1182/3.3.2.1162 Struts 2 privilege escalation
6206| [99815] ATutor 2.2.1 mysql_connect.inc.php searchFriends sql injection
6207| [97041] MySQL DBD::mysql up to 4.38 denial of service
6208| [96814] MariaDB up to 5.5.54/10.0.29/10.1.21/10.2.3 libmysqlclient.so denial of service
6209| [96808] Oracle MySQL up to 5.6.21/5.7.4 libmysqlclient.so denial of service
6210| [95832] Zabbix up to 2.0.17/2.2.12/3.0.2 Configuration Script userparameter_mysql.conf) privilege escalation
6211| [95730] Oracle MySQL Server up to 5.7.16 Encryption weak encryption
6212| [95729] Oracle MySQL Server up to 5.7.16 X Plugin unknown vulnerability
6213| [95728] Oracle MySQL Cluster 7.2.25/7.3.14/7.4.12 Cluster NDBAPI denial of service
6214| [95727] Oracle MySQL Cluster 7.2.25/7.3.14/7.4.12 denial of service
6215| [95726] Oracle MySQL Cluster 7.2.19/7.3.8/7.4.5 denial of service
6216| [95723] Oracle MySQL Server 5.6.34/5.7.16 Replication denial of service
6217| [95722] Oracle MySQL Server up to 5.5.53 Charsets denial of service
6218| [95720] Oracle MySQL Cluster 7.2.26/7.3.14/7.4.12 NDBAPI denial of service
6219| [95719] Oracle MySQL Server up to 5.7.16 Optimizer denial of service
6220| [95716] Oracle MySQL Server up to 5.7.16 Replication denial of service
6221| [95715] Oracle MySQL Server 5.5.53/5.6.34/5.7.16 Optimizer denial of service
6222| [95714] Oracle MySQL Server 5.6.34 5.7.16 InnoDB denial of service
6223| [95713] Oracle MySQL Server 5.5.53/5.6.34/5.7.16 DML denial of service
6224| [95712] Oracle MySQL Server 5.6.34/5.7.16 DDL denial of service
6225| [95711] Oracle MySQL Server 5.5.53/5.6.34/5.7.16 DDL denial of service
6226| [95709] Oracle MySQL Server 5.6.34/5.7.16 Encryption denial of service
6227| [95708] Oracle MySQL Enterprise Monitor 3.1.3.7856 Monitoring Agent memory corruption
6228| [95707] Oracle MySQL Enterprise Monitor 3.1.4.7895/3.2.4.1102/3.3.0.1098 Monitoring denial of service
6229| [95706] Oracle MySQL Enterprise Monitor 3.1.4.7895/3.2.1.1049 Monitoring memory corruption
6230| [95705] Oracle MySQL Enterprise Monitor 3.1.5.7958/3.2.1.1049, Monitoring privilege escalation
6231| [95704] Oracle MySQL Enterprise Monitor 3.1.4.7895/3.2.1.1049 Monitoring unknown vulnerability
6232| [93866] DBD-mysql up to 3.x/4.040 on Perl Use-After-Free memory corruption
6233| [92923] Oracle MySQL Server up to 5.6.33/5.7.15 Encryption denial of service
6234| [92911] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 MySQL weak encryption
6235| [92900] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 Optimizer denial of service
6236| [92899] Oracle MySQL Server up to 5.6.31/5.7.13 InnoDB denial of service
6237| [92898] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 GIS denial of service
6238| [92897] Oracle MySQL Server up to 5.5.51 DML denial of service
6239| [92896] Oracle MySQL Server up to 5.5.50/5.6.31/5.7.13 DML denial of service
6240| [92895] Oracle MySQL Server up to 5.6.31 5.7.13 DML denial of service
6241| [92874] Oracle MySQL Connector up to 2.1.3/2.0.4 Connector/Python unknown vulnerability
6242| [92850] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 MySQL denial of service
6243| [92835] Oracle MySQL Server up to 5.7.13 Audit denial of service
6244| [92834] Oracle MySQL Server up to 5.7.13 RBR denial of service
6245| [92833] Oracle MySQL Server up to 5.7.13 Performance Schema denial of service
6246| [92832] Oracle MySQL Server up to 5.7.14 Optimizer denial of service
6247| [92831] Oracle MySQL Server up to 5.7.13 Memcached denial of service
6248| [92830] Oracle MySQL Server up to 5.6.32/5.7.14 InnoDB denial of service
6249| [92829] Oracle MySQL Server up to 5.6.31 5.7.13 InnoDB denial of service
6250| [92828] Oracle MySQL Server up to 5.7.13 InnoDB denial of service
6251| [92827] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 Federated denial of service
6252| [92826] Oracle MySQL Server up to 5.7.13 DML denial of service
6253| [92821] Oracle MySQL Server up to 5.7.13 Replication denial of service
6254| [92820] Oracle MySQL Server up to 5.7.13 Performance Schema denial of service
6255| [92819] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 MySQL denial of service
6256| [92818] Oracle MySQL Server up to 5.5.52/5.6.33/5.7.15 Encryption information disclosure
6257| [92817] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 Types denial of service
6258| [92815] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 MySQL denial of service
6259| [92814] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 MySQL denial of service
6260| [92813] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 MySQL denial of service
6261| [92798] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 MySQL denial of service
6262| [92797] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 MySQL denial of service
6263| [92790] Oracle MySQL Server up to 5.7.14 Privileges information disclosure
6264| [92789] Oracle MySQL Server up to 5.6.30/5.7.12 InnoDB Plugin unknown vulnerability
6265| [92292] libdbd-mysql-perl 4.028 Error Message denial of service
6266| [91920] Open Dental up to 16.1 MySQL Server Default Credentials weak authentication
6267| [91625] PHP up to 5.6.25/7.0.10 mysqlnd Heap-based memory corruption
6268| [91505] Oracle MySQL up to 5.5.52/5.6.33/5.7.15 Logging my.cnf privilege escalation
6269| [90877] DBD::mysql up to 4.033 my_login memory corruption
6270| [90876] DBD::mysql up to 4.028 Use-After-Free memory corruption
6271| [90137] Oracle MySQL Server up to 5.5.48/5.6.29/5.7.10 Encryption information disclosure
6272| [90136] Oracle MySQL Server up to 5.5.48/5.6.29/5.7.11 Connection information disclosure
6273| [90134] Oracle MySQL Server up to 5.7.12 Encryption denial of service
6274| [90133] Oracle MySQL Server up to 5.7.12 Replication denial of service
6275| [90132] Oracle MySQL Server up to 5.5.49/5.6.30/5.7.12 RBR denial of service
6276| [90131] Oracle MySQL Server up to 5.6.30/5.7.12 Privileges denial of service
6277| [90130] Oracle MySQL Server up to 5.7.12 Optimizer denial of service
6278| [90129] Oracle MySQL Server up to 5.7.12 Log denial of service
6279| [90128] Oracle MySQL Server up to 5.6.30/5.7.12 InnoDB denial of service
6280| [90127] Oracle MySQL Server up to 5.7.12 InnoDB denial of service
6281| [90126] Oracle MySQL Server up to 5.6.30/5.7.12 Encryption denial of service
6282| [90125] Oracle MySQL Server up to 5.5.49/5.6.30/5.7.12 DML denial of service
6283| [90124] Oracle MySQL Server up to 5.7.12 InnoDB memory corruption
6284| [90123] Oracle MySQL Server up to 5.5.49/5.6.30/5.7.12 Types denial of service
6285| [90122] Oracle MySQL Server up to 5.7.12 Optimizer denial of service
6286| [90121] Oracle MySQL Server up to 5.6.30/5.7.12 Optimizer denial of service
6287| [90120] Oracle MySQL Server up to 5.6.30/5.7.12 FTS denial of service
6288| [90118] Oracle MySQL Server up to 5.6.30/5.7.12 Encryption denial of service
6289| [90117] Oracle MySQL Server up to 5.7.11 Optimizer denial of service
6290| [87408] PHP up to 5.4.42/5.5.26/5.6.10 SSL ext/mysqlnd/mysqlnd.c weak encryption
6291| [82687] Oracle MySQL Server up to 5.5.48/5.6.29/5.7.11 Connection Handling spoofing
6292| [82685] Oracle MySQL Enterprise Monitor up to 3.0.25/3.1.2 Monitoring unknown vulnerability
6293| [82684] Oracle MySQL Server up to 5.6.28/5.7.10 Encryption denial of service
6294| [82683] Oracle MySQL Server up to 5.6.29/5.7.11 Pluggable Authentication unknown vulnerability
6295| [82682] Oracle MySQL Server up to 5.6.29/5.7.11 Packaging memory corruption
6296| [80605] Oracle MySQL Server up to 5.5.46/5.6.27/5.7.9 Privileges denial of service
6297| [80604] Oracle MySQL Server up to 5.6.26 denial of service
6298| [80603] Oracle MySQL Server up to 5.5.45/5.6.26 Encryption information disclosure
6299| [80602] Oracle MySQL Server up to 5.6.27/5.7.9 Replication denial of service
6300| [80601] Oracle MySQL Server up to 5.5.46/5.6.27/5.7.9 UDF denial of service
6301| [80600] Oracle MySQL Server up to 5.5.46/5.6.27/5.7.9 Encryption weak encryption
6302| [80599] Oracle MySQL Server 5.7.9 Partition denial of service
6303| [80598] Oracle MySQL Server 5.7.9 Optimizer denial of service
6304| [80597] Oracle MySQL Server up to 5.6.27 InnoDB denial of service
6305| [80596] Oracle MySQL Server up to 5.5.46/5.6.27/5.7.9 InnoDB denial of service
6306| [80595] Oracle MySQL Server up to 5.5.46/5.6.27/5.7.9 DML denial of service
6307| [80594] Oracle MySQL Server up to 5.5.46 Optimizer denial of service
6308| [80593] Oracle MySQL Server up to 5.6.27/5.7.9 Optimizer denial of service
6309| [80592] Oracle MySQL Server up to 5.5.46/5.6.27/5.7.9 Optimizer denial of service
6310| [80591] Oracle MySQL Server up to 5.5.31/5.6.11 Optimizer denial of service
6311| [80590] Oracle MySQL Server up to 5.5.46/5.6.27 DML denial of service
6312| [80589] Oracle MySQL Server up to 5.6.27/5.7.9 DML denial of service
6313| [80588] Oracle MySQL Server up to 5.6.27 DML denial of service
6314| [80587] Oracle MySQL Server up to 5.6.21 DML denial of service
6315| [80586] Oracle MySQL Server up to 5.5.46/5.6.27/5.7.9 Options unknown vulnerability
6316| [80585] Oracle MySQL Server up to 5.6.27/5.7.9 DML memory corruption
6317| [80184] Rename Plugin 1.0 on WordPress mysqldump_download.php directory traversal
6318| [78705] Oracle MySQL Server up to 5.5.45/5.6.26 Partition denial of service
6319| [78703] Oracle MySQL Server up to 5.6.26 Memcached denial of service
6320| [78702] Oracle MySQL Server up to 5.5.45/5.6.26 SP denial of service
6321| [78701] Oracle MySQL Server up to 5.5.43/5.6.24 Privileges information disclosure
6322| [78700] Oracle MySQL Server up to 5.6.26 Privileges denial of service
6323| [78699] Oracle MySQL Server up to 5.6.26 Replication denial of service
6324| [78698] Oracle MySQL Server up to 5.5.45/5.6.26 Query Cache denial of service
6325| [78697] Oracle MySQL Server up to 5.5.45/5.6.26 InnoDB denial of service
6326| [78696] Oracle MySQL Server up to 5.6.25 InnoDB denial of service
6327| [78695] Oracle MySQL Server up to 5.5.45/5.6.26 DML denial of service
6328| [78694] Oracle MySQL Server up to 5.6.25 libmysqld denial of service
6329| [78693] Oracle MySQL Server up to 5.5.45/5.6.26 Types unknown vulnerability
6330| [78692] Oracle MySQL Server up to 5.6.20 Types denial of service
6331| [78691] Oracle MySQL Server up to 5.5.45/5.6.26 Privileges unknown vulnerability
6332| [78690] Oracle MySQL Server up to 5.6.25 Partition denial of service
6333| [78689] Oracle MySQL Server up to 5.5.45/5.6.26 Partition denial of service
6334| [78688] Oracle MySQL Server up to 5.5.45/5.6.26 Parser denial of service
6335| [78687] Oracle MySQL Server up to 5.6.26 Optimizer denial of service
6336| [78686] Oracle MySQL Server up to 5.5.44 InnoDB denial of service
6337| [78685] Oracle MySQL Server up to 5.6.23 InnoDB denial of service
6338| [78684] Oracle MySQL Server up to 5.6.26 DML denial of service
6339| [78683] Oracle MySQL Server up to 5.5.45/5.6.26 DML denial of service
6340| [78682] Oracle MySQL Server up to 5.6.23 DML denial of service
6341| [78681] Oracle MySQL Server up to 5.5.45/5.6.26 DDL denial of service
6342| [78680] Oracle MySQL Server up to 5.5.44/5.6.25 DML unknown vulnerability
6343| [78679] Oracle MySQL Enterprise Monitor up to 2.3.20/3.0.20 C-Agent / Service Manager denial of service
6344| [78678] Oracle MySQL Server up to 5.6.25 Encryption spoofing
6345| [78676] Oracle MySQL Enterprise Monitor up to 2.3.20/3.0.22 C-Agent denial of service
6346| [77699] JSP/MySQL Administrador Web 1 sys/sys/listaBD2.jsp cross site scripting
6347| [77698] JSP/MySQL Administrador Web 1 sys/sys/listaBD2.jsp cross site request forgery
6348| [76704] Oracle MySQL Server up to 5.6.24 Partition denial of service
6349| [76703] Oracle MySQL Server up to 5.6.24 RBR denial of service
6350| [76701] Oracle MySQL Server up to 5.6.24 Firewall denial of service
6351| [76699] Oracle MySQL Server up to 5.6.24 Firewall denial of service
6352| [76695] Oracle MySQL Server up to 5.6.24 MemCached denial of service
6353| [76691] Oracle MySQL Server up to 5.5.42 Optimizer denial of service
6354| [76690] Oracle MySQL Server up to 5.6.22 InnoDB denial of service
6355| [76686] Oracle MySQL Server up to 5.5.43/5.6.24 denial of service
6356| [76671] Oracle MySQL Server up to 5.5.43/5.6.23 Pluggable Auth information disclosure
6357| [76634] Oracle MySQL Server up to 5.5.43/5.6.24 DML denial of service
6358| [76629] Oracle MySQL Server up to 5.5.43/5.6.24 Optimizer denial of service
6359| [76628] Oracle MySQL Server up to 5.6.24 denial of service
6360| [76626] Oracle MySQL Server up to 5.6.24 Firewall information disclosure
6361| [76608] Oracle MySQL Server up to 5.5.43/5.6.23 information disclosure
6362| [76605] Oracle MySQL Server up to 5.6.24 Partition information disclosure
6363| [76599] Oracle MySQL Server up to 5.6.24 DML information disclosure
6364| [76571] Oracle MySQL Server up to 5.5.43/5.6.24 GIS denial of service
6365| [76081] MySQL Lite Administrator Beta-1 tabella.php cross site scripting
6366| [75579] lighttpd 1.4.35 Log File mod_mysql_vhost.c privilege escalation
6367| [75159] Oracle MySQL up to 5.7.2 SSL Client weak encryption
6368| [74969] Oracle MySQL Server up to 5.6.23 Replication denial of service
6369| [74967] Oracle MySQL Server up to 5.6.23 SP denial of service
6370| [74966] Oracle MySQL Server up to 5.6.22 DML weak encryption
6371| [74965] Oracle MySQL Server up to 5.6.23 Privileges denial of service
6372| [74964] Oracle MySQL Server up to 5.6.23 Memcached denial of service
6373| [74963] Oracle MySQL Server up to 5.6.23 InnoDB denial of service
6374| [74962] Oracle MySQL Server up to 5.5.42/5.6.23 Federated unknown vulnerability
6375| [74961] Oracle MySQL Server up to 5.5.42/5.6.23 DDL unknown vulnerability
6376| [74960] Oracle MySQL Server up to 5.6.22 XA weak encryption
6377| [74959] Oracle MySQL Server up to 5.5.41/5.6.22 Encryption weak encryption
6378| [74958] Oracle MySQL Server up to 5.6.23 Partition denial of service
6379| [74957] Oracle MySQL Server up to 5.6.22 Partition weak encryption
6380| [74956] Oracle MySQL Server up to 5.5.42/5.6.23 Optimizer unknown vulnerability
6381| [74955] Oracle MySQL Server up to 5.6.22 Optimizer weak encryption
6382| [74954] Oracle MySQL Server up to 5.5.41/5.6.22 DML unknown vulnerability
6383| [74953] Oracle MySQL Server up to 5.6.23 InnoDB denial of service
6384| [74952] Oracle MySQL Server up to 5.6.22 InnoDB weak encryption
6385| [74951] Oracle MySQL Server up to 5.6.23 Information Schema denial of service
6386| [74950] Oracle MySQL Server up to 5.5.41/5.6.22 DDL unknown vulnerability
6387| [74949] Oracle MySQL Connectors up to 5.1.34 Connector/J unknown vulnerability
6388| [74948] Oracle MySQL Server up to 5.5.41/5.6.22 Privileges unknown vulnerability
6389| [74947] Oracle MySQL Server up to 5.6.22 Encryption s23_srvr.c ssl23_get_client_hello denial of service
6390| [74946] Oracle MySQL Server up to 5.5.42/5.6.23 Compiling unknown vulnerability
6391| [74945] Oracle MySQL Enterprise Monitor up to 2.3.19/3.0.18 Service Manager s:token/ cross site request forgery
6392| [74944] Oracle MySQL Enterprise Monitor up to 2.3.16/3.0.10 Service Manager memory corruption
6393| [68810] Oracle MySQL Server up to 5.5.40/5.6.21 Foreign Key information disclosure
6394| [68809] Oracle MySQL Server up to 5.6.21 Pluggable Auth denial of service
6395| [68808] Oracle MySQL Server up to 5.5.40/5.6.21 DML denial of service
6396| [68807] Oracle MySQL Server up to 5.6.21 Optimizer denial of service
6397| [68806] Oracle MySQL Server up to 5.5.40 Foreign Key denial of service
6398| [68805] Oracle MySQL Server up to 5.5.38/5.6.19 DDL denial of service
6399| [68804] Oracle MySQL Server up to 5.5.40/5.6.21 Replication denial of service
6400| [68803] Oracle MySQL Server up to 5.5.40/5.6.21 Replication denial of service
6401| [68802] Oracle MySQL Server up to 5.5.40/5.6.21 Encryption weak encryption
6402| [67988] Oracle MySQL Server up to 5.5.38/5.6.19 denial of service
6403| [67987] Oracle MySQL Server up to 5.6.19 denial of service
6404| [67986] Oracle MySQL Server up to 5.5.38/5.6.19 denial of service
6405| [67985] Oracle MySQL Server up to 5.6.19 denial of service
6406| [67984] Oracle MySQL Server up to 5.5.39/5.6.20 denial of service
6407| [67983] Oracle MySQL Server up to 5.5.38/5.6.19 denial of service
6408| [67982] Oracle MySQL Server up to 5.5.38 denial of service
6409| [67981] Oracle MySQL Server up to 5.5.38/5.6.19 denial of service
6410| [67979] Oracle MySQL Server up to 5.5.38/5.6.19 unknown vulnerability
6411| [67978] Oracle MySQL Server up to 5.5.38/5.6.19 denial of service
6412| [67977] Oracle MySQL Server up to 5.5.39/5.6.20 denial of service
6413| [67976] Oracle MySQL Server up to 5.5.39/5.6.20 denial of service
6414| [67975] Oracle MySQL Server up to 5.5.39/5.6.20 information disclosure
6415| [67974] Oracle MySQL Server up to 5.5.38/5.6.19 Messages Stack-Based sql injection
6416| [67973] Oracle MySQL Server up to 5.6.19 unknown vulnerability
6417| [67972] Oracle MySQL Server up to 5.5.39/5.6.20 unknown vulnerability
6418| [67971] Oracle MySQL Server up to 5.5.38/5.6.19 unknown vulnerability
6419| [67970] Oracle MySQL Server up to 5.6.19 Messages NULL Pointer Dereference denial of service
6420| [67969] Oracle MySQL Server up to 5.5.39/5.6.20 directory traversal
6421| [67968] Oracle MySQL Server up to 5.5.39/5.6.20 denial of service
6422| [67967] Oracle MySQL Server up to 5.5.39/5.6.20 denial of service
6423| [67966] Oracle MySQL Server up to 5.5.39/5.6.20 unknown vulnerability
6424| [68555] McAfee Network Data Loss Prevention 9.2.0 MySQL Database weak authentication
6425| [67245] phpMyAdmin up to 4.2.5 MySQL User List server_user_groups.php privilege escalation
6426| [67166] Oracle MySQL Server up to 5.5.35/5.6.15 denial of service
6427| [67165] Oracle MySQL Server up to 5.6.17 denial of service
6428| [67163] Oracle MySQL Server up to 5.6.17 denial of service
6429| [67162] Oracle MySQL Server up to 5.5.37 denial of service
6430| [67161] Oracle MySQL Server up to 5.6.17 denial of service
6431| [67160] Oracle MySQL Server up to 5.5.37 denial of service
6432| [67159] Oracle MySQL Server up to 5.5.37/5.6.17 unknown vulnerability
6433| [67158] Oracle MySQL Server up to 5.5.37/5.6.17 unknown vulnerability
6434| [67157] Oracle MySQL Server up to 5.6.17 unknown vulnerability
6435| [13065] Django up to 1.7 MySQL Typecast privilege escalation
6436| [12983] Oracle MySQL Server up to 5.5.36/5.6.16 Options denial of service
6437| [12982] Oracle MySQL Server up to 5.5.35/5.6.15 Federated denial of service
6438| [12981] Oracle MySQL Server up to 5.5.35/5.6.15 Replication denial of service
6439| [12980] Oracle MySQL Server up to 5.6.15 Privileges denial of service
6440| [12979] Oracle MySQL Server up to 5.5.36/5.6.16 Performance Schema denial of service
6441| [12978] Oracle MySQL Server up to 5.5.35/5.6.15 XML denial of service
6442| [12977] Oracle MySQL Server up to 5.5.35/5.6.15 Partition denial of service
6443| [12976] Oracle MySQL Server up to 5.6.15 Optimizer denial of service
6444| [12975] Oracle MySQL Server up to 5.6.15 MyISAM denial of service
6445| [12974] Oracle MySQL Server up to 5.6.16 InnoDB denial of service
6446| [12973] Oracle MySQL Server up to 5.6.15 DML denial of service
6447| [12972] Oracle MySQL Client up to 5.5.36/5.6.16 unknown vulnerability
6448| [12971] Oracle MySQL Server up to 5.5.36/5.6.16 RBR unknown vulnerability
6449| [12970] Oracle MySQL Server up to 5.6.15 InnoDB unknown vulnerability
6450| [12613] lighttpd up to 1.4.34 MySQL Virtual Hosting Module mod_mysql_vhost.c sql injection
6451| [12135] Oracle MySQL client/mysql.cc Server Version memory corruption
6452| [66191] Cisco Video Surveillance Operations Manager MySQL Database denial of service
6453| [66079] CSP MySQL User Manager 2.3 Login Page sql injection
6454| [11948] Oracle MySQL Server up to 5.1.72/5.5.34/5.6.14 Error Handling Crash denial of service
6455| [11947] Oracle MySQL Server up to 5.5.34/5.6.14 Replication denial of service
6456| [11946] Oracle MySQL Server up to 5.6.13 Performance Schema Stored denial of service
6457| [11945] Oracle MySQL Server up to 5.1.71/5.5.33/5.6.13 InnoDB memory corruption
6458| [11944] Oracle MySQL Server up to 5.1.72/5.5.34/5.6.14 Optimizer Crash denial of service
6459| [11943] Oracle MySQL Server up to 5.6.14 InnoDB Stored denial of service
6460| [11942] Oracle MySQL Server up to 5.6.13 FTS Stored denial of service
6461| [11941] Oracle MySQL Server up to 5.1.72/5.5.34/5.6.14 Privileges Crash denial of service
6462| [11940] Oracle MySQL Server up to 5.5.33/5.6.13 Partition denial of service
6463| [11939] Oracle MySQL Server up to 5.1.71/5.5.33/5.6.13 Optimizer Crash denial of service
6464| [11938] Oracle MySQL Server up to 5.1.71/5.5.33/5.6.13 Locking Crash denial of service
6465| [11937] Oracle MySQL Server up to 5.1.72/5.5.34/5.6.14 InnoDB Crash denial of service
6466| [11936] Oracle MySQL Server up to 5.6.14 InnoDB Stored denial of service
6467| [11935] Oracle MySQL Server up to 5.6.13 InnoDB Stored denial of service
6468| [11934] Oracle MySQL Server up to 5.6.13 Thread Pooling Stored denial of service
6469| [11933] Oracle MySQL Server up to 5.6.13 Stored Procedure denial of service
6470| [11932] Oracle MySQL Server up to 5.6.14 GIS Stored denial of service
6471| [11931] Oracle MySQL Enterprise Monitor up to 2.3.14/3.0.4 Service Manager unknown vulnerability
6472| [10822] Oracle MySQL Server up to 5.6.12 Locking unknown vulnerability
6473| [10821] Oracle MySQL Server up to 5.6.12 InnoDB unknown vulnerability
6474| [10820] Oracle MySQL Server up to 5.6.12 Optimizer unknown vulnerability
6475| [10819] Oracle MySQL Server up to 5.1.70/5.5.32/5.6.12 Optimizer memory corruption
6476| [10818] Oracle MySQL Server up to 5.1/5.5.22 Optimizer denial of service
6477| [10817] Oracle MySQL Server up to 5.6.12 InnoDB unknown vulnerability
6478| [10816] Oracle MySQL Server up to 5.5.32/5.6.12 Replication unknown vulnerability
6479| [10815] Oracle MySQL Enterprise Monitor up to 2.3.13 Service Manager privilege escalation
6480| [65143] MariaDB up to 5.5.28 MySQL privilege escalation
6481| [9672] Oracle MySQL Server up to 5.6.11 XA Transactions denial of service
6482| [9671] Oracle MySQL Server up to 5.5.31/5.6.11 Server Replication denial of service
6483| [9670] Oracle MySQL Server up to 5.6.11 InnoDB denial of service
6484| [9669] Oracle MySQL Server up to 5.6.11 Server Privileges unknown vulnerability
6485| [9668] Oracle MySQL Server up to 5.5.30/5.6.10 Server Partition Stored unknown vulnerability
6486| [9667] Oracle MySQL Server up to 5.5.31 Server Parser denial of service
6487| [9666] Oracle MySQL Server up to 5.5.30/5.6.10 Server Options Stored unknown vulnerability
6488| [9665] Oracle MySQL Server up to 5.1.68/5.5.30/5.6.10 Server Options denial of service
6489| [9664] Oracle MySQL Server up to 5.6.11 Server Optimizer unknown vulnerability
6490| [9663] Oracle MySQL Server up to 5.1.69/5.5.31/5.6.11 Server Optimizer denial of service
6491| [9662] Oracle MySQL Server up to 5.5.30/5.6.10 Prepared Statement Stored unknown vulnerability
6492| [9661] Oracle MySQL Server up to 5.6.11 InnoDB denial of service
6493| [9660] Oracle MySQL Server up to 5.1.69/5.5.31/5.6.11 Full Text Search denial of service
6494| [9659] Oracle MySQL Server up to 5.6.11 Data Manipulation Language unknown vulnerability
6495| [9658] Oracle MySQL Server up to 5.5.31/5.6.11 Data Manipulation Language denial of service
6496| [9657] Oracle MySQL Server up to 5.5.31/5.6.11 Audit Log information disclosure
6497| [9656] Oracle MySQL Server up to 5.6.11 MemCached unknown vulnerability
6498| [9655] Oracle MySQL Server up to 5.1.69/5.5.31/5.6.11 GIS Crash denial of service
6499| [64198] Wireshark up to 1.8.6 MySQL Dissector Integer denial of service
6500| [64010] Ruby on Rails 3.1.0 MySQL Database Stored unknown vulnerability
6501| [8418] Oracle MySQL Server up to 5.1.67/5.5.29/5.6.10 Server Locking unknown vulnerability
6502| [8416] Oracle MySQL Server up to 5.1.63 Server Types unknown vulnerability
6503| [8415] Oracle MySQL Server up to 5.6.10 Server Privileges denial of service
6504| [8414] Oracle MySQL Server up to 5.6.10 InnoDB denial of service
6505| [8413] Oracle MySQL Server up to 5.5.30/5.6.10 InnoDB unknown vulnerability
6506| [8412] Oracle MySQL Server up to 5.6.10 Data Manipulation Language denial of service
6507| [8411] Oracle MySQL Server up to 5.5.30/5.6.10 Stored Procedure unknown vulnerability
6508| [8410] Oracle MySQL Server up to 5.1.67/5.5.29 Server XML denial of service
6509| [8409] Oracle MySQL Server up to 5.5.29 Server Replication denial of service
6510| [8408] Oracle MySQL Server up to 5.1.67/5.5.29 Server Partition unknown vulnerability
6511| [8407] Oracle MySQL Server up to 5.1.68/5.5.30/5.6.10 Server Optimizer unknown vulnerability
6512| [8406] Oracle MySQL Server up to 5.1.68/5.5.30/5.6.10 InnoDB unknown vulnerability
6513| [8405] Oracle MySQL Server up to 5.1.68/5.5.30/5.6.10 Information Schema unknown vulnerability
6514| [8404] Oracle MySQL Server up to 5.5.29 Data Manipulation Language denial of service
6515| [8403] Oracle MySQL Server up to 5.1.68/5.5.30/5.6.10 Data Manipulation Language unknown vulnerability
6516| [8402] Oracle MySQL Server up to 5.5.29/5.6.10 Server Optimizer denial of service
6517| [8401] Oracle MySQL Server up to 5.6.10 MemCached denial of service
6518| [8400] Oracle MySQL Server up to 5.1.68/5.5.30/5.6.10 Server Privileges unknown vulnerability
6519| [8399] Oracle MySQL Server up to 5.1.66/5.5.28 Server Privileges unknown vulnerability
6520| [8398] Oracle MySQL Server up to 5.1.67/5.5.29 unknown vulnerability
6521| [8397] Oracle MySQL Server up to 5.1.67/5.5.29/5.6.10 Information Schema unknown vulnerability
6522| [8396] Oracle MySQL Server up to 5.1.67/5.5.29 Server Locking unknown vulnerability
6523| [8395] Oracle MySQL Server up to 5.6.10 Data Manipulation Language denial of service
6524| [10871] Oracle MySQL 5.3.12/5.5.30/10.0.1 MyISAM Engine init_search SELECT Statement denial of service
6525| [8065] Oracle MySQL up to 5.5.27 yaSSL memory corruption
6526| [8064] Oracle MySQL up to 5.5.29 yaSSL memory corruption
6527| [8816] Wireshark up to 1.8.5 MySQL Dissector packet-mysql.c Packet denial of service
6528| [8019] Oracle MySQL 5.2.11 Representation Converter Eingabe Crash denial of service
6529| [7431] Oracle MySQL Server up to 5.5.28 Privileges denial of service
6530| [7430] Oracle MySQL Server up to 5.5.28 Partition denial of service
6531| [7429] Oracle MySQL Server up to 5.5.28 Optimizer denial of service
6532| [7428] Oracle MySQL Server up to 5.1.66/5.5.28 Optimizer unknown vulnerability
6533| [7427] Oracle MySQL Server up to 5.1.66/5.5.28 unknown vulnerability
6534| [7426] Oracle MySQL Server up to 5.5.28 MyISAM denial of service
6535| [7425] Oracle MySQL Server up to 5.1.66/5.5.28 InnoDB unknown vulnerability
6536| [7424] Oracle MySQL Server up to 5.5.28 InnoDB denial of service
6537| [7423] Oracle MySQL Server up to 5.1.66/5.5.28 Locking unknown vulnerability
6538| [7422] Oracle MySQL Server up to 5.1.66/5.5.28 unknown vulnerability
6539| [7421] Oracle MySQL Server up to 5.1.66/5.1.28 Replication unknown vulnerability
6540| [7419] Oracle MySQL Server up to 5.5.28 Stored Procedure denial of service
6541| [7418] Oracle MySQL Server up to 5.1.66/5.5.28 Server Optimizer unknown vulnerability
6542| [7417] Oracle MySQL Server up to 5.1.66/5.5.28 Information Schema unknown vulnerability
6543| [7416] Oracle MySQL Server up to 5.1.65/5.5.27 GIS Extension denial of service
6544| [7415] Oracle MySQL Server up to 5.1.66/5.5.28 Privileges Stack-based memory corruption
6545| [7414] Oracle MySQL Server up to 5.5.28 Parser Heap-based memory corruption
6546| [63111] Oracle MySQL 5.5.19 Installation denial of service
6547| [7068] Oracle MySQL Server up to 5.5.19 Authentication information disclosure
6548| [7067] Oracle MySQL Server up to 5.5.19 sql/sql_acl.cc acl_get memory corruption
6549| [7066] Oracle MySQL Server up to 5.5.19 SELECT Command Crash denial of service
6550| [7065] Oracle MySQL Server up to 5.5.19 Create Table MDL_key::mdl_key_init memory corruption
6551| [6795] Oracle MySQL Server up to 5.1.64/5.5.26 Server Replication denial of service
6552| [6794] Oracle MySQL Server up to 5.1.63/5.5.25 Server Full Text Search denial of service
6553| [6793] Oracle MySQL Server up to 5.5.25 unknown vulnerability
6554| [6792] Oracle MySQL Server up to 5.5.26 MySQL Client information disclosure
6555| [6791] Oracle MySQL Server up to 5.1.65/5.5.27 Server Optimizer denial of service
6556| [6790] Oracle MySQL Server up to 5.1.64/5.5.26 Server Optimizer denial of service
6557| [6789] Oracle MySQL Server up to 5.5.26 unknown vulnerability
6558| [6788] Oracle MySQL Server up to 5.1.63/5.5.25 InnoDB Plugin denial of service
6559| [6787] Oracle MySQL Server up to 5.1.63/5.5.25 InnoDB unknown vulnerability
6560| [6786] Oracle MySQL Server up to 5.5.26 MySQL Client sql injection
6561| [6785] Oracle MySQL Server up to 5.1.65/5.5.27 denial of service
6562| [6784] Oracle MySQL Server up to 5.1.64/5.5.26 Protocol unknown vulnerability
6563| [6783] Oracle MySQL Server up to 5.1.64/5.5.26 Information Schema memory corruption
6564| [62299] SilverStripe up to 2.4.5 MySQL Database sql injection
6565| [61672] MySQL unknown vulnerability
6566| [61567] MySQLDumper 1.24.4 Error Message information disclosure
6567| [61566] MySQLDumper 1.24.4 Restore information disclosure
6568| [61565] MySQLDumper 1.24.4 directory traversal
6569| [61564] MySQLDumper 1.24.4 deletehtaccess cross site request forgery
6570| [61563] MySQLDumper 1.24.4 index.php cross site scripting
6571| [5783] Oracle MySQL Server up to 5.1.62/5.5.22 Server Optimizer denial of service
6572| [5782] Oracle MySQL Server up to 5.1.62/5.5.23 Server Optimizer denial of service
6573| [5781] Oracle MySQL Server up to 5.5.23 denial of service
6574| [5780] Oracle MySQL Server up to 5.5.23 InnoDB denial of service
6575| [5779] Oracle MySQL Server up to 5.1.62/5.5.23 GIS Extension unknown vulnerability
6576| [5778] Oracle MySQL Server up to 5.5.23 Server Optimizer denial of service
6577| [5635] Oracle MySQL Server up to 5.5.25 on Linux InnoDB UPDATE denial of service
6578| [5503] Oracle MySQL up to 5.6.5 Password Authentication sql/password.c memcmp weak authentication
6579| [5168] Oracle MySQL Server Optimizer denial of service
6580| [5166] Oracle MySQL Server up to 5.5.21 Partition denial of service
6581| [5165] Oracle MySQL Server up to 5.5.19 Optimizer denial of service
6582| [5159] Oracle MySQL Server up to 5.1.61/5.5.21 Optimizer denial of service
6583| [5158] Oracle MySQL Server up to 5.1.61/5.5.21 DML denial of service
6584| [5151] Oracle MySQL Server up to 5.1.60/5.5.19 MyISAM denial of service
6585| [5981] Oracle MySQL Server 5.1.62/5.5.23 Sort Order Index Calculation denial of service
6586| [5072] Oracle MySQL Server up to 5.5.21 denial of service
6587| [4627] Oracle MySQL up to 5.5.20 memory corruption
6588| [60055] WordPress up to 1.2 MySQL Database denial of service
6589| [5236] Oracle MySQL Server 5.5.x unknown vulnerability
6590| [5235] Oracle MySQL Server 5.5.x denial of service
6591| [5233] Oracle MySQL Server 5.5.x denial of service
6592| [5232] Oracle MySQL Server 5.5.x denial of service
6593| [5231] Oracle MySQL Server 5.5.x denial of service
6594| [5230] Oracle MySQL Server 5.5.x denial of service
6595| [5229] Oracle MySQL Server 5.5.x denial of service
6596| [5228] Oracle MySQL Server 5.5.x denial of service
6597| [5227] Oracle MySQL Server 5.5.x unknown vulnerability
6598| [5226] Oracle MySQL Server 5.1.x/5.5.x denial of service
6599| [5225] Oracle MySQL Server 5.1.x/5.5.x denial of service
6600| [5224] Oracle MySQL Server 5.1.x/5.5.x unknown vulnerability
6601| [5223] Oracle MySQL Server 5.1.x/5.5.x unknown vulnerability
6602| [5222] Oracle MySQL Server 5.1.x/5.5.x unknown vulnerability
6603| [5221] Oracle MySQL Server 5.1.x/5.5.x unknown vulnerability
6604| [5220] Oracle MySQL Server 5.1.x/5.5.x unknown vulnerability
6605| [5219] Oracle MySQL Server 5.1.x/5.5.x unknown vulnerability
6606| [5218] Oracle MySQL Server 5.1.x/5.5.x unknown vulnerability
6607| [5217] Oracle MySQL Server 5.1.x/5.5.x unknown vulnerability
6608| [5216] Oracle MySQL Server 5.0.x/5.1.x/5.5.x denial of service
6609| [5215] Oracle MySQL Server 5.0.x/5.1.x/5.5.x information disclosure
6610| [5213] Oracle MySQL Server 5.0.x/5.1.x/5.5.x unknown vulnerability
6611| [5212] Oracle MySQL Server 5.0.x/5.1.x denial of service
6612| [5211] Oracle MySQL Server 5.0.x/5.1.x denial of service
6613| [5210] Oracle MySQL Server 5.0.x/5.1.x denial of service
6614| [59882] MySQL 5.5.8 NULL Pointer Dereference denial of service
6615| [59384] Hiroyuki Oyama DBD::mysqlPP up to 0.04 MySQL sql injection
6616| [58706] Taskfreak! Multi-mysql 0.6 Error Message information disclosure
6617| [57356] Trustwave WebDefend 2.0/3.0/5.0 MySQL Database unknown vulnerability
6618| [56109] PHP 5.3.2/5.3.3 mysqli mysqli_fetch_assoc sql injection
6619| [56085] MySQL up to 5.1.25 init_from_wkb denial of service
6620| [56084] MySQL up to 5.1.25 Stored Procedure denial of service
6621| [56083] MySQL Crash denial of service
6622| [56082] MySQL Use-After-Free denial of service
6623| [56081] MySQL Optimizer Crash denial of service
6624| [56080] MySQL up to 5.1.25 Stored denial of service
6625| [56079] MySQL Crash denial of service
6626| [56078] MySQL Create Table Crash denial of service
6627| [56025] MySQL up to 5.1.25 Crash denial of service
6628| [56024] MySQL up to 5.1.25 store denial of service
6629| [56023] MySQL up to 5.1.25 Crash denial of service
6630| [56022] MySQL up to 5.1.25 Crash denial of service
6631| [56021] MySQL up to 5.1.25 Uninitialized Memory denial of service
6632| [56020] MySQL up to 5.1.25 Crash denial of service
6633| [56019] MySQL up to 5.1.25 Crash denial of service
6634| [56018] mysql up to 5.1.25 Configuration Parameter denial of service
6635| [60789] TYPO3 up to 4.4.4 MySQL Database escapeStrForLike information disclosure
6636| [62294] SilverStripe 2.4.0/2.4.1/2.4.2/2.4.3 MySQLDatabase.php unknown vulnerability
6637| [54434] PHP 5.3.0/5.3.1/5.3.2 php_mysqlnd_auth_write sql injection
6638| [54433] PHP 5.3.0/5.3.1/5.3.2 MySQL php_mysqlnd_read_error_from_line memory corruption
6639| [54432] PHP 5.3.0/5.3.1/5.3.2 mysqlnd_wireprotocol.c php_mysqlnd_rset_header_read memory corruption
6640| [54026] MySQL up to 5.1.25 Crash denial of service
6641| [53483] MySQL up to 5.0.0.0 memory corruption
6642| [53482] MySQL up to 5.0.0.0 my_net_skip_rest denial of service
6643| [53481] MySQL up to 5.0.0.0 directory traversal
6644| [53212] mysql 5.1.45 mysql_uninstall_plugin unknown vulnerability
6645| [53118] Csphere ClanSphere up to 2009.0.3 MySQL Database generate.php cs_sql_select sql injection
6646| [53053] TaskFreak TaskFreak! up to 0.1.3 tzn_mysql.php loadByKey sql injection
6647| [52985] Oracle MySQLConnector NET up to 6.0.2 SSL Certificate spoofing
6648| [51369] mysql 5.0.51a CertDecoder::GetName memory corruption
6649| [51581] TYPO3 Kiddog Mysqldumper up to 0.0.3 information disclosure
6650| [50962] MySQL Certificates viosslfactories.c vio_verify_callback spoofing
6651| [50961] mysql GeomFromWKB denial of service
6652| [50960] MySQL up to 5.0.0.0 Access Restriction Symlink privilege escalation
6653| [50531] mysql-ocaml 1.0.4 MySQL mysql_real_escape_string unknown vulnerability
6654| [48981] MySQL up to 4.0.23 sql_parse.cc dispatch_command denial of service
6655| [48263] Surat Kabar phpWebNews 0.2 MySQL index.php sql injection
6656| [48262] Surat Kabar phpWebNews 0.1/0.2 MySQL bukutamu.php sql injection
6657| [47455] auth2db up to 0.2.6 MySQL mysql_real_escape_string sql injection
6658| [46983] MySQL up to 6.0.10-bzr ExtractValue denial of service
6659| [46798] Getmiro Broadcast Machine 0.1 MySQLController.php privilege escalation
6660| [46636] MyBlog MySQL Database Cleartext information disclosure
6661| [46500] ProFTPD 1.3.1 mod_sql_mysql sql injection
6662| [46028] Joey Schulze Mod Auth Mysql 2.x mod_auth_mysql.c sql injection
6663| [45774] Constructr CMS up to 3.02.5 MySQL Database Cleartext information disclosure
6664| [45668] Nodstrum MySQL Calendar 1.1 index.php sql injection
6665| [45669] Nodstrum MySQL Calendar 1.1 unknown vulnerability
6666| [45016] Deeserver Panuwat PromoteWeb MySQL go.php sql injection
6667| [44358] MySQL up to 5.0.67 cross site scripting
6668| [44357] MySQL Quick Admin up to 1.5.5 index.php directory traversal
6669| [44356] MySQL Quick Admin 1.5.5 actions.php directory traversal
6670| [44131] NooMS 1.1 MySQL db.php information disclosure
6671| [44076] MySQL Create Table Symlink privilege escalation
6672| [44075] MySQL 5.0.51a Create Table Symlink privilege escalation
6673| [43987] MySQL Crash denial of service
6674| [43825] Aquagardensoft mysql-lists 1.2 cross site scripting
6675| [43819] Craftysyntax Crafty Syntax Live Help up to 1.7 MySQL Database Cleartext information disclosure
6676| [43625] Keld PHP-MySQL News Script 0.7.1 login.php sql injection
6677| [43123] BlognPlus 2.5.5 MySQL index.php sql injection
6678| [42939] Relative Real Estate Systems up to 3.0 MySQL Database Cleartext information disclosure
6679| [42912] AlstraSoft AskMe 2.1 MySQL Database Cleartext information disclosure
6680| [42868] BlognPlus 2.5.4 MySQL sql injection
6681| [42205] miniBB 2.2 MySQL setup_mysql.php sql injection
6682| [41891] Terong Advanced Web Photo Gallery 1.0 MySQL Database Cleartext information disclosure
6683| [40486] MySQL up to 1.7.5 handshake.cpp processoldclienthello memory corruption
6684| [40219] PHP MySQL Banner Exchange 2.2.1 inc/lib.inc unknown vulnerability
6685| [39993] MySQL denial of service
6686| [3499] Sun MySQL up to 6.0.3 System Table Information privilege escalation
6687| [40030] aurora framework 20071208 MySQL db_mysql.lib pack_var sql injection
6688| [3469] Sun MySQL 5.1.23 Bk InnoDB denial of service
6689| [39991] MySQL up to 6.0.4 denial of service
6690| [39292] Asterisk-Addons 1.2.7/1.4.3 MySQL sql injection
6691| [41090] MySQL Mysql Community Server up to 5.1.4 unknown vulnerability
6692| [38781] PHP 5.2.4 MySQL memory corruption
6693| [38618] PHP 4.4.7/5.2.3 mysqli sql injection
6694| [85747] InterWorx SiteWorx mysql.php cross site scripting
6695| [85735] InterWorx NodeWorx mysql.php cross site scripting
6696| [37818] MySQL Community Server up to 5.0.40 denial of service
6697| [39994] MySQL Federated Crash denial of service
6698| [37641] MySQLDumper htaccess privilege escalation
6699| [86077] NetClassifieds Mysql_db.php information disclosure
6700| [37816] MySQL Community Server up to 5.0.40 Crash denial of service
6701| [36814] MySQL up to 5.1.17 information disclosure
6702| [36669] MySQL 4.0.1 unknown vulnerability
6703| [36813] mysql up to 5.1.17 thd::db_access denial of service
6704| [36812] MySQL up to 5.1.17 unknown vulnerability
6705| [36502] Burnstone burnCMS 0.2 mysql.class.php privilege escalation
6706| [36364] GPL PHP Board unstable-2001.11.14-1 mysqli db.mysql.inc.php privilege escalation
6707| [36700] MySQL up to 5.0.39 item_cmpfunc.cc in_decimal::set denial of service
6708| [35917] Advanced Website Creator MySQL sql injection
6709| [35916] Eve-Nuke Forum 0.1 MySQL db/mysql.php privilege escalation
6710| [35605] bitesser MySQL Commander up to 2.7 ressourcen/dbopen.php privilege escalation
6711| [85480] Fantastico includes/mysqlconfig.php directory traversal
6712| [85141] ActiveCalendar data/mysqlevents.php cross site scripting
6713| [85212] WGS-PPC config/mysql_config.php privilege escalation
6714| [34894] MySQLNewsEngine MySQL affichearticles.php3 privilege escalation
6715| [34576] MyODBC MySQL Database denial of service
6716| [37817] MySQL Community Server up to 5.0.40 Create Table information disclosure
6717| [34117] The Address Book 1.04e MySQL Database export.php information disclosure
6718| [34223] MySQL 5.0.30/5.1.13 sql_select.cc denial of service
6719| [33690] Widcomm BTSaveMySql 1.2 MySQL information disclosure
6720| [33257] iWonder Designs Storystream 0.4.0.0 mysql.php sql injection
6721| [33092] Pentaho Business Intelligence Suite up to 1.1 MySQL sql injection
6722| [32736] MysqlDumper 1.21 B6 sql.php cross site scripting
6723|
6724| MITRE CVE - https://cve.mitre.org:
6725| [CVE-2013-3812] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
6726| [CVE-2013-3811] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-3806.
6727| [CVE-2013-3810] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to XA Transactions.
6728| [CVE-2013-3809] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.
6729| [CVE-2013-3808] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
6730| [CVE-2013-3807] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Server Privileges.
6731| [CVE-2013-3806] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-3811.
6732| [CVE-2013-3805] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.
6733| [CVE-2013-3804] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6734| [CVE-2013-3802] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.
6735| [CVE-2013-3801] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
6736| [CVE-2013-3798] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect integrity and availability via unknown vectors related to MemCached.
6737| [CVE-2013-3796] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6738| [CVE-2013-3795] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
6739| [CVE-2013-3794] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
6740| [CVE-2013-3793] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
6741| [CVE-2013-3783] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Parser.
6742| [CVE-2013-3561] Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
6743| [CVE-2013-3221] The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks against Ruby on Rails applications via a crafted value, as demonstrated by unintended interaction between the "typed XML" feature and a MySQL database.
6744| [CVE-2013-2395] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language, a different vulnerability than CVE-2013-1567.
6745| [CVE-2013-2392] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6746| [CVE-2013-2391] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.
6747| [CVE-2013-2389] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
6748| [CVE-2013-2381] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server Privileges.
6749| [CVE-2013-2378] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.
6750| [CVE-2013-2376] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.
6751| [CVE-2013-2375] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
6752| [CVE-2013-1861] MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
6753| [CVE-2013-1570] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote attackers to affect availability via unknown vectors related to MemCached.
6754| [CVE-2013-1567] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language, a different vulnerability than CVE-2013-2395.
6755| [CVE-2013-1566] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
6756| [CVE-2013-1555] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, and 5.5.29 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
6757| [CVE-2013-1552] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
6758| [CVE-2013-1548] Unspecified vulnerability in Oracle MySQL 5.1.63 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Types.
6759| [CVE-2013-1544] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
6760| [CVE-2013-1532] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Information Schema.
6761| [CVE-2013-1531] Unspecified vulnerability in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Privileges.
6762| [CVE-2013-1526] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
6763| [CVE-2013-1523] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Optimizer.
6764| [CVE-2013-1521] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.
6765| [CVE-2013-1512] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
6766| [CVE-2013-1511] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
6767| [CVE-2013-1506] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.
6768| [CVE-2013-1502] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.9 and earlier allows local users to affect availability via unknown vectors related to Server Partition.
6769| [CVE-2013-1492] Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553.
6770| [CVE-2013-0389] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6771| [CVE-2013-0386] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.
6772| [CVE-2013-0385] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication.
6773| [CVE-2013-0384] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema.
6774| [CVE-2013-0383] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking.
6775| [CVE-2013-0375] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.1.28 and earlier, allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Server Replication.
6776| [CVE-2013-0371] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability, related to MyISAM.
6777| [CVE-2013-0368] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
6778| [CVE-2013-0367] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
6779| [CVE-2012-5615] MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
6780| [CVE-2012-5614] Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.
6781| [CVE-2012-5613] ** DISPUTED ** MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
6782| [CVE-2012-5612] Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.
6783| [CVE-2012-5611] Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
6784| [CVE-2012-5383] ** DISPUTED ** Untrusted search path vulnerability in the installation functionality in Oracle MySQL 5.5.28, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the "C:\MySQL\MySQL Server 5.5\bin" directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the unsafe PATH is established only by a separate administrative action that is not a default part of the MySQL installation.
6785| [CVE-2012-5096] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors.
6786| [CVE-2012-5060] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.65 and earlier and 5.5.27 and earlier allows remote authenticated users to affect availability, related to GIS Extension.
6787| [CVE-2012-4452] MySQL 5.0.88, and possibly other versions and platforms, allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of a CVE-2009-4030 regression, which was not omitted in other packages and versions such as MySQL 5.0.95 in Red Hat Enterprise Linux 6.
6788| [CVE-2012-4414] Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete.
6789| [CVE-2012-4255] MySQLDumper 1.24.4 allows remote attackers to obtain sensitive information via a direct request to learn/cubemail/refresh_dblist.php, which reveals the installation path in an error message.
6790| [CVE-2012-4254] MySQLDumper 1.24.4 allows remote attackers to obtain sensitive information (Notices) via a direct request to (1) learn/cubemail/restore.php or (2) learn/cubemail/dump.php.
6791| [CVE-2012-4253] Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php.
6792| [CVE-2012-4252] Multiple cross-site request forgery (CSRF) vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to hijack the authentication of administrators for requests that (1) remove file access restriction via a deletehtaccess action, (2) drop a database via a kill value in a db action, (3) uninstall the application via a 101 value in the phase parameter to learn/cubemail/install.php, (4) delete config.php via a 2 value in the phase parameter to learn/cubemail/install.php, (5) change a password via a schutz action, or (6) execute arbitrary SQL commands via the sql_statement parameter to learn/cubemail/sql.php.
6793| [CVE-2012-4251] Multiple cross-site scripting (XSS) vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter to index.php, (2) phase parameter to install.php, (3) tablename or (4) dbid parameter to sql.php, or (5) filename parameter to restore.php in learn/cubemail/.
6794| [CVE-2012-3951] The MySQL component in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) 9.0.1.19899 and earlier has a default password of admin for the (1) scrutinizer and (2) scrutremote accounts, which allows remote attackers to execute arbitrary SQL commands via a TCP session.
6795| [CVE-2012-3441] The database creation script (module/idoutils/db/scripts/create_mysqldb.sh) in Icinga 1.7.1 grants access to all databases to the icinga user, which allows icinga users to access other databases via unspecified vectors.
6796| [CVE-2012-3197] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
6797| [CVE-2012-3180] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6798| [CVE-2012-3177] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.
6799| [CVE-2012-3173] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB Plugin.
6800| [CVE-2012-3167] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Full Text Search.
6801| [CVE-2012-3166] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
6802| [CVE-2012-3163] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.
6803| [CVE-2012-3160] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation.
6804| [CVE-2012-3158] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.
6805| [CVE-2012-3156] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server.
6806| [CVE-2012-3150] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6807| [CVE-2012-3149] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote authenticated users to affect confidentiality, related to MySQL Client.
6808| [CVE-2012-3147] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote attackers to affect integrity and availability, related to MySQL Client.
6809| [CVE-2012-3144] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server.
6810| [CVE-2012-2750] Unspecified vulnerability in MySQL 5.5.x before 5.5.23 has unknown impact and attack vectors related to a "Security Fix", aka Bug #59533. NOTE: this might be a duplicate of CVE-2012-1689, but as of 20120816, Oracle has not commented on this possibility.
6811| [CVE-2012-2749] MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index.
6812| [CVE-2012-2122] sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.
6813| [CVE-2012-2102] MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT.
6814| [CVE-2012-1757] Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
6815| [CVE-2012-1756] Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors.
6816| [CVE-2012-1735] Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6817| [CVE-2012-1734] Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6818| [CVE-2012-1705] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6819| [CVE-2012-1703] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6820| [CVE-2012-1702] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors.
6821| [CVE-2012-1697] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.
6822| [CVE-2012-1696] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6823| [CVE-2012-1690] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6824| [CVE-2012-1689] Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6825| [CVE-2012-1688] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability, related to Server DML.
6826| [CVE-2012-0937] ** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not limit the number of MySQL queries sent to external MySQL database servers, which allows remote attackers to use WordPress as a proxy for brute-force attacks or denial of service attacks via the dbhost parameter, a different vulnerability than CVE-2011-4898. NOTE: the vendor disputes the significance of this issue because an incomplete WordPress installation might be present on the network for only a short time.
6827| [CVE-2012-0882] Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE.
6828| [CVE-2012-0583] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM.
6829| [CVE-2012-0578] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
6830| [CVE-2012-0574] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors.
6831| [CVE-2012-0572] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
6832| [CVE-2012-0553] Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492.
6833| [CVE-2012-0540] Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier and 5.5.23 and earlier allows remote authenticated users to affect availability, related to GIS Extension.
6834| [CVE-2012-0496] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
6835| [CVE-2012-0495] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, and CVE-2012-0493.
6836| [CVE-2012-0494] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows local users to affect availability via unknown vectors.
6837| [CVE-2012-0493] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, and CVE-2012-0495.
6838| [CVE-2012-0492] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485.
6839| [CVE-2012-0491] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0493, and CVE-2012-0495.
6840| [CVE-2012-0490] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors.
6841| [CVE-2012-0489] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
6842| [CVE-2012-0488] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
6843| [CVE-2012-0487] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
6844| [CVE-2012-0486] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
6845| [CVE-2012-0485] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492.
6846| [CVE-2012-0484] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors.
6847| [CVE-2012-0120] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492.
6848| [CVE-2012-0119] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
6849| [CVE-2012-0118] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113.
6850| [CVE-2012-0117] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
6851| [CVE-2012-0116] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
6852| [CVE-2012-0115] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
6853| [CVE-2012-0114] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors.
6854| [CVE-2012-0113] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118.
6855| [CVE-2012-0112] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
6856| [CVE-2012-0102] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101.
6857| [CVE-2012-0101] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102.
6858| [CVE-2012-0087] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102.
6859| [CVE-2012-0075] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.
6860| [CVE-2011-5049] MySQL 5.5.8, when running on Windows, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted packet to TCP port 3306.
6861| [CVE-2011-4959] SQL injection vulnerability in the addslashes method in SilverStripe 2.3.x before 2.3.12 and 2.4.x before 2.4.6, when connected to a MySQL database using far east character encodings, allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
6862| [CVE-2011-4899] ** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not ensure that the specified MySQL database service is appropriate, which allows remote attackers to configure an arbitrary database via the dbhost and dbname parameters, and subsequently conduct static code injection and cross-site scripting (XSS) attacks via (1) an HTTP request or (2) a MySQL query. NOTE: the vendor disputes the significance of this issue
6863| [CVE-2011-4898] ** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier generates different error messages for requests lacking a dbname parameter depending on whether the MySQL credentials are valid, which makes it easier for remote attackers to conduct brute-force attacks via a series of requests with different uname and pwd parameters. NOTE: the vendor disputes the significance of this issue
6864| [CVE-2011-3989] SQL injection vulnerability in DBD::mysqlPP 0.04 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
6865| [CVE-2011-3805] TaskFreak! multi-mysql-0.6 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by include/language/zh/register_info.php and certain other files.
6866| [CVE-2011-2688] SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and earlier for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the user field.
6867| [CVE-2011-2531] Prosody 0.8.x before 0.8.1, when MySQL is used, assigns an incorrect data type to the value column in certain tables, which might allow remote attackers to cause a denial of service (data truncation) by sending a large amount of data.
6868| [CVE-2011-2262] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors.
6869| [CVE-2011-1906] Trustwave WebDefend Enterprise before 5.0 7.01.903-1.4 stores specific user-account credentials in a MySQL database, which makes it easier for remote attackers to read the event collection table via requests to the management port, a different vulnerability than CVE-2011-0756.
6870| [CVE-2011-1513] Static code injection vulnerability in install_.php in e107 CMS 0.7.24 and probably earlier versions, when the installation script is not removed, allows remote attackers to inject arbitrary PHP code into e107_config.php via a crafted MySQL server name.
6871| [CVE-2011-0432] Multiple SQL injection vulnerabilities in the get_userinfo method in the MySQLAuthHandler class in DAVServer/mysqlauth.py in PyWebDAV before 0.9.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) user or (2) pw argument. NOTE: some of these details are obtained from third party information.
6872| [CVE-2010-5104] The escapeStrForLike method in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly escape input when the MySQL database is set to sql_mode NO_BACKSLASH_ESCAPES, which allows remote attackers to obtain sensitive information via wildcard characters in a LIKE query.
6873| [CVE-2010-4822] core/model/MySQLDatabase.php in SilverStripe 2.4.x before 2.4.4, when the site is running in "live mode," allows remote attackers to obtain the SQL queries for a page via the showqueries and ajax parameters.
6874| [CVE-2010-4700] The set_magic_quotes_runtime function in PHP 5.3.2 and 5.3.3, when the MySQLi extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for context-dependent attackers to conduct SQL injection attacks via crafted input that had been properly handled in earlier PHP versions.
6875| [CVE-2010-3840] The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points.
6876| [CVE-2010-3839] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.
6877| [CVE-2010-3838] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."
6878| [CVE-2010-3837] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
6879| [CVE-2010-3836] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.
6880| [CVE-2010-3835] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
6881| [CVE-2010-3834] Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."
6882| [CVE-2010-3833] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."
6883| [CVE-2010-3683] Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.
6884| [CVE-2010-3682] Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.
6885| [CVE-2010-3681] Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing "alternate reads from two indexes on a table," which triggers an assertion failure.
6886| [CVE-2010-3680] Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure.
6887| [CVE-2010-3679] Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind.
6888| [CVE-2010-3678] Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier.
6889| [CVE-2010-3677] Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.
6890| [CVE-2010-3676] storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement.
6891| [CVE-2010-3064] Stack-based buffer overflow in the php_mysqlnd_auth_write function in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) username or (2) database name argument to the (a) mysql_connect or (b) mysqli_connect function.
6892| [CVE-2010-3063] The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.
6893| [CVE-2010-3062] mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function
6894| [CVE-2010-3056] Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 2.11.x before 2.11.10.1 and 3.x before 3.3.5.1 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) db_search.php, (2) db_sql.php, (3) db_structure.php, (4) js/messages.php, (5) libraries/common.lib.php, (6) libraries/database_interface.lib.php, (7) libraries/dbi/mysql.dbi.lib.php, (8) libraries/dbi/mysqli.dbi.lib.php, (9) libraries/db_info.inc.php, (10) libraries/sanitizing.lib.php, (11) libraries/sqlparser.lib.php, (12) server_databases.php, (13) server_privileges.php, (14) setup/config.php, (15) sql.php, (16) tbl_replace.php, and (17) tbl_sql.php.
6895| [CVE-2010-2008] MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which causes MySQL to move certain directories to the server data directory.
6896| [CVE-2010-2003] Cross-site scripting (XSS) vulnerability in misc/get_admin.php in Advanced Poll 2.08 allows remote attackers to inject arbitrary web script or HTML via the mysql_host parameter.
6897| [CVE-2010-1865] Multiple SQL injection vulnerabilities in ClanSphere 2009.0.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the IP address to the cs_getip function in generate.php in the Captcha module, or (2) the s_email parameter to the cs_sql_select function in the MySQL database driver (mysql.php).
6898| [CVE-2010-1850] Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
6899| [CVE-2010-1849] The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.
6900| [CVE-2010-1848] Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
6901| [CVE-2010-1626] MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.
6902| [CVE-2010-1621] The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.
6903| [CVE-2010-1583] SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.
6904| [CVE-2010-0336] Unspecified vulnerability in the kiddog_mysqldumper (kiddog_mysqldumper) extension 0.0.3 and earlier for TYPO3 allows remote attackers to obtain sensitive information via unknown attack vectors.
6905| [CVE-2010-0124] Employee Timeclock Software 0.99 places the database password on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.
6906| [CVE-2009-5026] The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments.
6907| [CVE-2009-4833] MySQL Connector/NET before 6.0.4, when using encryption, does not verify SSL certificates during connection, which allows remote attackers to perform a man-in-the-middle attack with a spoofed SSL certificate.
6908| [CVE-2009-4484] Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.
6909| [CVE-2009-4030] MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
6910| [CVE-2009-4028] The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
6911| [CVE-2009-4019] mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
6912| [CVE-2009-3696] Cross-site scripting (XSS) vulnerability in phpMyAdmin 2.11.x before 2.11.9.6 and 3.x before 3.2.2.1 allows remote attackers to inject arbitrary web script or HTML via a crafted name for a MySQL table.
6913| [CVE-2009-3102] The doHotCopy subroutine in socket-server.pl in Zmanda Recovery Manager (ZRM) for MySQL 2.x before 2.1.1 allows remote attackers to execute arbitrary commands via vectors involving a crafted $MYSQL_BINPATH variable.
6914| [CVE-2009-2942] The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
6915| [CVE-2009-2446] Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request. NOTE: some of these details are obtained from third party information.
6916| [CVE-2009-1246] Multiple directory traversal vulnerabilities in Blogplus 1.0 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) row_mysql_blocks_center_down[file] parameter to includes/block_center_down.php
6917| [CVE-2009-1208] SQL injection vulnerability in auth2db 0.2.5, and possibly other versions before 0.2.7, uses the addslashes function instead of the mysql_real_escape_string function, which allows remote attackers to conduct SQL injection attacks using multibyte character encodings.
6918| [CVE-2009-0919] XAMPP installs multiple packages with insecure default passwords, which makes it easier for remote attackers to obtain access via (1) the "lampp" default password for the "nobody" account within the included ProFTPD installation, (2) a blank default password for the "root" account within the included MySQL installation, (3) a blank default password for the "pma" account within the phpMyAdmin installation, and possibly other unspecified passwords. NOTE: this was originally reported as a problem in DFLabs PTK, but this issue affects any product that is installed within the XAMPP environment, and should not be viewed as a vulnerability within that product. NOTE: DFLabs states that PTK is intended for use in a laboratory with "no contact from / to internet."
6919| [CVE-2009-0819] sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.
6920| [CVE-2009-0617] Cisco Application Networking Manager (ANM) before 2.0 uses a default MySQL root password, which makes it easier for remote attackers to execute arbitrary operating-system commands or change system files.
6921| [CVE-2009-0543] ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.
6922| [CVE-2008-7247] sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
6923| [CVE-2008-6992] GreenSQL Firewall (greensql-fw), possibly before 0.9.2 or 0.9.4, allows remote attackers to bypass the SQL injection protection mechanism via a WHERE clause containing an expression such as "x=y=z", which is successfully parsed by MySQL.
6924| [CVE-2008-6813] SQL injection vulnerability in index.php in phpWebNews 0.2 MySQL Edition allows remote attackers to execute arbitrary SQL commands via the id_kat parameter.
6925| [CVE-2008-6812] SQL injection vulnerability in bukutamu.php in phpWebNews 0.2 MySQL Edition allows remote attackers to execute arbitrary SQL commands via the det parameter.
6926| [CVE-2008-6655] Multiple cross-site scripting (XSS) vulnerabilities in GEDCOM_TO_MYSQL 2 allow remote attackers to inject arbitrary web script or HTML via the (1) nom_branche and (2) nom parameters to php/prenom.php
6927| [CVE-2008-6287] Multiple PHP remote file inclusion vulnerabilities in Broadcast Machine 0.1 allow remote attackers to execute arbitrary PHP code via a URL in the baseDir parameter to (1) MySQLController.php, (2) SQLController.php, (3) SetupController.php, (4) VideoController.php, and (5) ViewController.php in controllers/.
6928| [CVE-2008-6193] Sam Crew MyBlog stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information.
6929| [CVE-2008-5847] Constructr CMS 3.02.5 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information by reading the hash column.
6930| [CVE-2008-5738] Nodstrum MySQL Calendar 1.1 and 1.2 allows remote attackers to bypass authentication and gain administrative access by setting the nodstrumCalendarV2 cookie to 1. NOTE: some of these details are obtained from third party information.
6931| [CVE-2008-5737] SQL injection vulnerability in index.php in Nodstrum MySQL Calendar 1.1 and 1.2 allows remote attackers to execute arbitrary SQL commands via the username parameter.
6932| [CVE-2008-5069] SQL injection vulnerability in go.php in Panuwat PromoteWeb MySQL, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter.
6933| [CVE-2008-4456] Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document. NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67.
6934| [CVE-2008-4455] Directory traversal vulnerability in index.php in EKINdesigns MySQL Quick Admin 1.5.5 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to read and execute arbitrary files via a .. (dot dot) in the language cookie.
6935| [CVE-2008-4454] Directory traversal vulnerability in EKINdesigns MySQL Quick Admin 1.5.5 allows remote attackers to read and execute arbitrary files via a .. (dot dot) in the lang parameter to actions.php. NOTE: the provenance of this information is unknown
6936| [CVE-2008-4180] Unspecified vulnerability in db.php in NooMS 1.1 allows remote attackers to conduct brute force attacks against passwords via a username in the g_dbuser parameter and a password in the g_dbpwd parameter, and possibly a "localhost" g_dbhost parameter value, related to a "Mysql Remote Brute Force Vulnerability."
6937| [CVE-2008-4106] WordPress before 2.6.2 does not properly handle MySQL warnings about insertion of username strings that exceed the maximum column width of the user_login column, and does not properly handle space characters when comparing usernames, which allows remote attackers to change an arbitrary user's password to a random value by registering a similar username and then requesting a password reset, related to a "SQL column truncation vulnerability." NOTE: the attacker can discover the random password by also exploiting CVE-2008-4107.
6938| [CVE-2008-4098] MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
6939| [CVE-2008-4097] MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
6940| [CVE-2008-3963] MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.
6941| [CVE-2008-3846] Cross-site scripting (XSS) vulnerability in mysql-lists 1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
6942| [CVE-2008-3840] Crafty Syntax Live Help (CSLH) 2.14.6 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information.
6943| [CVE-2008-3820] Cisco Security Manager 3.1 and 3.2 before 3.2.2, when Cisco IPS Event Viewer (IEV) is used, exposes TCP ports used by the MySQL daemon and IEV server, which allows remote attackers to obtain "root access" to IEV via unspecified use of TCP sessions to these ports.
6944| [CVE-2008-3582] SQL injection vulnerability in login.php in Keld PHP-MySQL News Script 0.7.1 allows remote attackers to execute arbitrary SQL commands via the username parameter.
6945| [CVE-2008-3090] Multiple SQL injection vulnerabilities in index.php in BlognPlus (BURO GUN +) 2.5.5 MySQL and PostgreSQL editions allow remote attackers to execute arbitrary SQL commands via the (1) p, (2) e, (3) d, and (4) m parameters, a different vulnerability than CVE-2008-2819.
6946| [CVE-2008-2881] Relative Real Estate Systems 3.0 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information.
6947| [CVE-2008-2857] AlstraSoft AskMe Pro 2.1 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information.
6948| [CVE-2008-2819] SQL injection vulnerability in BlognPlus (BURO GUN +) 2.5.4 and earlier MySQL and PostgreSQL editions allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
6949| [CVE-2008-2667] SQL injection vulnerability in the Courier Authentication Library (aka courier-authlib) before 0.60.6 on SUSE openSUSE 10.3 and 11.0, and other platforms, when MySQL and a non-Latin character set are used, allows remote attackers to execute arbitrary SQL commands via the username and unspecified other vectors.
6950| [CVE-2008-2384] SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.
6951| [CVE-2008-2079] MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
6952| [CVE-2008-2029] Multiple SQL injection vulnerabilities in (1) setup_mysql.php and (2) setup_options.php in miniBB 2.2 and possibly earlier, when register_globals is enabled, allow remote attackers to execute arbitrary SQL commands via the xtr parameter in a userinfo action to index.php.
6953| [CVE-2008-1711] Terong PHP Photo Gallery (aka Advanced Web Photo Gallery) 1.0 stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information.
6954| [CVE-2008-1567] phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.
6955| [CVE-2008-1486] SQL injection vulnerability in Phorum before 5.2.6, when mysql_use_ft is disabled, allows remote attackers to execute arbitrary SQL commands via the non-fulltext search.
6956| [CVE-2008-0249] PHP Webquest 2.6 allows remote attackers to retrieve database credentials via a direct request to admin/backup_phpwebquest.php, which leaks the credentials in an error message if a call to /usr/bin/mysqldump fails. NOTE: this might only be an issue in limited environments.
6957| [CVE-2008-0227] yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allows remote attackers to cause a denial of service (crash) via a Hello packet containing a large size value, which triggers a buffer over-read in the HASHwithTransform::Update function in hash.cpp.
6958| [CVE-2008-0226] Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.
6959| [CVE-2007-6512] PHP MySQL Banner Exchange 2.2.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain database information via a direct request to inc/lib.inc.
6960| [CVE-2007-6418] The libdspam7-drv-mysql cron job in Debian GNU/Linux includes the MySQL dspam database password in a command line argument, which might allow local users to read the password by listing the process and its arguments.
6961| [CVE-2007-6345] SQL injection vulnerability in aurora framework before 20071208 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, possibly the value parameter to the pack_var function in module/db.lib/db_mysql.lib. NOTE: some of these details are obtained from third party information.
6962| [CVE-2007-6313] MySQL Server 5.1.x before 5.1.23 and 6.0.x before 6.0.4 does not check the rights of the entity executing BINLOG, which allows remote authorized users to execute arbitrary BINLOG statements.
6963| [CVE-2007-6304] The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
6964| [CVE-2007-6303] MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
6965| [CVE-2007-6081] AdventNet EventLog Analyzer build 4030 for Windows, and possibly other versions and platforms, installs a mysql instance with a default "root" account without a password, which allows remote attackers to gain privileges and modify logs.
6966| [CVE-2007-5970] MySQL 5.1.x before 5.1.23 and 6.0.x before 6.0.4 allows remote authenticated users to gain privileges on arbitrary tables via unspecified vectors involving use of table-level DATA DIRECTORY and INDEX DIRECTORY options when creating a partitioned table with the same name as a table on which the user lacks privileges.
6967| [CVE-2007-5969] MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
6968| [CVE-2007-5925] The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
6969| [CVE-2007-5646] SQL injection vulnerability in Sources/Search.php in Simple Machines Forum (SMF) 1.1.3, when MySQL 5 is used, allows remote attackers to execute arbitrary SQL commands via the userspec parameter in a search2 action to index.php.
6970| [CVE-2007-5626] make_catalog_backup in Bacula 2.2.5, and probably earlier, sends a MySQL password as a command line argument, and sometimes transmits cleartext e-mail containing this command line, which allows context-dependent attackers to obtain the password by listing the process and its arguments, or by sniffing the network.
6971| [CVE-2007-5488] Multiple SQL injection vulnerabilities in cdr_addon_mysql in Asterisk-Addons before 1.2.8, and 1.4.x before 1.4.4, allow remote attackers to execute arbitrary SQL commands via the (1) source and (2) destination numbers, and probably (3) SIP URI, when inserting a record.
6972| [CVE-2007-4889] The MySQL extension in PHP 5.2.4 and earlier allows remote attackers to bypass safe_mode and open_basedir restrictions via the MySQL (1) LOAD_FILE, (2) INTO DUMPFILE, and (3) INTO OUTFILE functions, a different issue than CVE-2007-3997.
6973| [CVE-2007-3997] The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to bypass safe_mode and open_basedir restrictions via MySQL LOCAL INFILE operations, as demonstrated by a query with LOAD DATA LOCAL INFILE.
6974| [CVE-2007-3782] MySQL Community Server before 5.0.45 allows remote authenticated users to gain update privileges for a table in another database via a view that refers to this external table.
6975| [CVE-2007-3781] MySQL Community Server before 5.0.45 does not require privileges such as SELECT for the source table in a CREATE TABLE LIKE statement, which allows remote authenticated users to obtain sensitive information such as the table structure.
6976| [CVE-2007-3780] MySQL Community Server before 5.0.45 allows remote attackers to cause a denial of service (daemon crash) via a malformed password packet in the connection protocol.
6977| [CVE-2007-3567] MySQLDumper 1.21b through 1.23 REV227 uses a "Limit GET" statement in the .htaccess authentication mechanism, which allows remote attackers to bypass authentication requirements via HTTP POST requests.
6978| [CVE-2007-2857] PHP remote file inclusion vulnerability in sample/xls2mysql in ABC Excel Parser Pro 4.0 allows remote attackers to execute arbitrary PHP code via a URL in the parser_path parameter.
6979| [CVE-2007-2766] lib/backup-methods.sh in Backup Manager before 0.7.6 provides the MySQL password as a plaintext command line argument, which allows local users to obtain this password by listing the process and its arguments, related to lib/backup-methods.sh.
6980| [CVE-2007-2693] MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement.
6981| [CVE-2007-2692] The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.
6982| [CVE-2007-2691] MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
6983| [CVE-2007-2583] The in_decimal::set function in item_cmpfunc.cc in MySQL before 5.0.40, and 5.1 before 5.1.18-beta, allows context-dependent attackers to cause a denial of service (crash) via a crafted IF clause that results in a divide-by-zero error and a NULL pointer dereference.
6984| [CVE-2007-2554] Associated Press (AP) Newspower 4.0.1 and earlier uses a default blank password for the MySQL root account, which allows remote attackers to insert or modify news articles via shows.tblscript.
6985| [CVE-2007-2429] ManageEngine PasswordManager Pro (PMP) allows remote attackers to obtain administrative access to a database by injecting a certain command line for the mysql program, as demonstrated by the "-port 2345" and "-u root" arguments. NOTE: the provenance of this information is unknown
6986| [CVE-2007-2364] Multiple PHP remote file inclusion vulnerabilities in burnCMS 0.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) mysql.class.php or (2) postgres.class.php in lib/db/
6987| [CVE-2007-2204] Multiple PHP remote file inclusion vulnerabilities in GPL PHP Board (GPB) unstable-2001.11.14-1 allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) db.mysql.inc.php or (2) gpb.inc.php in include/, or the (3) theme parameter to themes/ubb/login.php.
6988| [CVE-2007-2016] Cross-site scripting (XSS) vulnerability in mysql/phpinfo.php in phpMyAdmin 2.6.1 allows remote attackers to inject arbitrary web script or HTML via the lang[] parameter.
6989| [CVE-2007-1779] Multiple SQL injection vulnerabilities in the MySQL back-end in Advanced Website Creator (AWC) before 1.9.0 might allow remote attackers to execute arbitrary SQL commands via unspecified parameters, related to use of mysql_escape_string instead of mysql_real_escape_string.
6990| [CVE-2007-1778] PHP remote file inclusion vulnerability in db/mysql.php in the Eve-Nuke 0.1 (EN-Forums) module for PHP-Nuke allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
6991| [CVE-2007-1548] SQL injection vulnerability in functions/functions_filters.asp in Web Wiz Forums before 8.05a (MySQL version) does not properly filter certain characters in SQL commands, which allows remote attackers to execute arbitrary SQL commands via \"' (backslash double-quote quote) sequences, which are collapsed into \'', as demonstrated via the name parameter to forum/pop_up_member_search.asp.
6992| [CVE-2007-1455] Multiple absolute path traversal vulnerabilities in Fantastico, as used with cPanel 10.x, allow remote authenticated users to include and execute arbitrary local files via (1) the userlanguage parameter to includes/load_language.php or (2) the fantasticopath parameter to includes/mysqlconfig.php and certain other files.
6993| [CVE-2007-1439] PHP remote file inclusion vulnerability in ressourcen/dbopen.php in bitesser MySQL Commander 2.7 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the home parameter.
6994| [CVE-2007-1420] MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function.
6995| [CVE-2007-1167] inc/filebrowser/browser.php in deV!L`z Clanportal (DZCP) 1.4.5 and earlier allows remote attackers to obtain MySQL data via the inc/mysql.php value of the file parameter.
6996| [CVE-2007-1111] Multiple cross-site scripting (XSS) vulnerabilities in ActiveCalendar 1.2.0 allow remote attackers to inject arbitrary web script or HTML via the css parameter to (1) flatevents.php, (2) js.php, (3) mysqlevents.php, (4) m_2.php, (5) m_3.php, (6) m_4.php, (7) xmlevents.php, (8) y_2.php, or (9) y_3.php in data/.
6997| [CVE-2007-0926] The dologin function in guestbook.php in KvGuestbook 1.0 Beta allows remote attackers to gain administrative privileges, probably via modified $mysql['pass'] and $gbpass variables.
6998| [CVE-2007-0890] Cross-site scripting (XSS) vulnerability in scripts/passwdmysql in cPanel WebHost Manager (WHM) 11.0.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the password parameter.
6999| [CVE-2007-0828] PHP remote file inclusion vulnerability in affichearticles.php3 in MySQLNewsEngine allows remote attackers to execute arbitrary PHP code via a URL in the newsenginedir parameter.
7000| [CVE-2007-0167] Multiple PHP file inclusion vulnerabilities in WGS-PPC (aka PPC Search Engine), as distributed with other aliases, allow remote attackers to execute arbitrary PHP code via a URL in the INC parameter in (1) config_admin.php, (2) config_main.php, (3) config_member.php, and (4) mysql_config.php in config/
7001| [CVE-2007-0124] Unspecified vulnerability in Drupal before 4.6.11, and 4.7 before 4.7.5, when MySQL is used, allows remote authenticated users to cause a denial of service by poisoning the page cache via unspecified vectors, which triggers erroneous 404 HTTP errors for pages that exist.
7002| [CVE-2006-7232] sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.
7003| [CVE-2006-7194] PHP remote file inclusion vulnerability in modules/Mysqlfinder/MysqlfinderAdmin.php in Agora 1.4 RC1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the _SESSION[PATH_COMPOSANT] parameter.
7004| [CVE-2006-6948] MyODBC Japanese conversion edition 3.51.06, 2.50.29, and 2.50.25 allows remote attackers to cause a denial of service via a certain string in a response, which has unspecified impact on the MySQL database.
7005| [CVE-2006-6457] tiki-wiki_rss.php in Tikiwiki 1.9.5, 1.9.2, and possibly other versions allows remote attackers to obtain sensitive information (MySQL username and password) via an invalid (large or negative) ver parameter, which leaks the information in an error message.
7006| [CVE-2006-6378] BTSaveMySql 1.2 stores sensitive data under the web root with insufficient access control, which allows remote attackers to obtain configuration and save files via direct requests.
7007| [CVE-2006-6254] administration/telecharger.php in Cahier de texte 2.0 allows remote attackers to obtain unparsed content (source code) of files via the chemin parameter, as demonstrated using directory traversal sequences to obtain the MySQL username and password from conn_cahier_de_texte.php. NOTE: it is not clear whether the scope of this issue extends above the web document root, and whether directory traversal is the primary vulnerability.
7008| [CVE-2006-5893] Multiple PHP remote file inclusion vulnerabilities in iWonder Designs Storystream 0.4.0.0 allow remote attackers to execute arbitrary PHP code via a URL in the baseDir parameter to (1) mysql.php and (2) mysqli.php in include/classes/pear/DB/.
7009| [CVE-2006-5702] Tikiwiki 1.9.5 allows remote attackers to obtain sensitive information (MySQL username and password) via an empty sort_mode parameter in (1) tiki-listpages.php, (2) tiki-lastchanges.php, (3) messu-archive.php, (4) messu-mailbox.php, (5) messu-sent.php, (6) tiki-directory_add_site.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-forums.php, (10) tiki-view_forum.php, (11) tiki-friends.php, (12) tiki-list_blogs.php, (13) tiki-list_faqs.php, (14) tiki-list_trackers.php, (15) tiki-list_users.php, (16) tiki-my_tiki.php, (17) tiki-notepad_list.php, (18) tiki-orphan_pages.php, (19) tiki-shoutbox.php, (20) tiki-usermenu.php, and (21) tiki-webmail_contacts.php, which reveal the information in certain database error messages.
7010| [CVE-2006-5675] Multiple unspecified vulnerabilities in Pentaho Business Intelligence (BI) Suite before 1.2 RC3 (1.2.0.470-RC3) have unknown impact and attack vectors, related to "MySQL Scripts need changes for security," possibly SQL injection vulnerabilities associated with these scripts.
7011| [CVE-2006-5381] Contenido CMS stores sensitive data under the web root with insufficient access control, which allows remote attackers to obtain database credentials and other information via a direct request to (1) db_msql.inc, (2) db_mssql.inc, (3) db_mysqli.inc, (4) db_oci8.inc, (5) db_odbc.inc, (6) db_oracle.inc, (7) db_pgsql.inc, or (8) db_sybase.inc in the conlib/ directory.
7012| [CVE-2006-5264] Cross-site scripting (XSS) vulnerability in sql.php in MysqlDumper 1.21 b6 allows remote attackers to inject arbitrary web script or HTML via the db parameter.
7013| [CVE-2006-5127] Multiple cross-site scripting (XSS) vulnerabilities in Bartels Schoene ConPresso before 4.0.5a allow remote attackers to inject arbitrary web script or HTML via (1) the nr parameter in detail.php, (2) the msg parameter in db_mysql.inc.php, and (3) the pos parameter in index.php.
7014| [CVE-2006-5079] PHP remote file inclusion vulnerability in class.mysql.php in Matt Humphrey paBugs 2.0 Beta 3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the path_to_bt_dir parameter.
7015| [CVE-2006-5065] PHP remote file inclusion vulnerability in libs/dbmax/mysql.php in ZoomStats 1.0.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[lib][db][path] parameter.
7016| [CVE-2006-5029] SQL injection vulnerability in thread.php in WoltLab Burning Board (wBB) 2.3.x allows remote attackers to obtain the version numbers of PHP, MySQL, and wBB via the page parameter. NOTE: this issue might be a forced SQL error. Also, the original report was disputed by a third party for 2.3.3 and 2.3.4.
7017| [CVE-2006-5027] Jeroen Vennegoor JevonCMS, possibly pre alpha, allows remote attackers to obtain sensitive information via a direct request for php/main/phplib files (1) db_msql.inc, (2) db_mssql.inc, (3) db_mysql.inc, (4) db_oci8.inc, (5) db_odbc.inc, (6) db_oracle.inc, and (7) db_pgsql.inc
7018| [CVE-2006-5014] Unspecified vulnerability in cPanel before 10.9.0 12 Tree allows remote authenticated users to gain privileges via unspecified vectors in (1) mysqladmin and (2) hooksadmin.
7019| [CVE-2006-4994] Multiple unquoted Windows search path vulnerabilities in Apache Friends XAMPP 1.5.2 might allow local users to gain privileges via a malicious program file in %SYSTEMDRIVE%, which is run when XAMPP attempts to execute (1) FileZillaServer.exe, (2) mysqld-nt.exe, (3) Perl.exe, or (4) xamppcontrol.exe with an unquoted "Program Files" pathname.
7020| [CVE-2006-4835] Bluview Blue Magic Board (BMB) (aka BMForum) 5.5 allows remote attackers to obtain sensitive information via a direct request to (1) footer.php, (2) header.php, (3) db_mysql_error.php, (4) langlist.php, (5) sendmail.php, or (6) style.php, which reveals the path in various error messages.
7021| [CVE-2006-4578] export.php in The Address Book 1.04e writes username and password hash information into a publicly accessible file when dumping the MySQL database contents, which allows remote attackers to obtain sensitive information.
7022| [CVE-2006-4380] MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects.
7023| [CVE-2006-4277] Multiple PHP remote file inclusion vulnerabilities in Tutti Nova 1.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the TNLIB_DIR parameter to (1) include/novalib/class.novaAdmin.mysql.php and (2) novalib/class.novaRead.mysql.php. NOTE: the provenance of this information is unknown
7024| [CVE-2006-4276] PHP remote file inclusion vulnerability in Tutti Nova 1.6 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the TNLIB_DIR parameter to novalib/class.novaEdit.mysql.php.
7025| [CVE-2006-4227] MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.
7026| [CVE-2006-4226] MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
7027| [CVE-2006-4031] MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
7028| [CVE-2006-3965] Banex PHP MySQL Banner Exchange 2.21 stores lib.inc under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as database usernames and passwords.
7029| [CVE-2006-3964] PHP remote file inclusion vulnerability in members.php in Banex PHP MySQL Banner Exchange 2.21 allows remote attackers to execute arbitrary PHP code via a URL in the cfg_root parameter.
7030| [CVE-2006-3963] Multiple SQL injection vulnerabilities in Banex PHP MySQL Banner Exchange 2.21 allow remote attackers to execute arbitrary SQL commands via the (1) site_name parameter to (a) signup.php, and the (2) id, (3) deleteuserbanner, (4) viewmem, (5) viewmemunb, (6) viewunmem,or (7) deleteuser parameters to (b) admin.php.
7031| [CVE-2006-3878] Opsware Network Automation System (NAS) 6.0 installs /etc/init.d/mysql with insecure permissions, which allows local users to read the root password for the MySQL MAX database or gain privileges by modifying /etc/init.d/mysql.
7032| [CVE-2006-3486] ** DISPUTED ** Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability.
7033| [CVE-2006-3469] Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message.
7034| [CVE-2006-3330] Cross-site scripting (XSS) vulnerability in AddAsset1.php in PHP/MySQL Classifieds (PHP Classifieds) allows remote attackers to execute arbitrary SQL commands via the (1) ProductName ("Title" field), (2) url, and (3) Description parameters, possibly related to issues in add1.php.
7035| [CVE-2006-3329] SQL injection vulnerability in search.php in PHP/MySQL Classifieds (PHP Classifieds) allows remote attackers to execute arbitrary SQL commands via the rate parameter.
7036| [CVE-2006-3081] mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.
7037| [CVE-2006-2753] SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input.
7038| [CVE-2006-2750] Cross-site scripting (XSS) vulnerability in the do_mysql_query function in core.php for Open Searchable Image Catalogue (OSIC) before 0.7.0.1 allows remote attackers to inject arbitrary web scripts or HTML via failed SQL queries, which is reflected in an error message.
7039| [CVE-2006-2748] SQL injection vulnerability in the do_mysql_query function in core.php for Open Searchable Image Catalogue (OSIC) before 0.7.0.1 allows remote attackers to inject arbitrary SQL commands via multiple vectors, as demonstrated by the (1) type parameter in adminfunctions.php and the (2) catalogue_id parameter in editcatalogue.php.
7040| [CVE-2006-2742] SQL injection vulnerability in Drupal 4.6.x before 4.6.7 and 4.7.0 allows remote attackers to execute arbitrary SQL commands via the (1) count and (2) from variables to (a) database.mysql.inc, (b) database.pgsql.inc, and (c) database.mysqli.inc.
7041| [CVE-2006-2543] Xtreme Topsites 1.1 allows remote attackers to trigger MySQL errors and possibly conduct SQL injection attacks via unspecified vectors in join.php.
7042| [CVE-2006-2329] AngelineCMS 0.6.5 and earlier allow remote attackers to obtain sensitive information via a direct request for (1) adodb-access.inc.php, (2) adodb-ado.inc.php, (3) adodb-ado_access.inc, (4) adodb-ado_mssql.inc.php, (5) adodb-borland_ibase, (6) adodb-csv.inc.php, (7) adodb-db2.inc.php, (8) adodb-fbsql.inc.php, (9) adodb-firebird.inc.php, (10) adodb-ibase.inc.php, (11) adodb-informix.inc.php, (12) adodb-informix72.inc, (13) adodb-mssql.inc.php, (14) adodb-mssqlpo.inc.php, (15) adodb-mysql.inc.php, (16) adodb-mysqlt.inc.php, (17) adodb-oci8.inc.php, (18) adodb-oci805.inc.php, (19) adodb-oci8po.inc.php, and (20) adodb-odbc.inc.php, which reveal the path in various error messages
7043| [CVE-2006-2042] Adobe Dreamweaver 8 before 8.0.2 and MX 2004 can generate code that allows SQL injection attacks in the (1) ColdFusion, (2) PHP mySQL, (3) ASP, (4) ASP.NET, and (5) JSP server models.
7044| [CVE-2006-1930] ** DISPUTED ** Multiple SQL injection vulnerabilities in userscript.php in Green Minute 1.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) huserid, (2) pituus, or (3) date parameters. NOTE: this issue has been disputed by the vendor, saying "those parameters mentioned ARE checked (preg_match) before they are used in SQL-query... If someone decided to add SQL-injection stuff to certain parameter, they would see an error text, but only because _nothing_ was passed inside that parameter (to MySQL-database)." As allowed by the vendor, CVE investigated this report on 20060525 and found that the demo site demonstrated a non-sensitive SQL error when given standard SQL injection manipulations.
7045| [CVE-2006-1518] Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
7046| [CVE-2006-1517] sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
7047| [CVE-2006-1516] The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
7048| [CVE-2006-1451] MySQL Manager in Apple Mac OS X 10.3.9 and 10.4.6, when setting up a new MySQL database server, does not use the "New MySQL root password" that is provided, which causes the MySQL root password to be blank and allows local users to gain full privileges to that database.
7049| [CVE-2006-1396] Multiple cross-site scripting (XSS) vulnerabilities in Cholod MySQL Based Message Board allow remote attackers to inject arbitrary web script or HTML via unknown vectors. NOTE: the provenance of this information is unknown
7050| [CVE-2006-1395] SQL injection vulnerability in mb.cgi in Cholod MySQL Based Message Board allows remote attackers to execute arbitrary SQL commands via unspecified vectors in a showmessage action, possibly the username parameter. NOTE: the provenance of this information is unknown
7051| [CVE-2006-1324] Cross-site scripting (XSS) vulnerability in acp/lib/class_db_mysql.php in Woltlab Burning Board (wBB) 2.3.4 allows remote attackers to inject arbitrary web script or HTML via the errormsg parameter when a SQL error is generated.
7052| [CVE-2006-1211] IBM Tivoli Micromuse Netcool/NeuSecure 3.0.236 configures a MySQL database to allow connections from any source IP address with the ns database account, which allows remote attackers to bypass the Netcool/NeuSecure application layer and perform unauthorized database actions. NOTE: IBM has privately confirmed to CVE that a fix is available for these issues.
7053| [CVE-2006-1210] The web interface for IBM Tivoli Micromuse Netcool/NeuSecure 3.0.236 includes the MySQL database username and password in cleartext in body.phtml, which allows remote attackers to gain privileges by reading the source. NOTE: IBM has privately confirmed to CVE that a fix is available for these issues.
7054| [CVE-2006-1112] Aztek Forum 4.0 allows remote attackers to obtain sensitive information via a long login value in a register form, which displays the installation path in a MySQL error message.
7055| [CVE-2006-1111] Aztek Forum 4.0 allows remote attackers to obtain sensitive information via a "*/*" in the msg parameter to index.php, which reveals usernames and passwords in a MySQL error message, possibly due to a forced SQL error or SQL injection.
7056| [CVE-2006-0909] Invision Power Board (IPB) 2.1.4 and earlier allows remote attackers to view sensitive information via a direct request to multiple PHP scripts that include the full path in error messages, including (1) PEAR/Text/Diff/Renderer/inline.php, (2) PEAR/Text/Diff/Renderer/unified.php, (3) PEAR/Text/Diff3.php, (4) class_db.php, (5) class_db_mysql.php, and (6) class_xml.php in the ips_kernel/ directory
7057| [CVE-2006-0903] MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
7058| [CVE-2006-0692] Multiple SQL injection vulnerabilities in Carey Briggs PHP/MYSQL Timesheet 1 and 2 allow remote attackers to execute arbitrary SQL commands via the (1) yr, (2) month, (3) day, and (4) job parameters in (a) index.php and (b) changehrs.php.
7059| [CVE-2006-0369] ** DISPUTED ** MySQL 5.0.18 allows local users with access to a VIEW to obtain sensitive information via the "SELECT * FROM information_schema.views
7060| [CVE-2006-0200] Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in MySQL error messages.
7061| [CVE-2006-0146] The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.
7062| [CVE-2006-0097] Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function.
7063| [CVE-2006-0056] Double free vulnerability in the authentication and authentication token alteration code in PAM-MySQL 0.6.x before 0.6.2 and 0.7.x before 0.7pre3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted passwords, which lead to a double free of a pointer that was created by the pam_get_item function. NOTE: this issue only occurs in certain configurations in which there are multiple PAM modules, PAM-MySQL is not evaluated first, and there are no requisite modules before PAM-MySQL.
7064| [CVE-2005-4713] Unspecified vulnerability in the SQL logging facility in PAM-MySQL 0.6.x before 0.6.2 and 0.7.x before 0.7pre3 allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors, probably involving the pam_mysql_sql_log function when being used in vsftpd, which does not include the IP address argument to an sprintf call.
7065| [CVE-2005-4661] The notifyendsubs cron job in Campsite before 2.3.3 sends an e-mail message containing a certain unencrypted MySQL password, which allows remote attackers to sniff the password.
7066| [CVE-2005-4626] The default configuration of Recruitment Software installs admin/site.xml under the web document root with insufficient access control, which might allow remote attackers to obtain sensitive information (MySQL database credentials) via a direct request.
7067| [CVE-2005-4237] Cross-site scripting (XSS) vulnerability in MySQL Auction 3.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified search module parameters, possibly the keyword parameter in the SearchZoom module.
7068| [CVE-2005-2865] Multiple PHP remote file inclusion vulnerabilities in aMember Pro 2.3.4 allow remote attackers to execute arbitrary PHP code via the config[root_dir] parameter to (1) mysql.inc.php, (2) efsnet.inc.php, (3) theinternetcommerce.inc.php, (4) cdg.inc.php, (5) compuworld.inc.php, (6) directone.inc.php, (7) authorize_aim.inc.php, (8) beanstream.inc.php, (9) config.inc.php, (10) eprocessingnetwork.inc.php, (11) eway.inc.php, (12) linkpoint.inc.php, (13) logiccommerce.inc.php, (14) netbilling.inc.php, (15) payflow_pro.inc.php, (16) paymentsgateway.inc.php, (17) payos.inc.php, (18) payready.inc.php, or (19) plugnplay.inc.php.
7069| [CVE-2005-2573] The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\) character.
7070| [CVE-2005-2572] MySQL, when running on Windows, allows remote authenticated users with insert privileges on the mysql.func table to cause a denial of service (server hang) and possibly execute arbitrary code via (1) a request for a non-library file, which causes the Windows LoadLibraryEx function to block, or (2) a request for a function in a library that has the XXX_deinit or XXX_init functions defined but is not tailored for mySQL, such as jpeg1x32.dll and jpeg2x32.dll.
7071| [CVE-2005-2571] FunkBoard 0.66CF, and possibly earlier versions, does not properly restrict access to the (1) admin/mysql_install.php and (2) admin/pg_install.php scripts, which allows attackers to obtain the database username and password or inject arbitrary PHP code into info.php.
7072| [CVE-2005-2558] Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field.
7073| [CVE-2005-2468] Multiple SQL injection vulnerabilities in MySQL Eventum 1.5.5 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) isCorrectPassword or (2) userExist function in class.auth.php, getCustomFieldReport function in (4) custom_fields.php, (5) custom_fields_graph.php, or (6) class.report.php, or the insert function in (7) releases.php or (8) class.release.php.
7074| [CVE-2005-2467] Multiple cross-site scripting (XSS) vulnerabilities in MySQL Eventum 1.5.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to view.php, (2) release parameter to list.php, or (3) F parameter to get_jsrs_data.php.
7075| [CVE-2005-2174] Bugzilla 2.17.x, 2.18 before 2.18.2, 2.19.x, and 2.20 before 2.20rc1 inserts a bug into the database before it is marked private, which introduces a race condition and allows attackers to access information about the bug via buglist.cgi before MySQL replication is complete.
7076| [CVE-2005-1944] xmysqladmin 1.0 and earlier allows local users to delete arbitrary files via a symlink attack on a database backup file in /tmp.
7077| [CVE-2005-1636] mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file's contents.
7078| [CVE-2005-1274] Stack-based buffer overflow in the getIfHeader function in the WebDAV functionality in MySQL MaxDB before 7.5.00.26 allows remote attackers to execute arbitrary code via an HTTP unlock request and a long "If" parameter.
7079| [CVE-2005-1121] Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL.
7080| [CVE-2005-0799] MySQL 4.1.9, and possibly earlier versions, allows remote attackers with certain privileges to cause a denial of service (application crash) via a use command followed by an MS-DOS device name such as (1) LPT1 or (2) PRN.
7081| [CVE-2005-0711] MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.
7082| [CVE-2005-0710] MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function.
7083| [CVE-2005-0709] MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit.
7084| [CVE-2005-0684] Multiple buffer overflows in the web tool for MySQL MaxDB before 7.5.00.26 allows remote attackers to execute arbitrary code via (1) an HTTP GET request with a long file parameter after a percent ("%") sign or (2) a long Lock-Token string to the WebDAV functionality, which is not properly handled by the getLockTokenHeader function in WDVHandler_CommonUtils.c.
7085| [CVE-2005-0646] SQL injection vulnerability in auth.php in paNews 2.0.4b allows remote attackers to execute arbitrary SQL via the mysql_prefix parameter.
7086| [CVE-2005-0544] phpMyAdmin 2.6.1 allows remote attackers to obtain the full path of the server via direct requests to (1) sqlvalidator.lib.php, (2) sqlparser.lib.php, (3) select_theme.lib.php, (4) select_lang.lib.php, (5) relation_cleanup.lib.php, (6) header_meta_style.inc.php, (7) get_foreign.lib.php, (8) display_tbl_links.lib.php, (9) display_export.lib.php, (10) db_table_exists.lib.php, (11) charset_conversion.lib.php, (12) ufpdf.php, (13) mysqli.dbi.lib.php, (14) setup.php, or (15) cookie.auth.lib.php, which reveals the path in a PHP error message.
7087| [CVE-2005-0111] Stack-based buffer overflow in the websql CGI program in MySQL MaxDB 7.5.00 allows remote attackers to execute arbitrary code via a long password parameter.
7088| [CVE-2005-0083] MySQL MaxDB 7.5.00 for Windows, and possibly earlier versions and other platforms, allows remote attackers to cause a denial of service (application crash) via invalid parameters to the (1) DBMCli_String::ReallocString, (2) DBMCli_String::operator, (3) DBMCli_Buffer::ForceResize, (4) DBMCli_Wizard::InstallDatabase, (5) DBMCli_Devspaces::Complete, (6) DBMWeb_TemplateWizard::askForWriteCountStep5, or (7) DBMWeb_DBMWeb::wizardDB functions, which triggers a null dereference.
7089| [CVE-2005-0082] The sapdbwa_GetUserData function in MySQL MaxDB 7.5.0.0, and other versions before 7.5.0.21, allows remote attackers to cause a denial of service (crash) via invalid parameters to the WebDAV handler code, which triggers a null dereference that causes the SAP DB Web Agent to crash.
7090| [CVE-2005-0081] MySQL MaxDB 7.5.0.0, and other versions before 7.5.0.21, allows remote attackers to cause a denial of service (crash) via an HTTP request with invalid headers.
7091| [CVE-2005-0004] The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files.
7092| [CVE-2004-2632] phpMyAdmin 2.5.1 up to 2.5.7 allows remote attackers to modify configuration settings and gain unauthorized access to MySQL servers via modified $cfg['Servers'] variables.
7093| [CVE-2004-2398] Netenberg Fantastico De Luxe 2.8 uses database file names that contain the associated usernames, which allows local users to determine valid usernames and conduct brute force attacks by reading the file names from /var/lib/mysql, which is assigned world-readable permissions by cPanel 9.3.0 R5.
7094| [CVE-2004-2357] The embedded MySQL 4.0 server for Proofpoint Protection Server does not require a password for the root user of MySQL, which allows remote attackers to read or modify the backend database.
7095| [CVE-2004-2354] SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered.
7096| [CVE-2004-2149] Buffer overflow in the prepared statements API in libmysqlclient for MySQL 4.1.3 beta and 4.1.4 allows remote attackers to cause a denial of service via a large number of placeholders.
7097| [CVE-2004-2138] Cross-site scripting (XSS) vulnerability in AWSguest.php in AllWebScripts MySQLGuest allows remote attackers to inject arbitrary HTML and PHP code via the (1) Name, (2) Email, (3) Homepage or (4) Comments field.
7098| [CVE-2004-1228] The install scripts in SugarCRM Sugar Sales 2.0.1c and earlier are not removed after installation, which allows attackers to obtain the MySQL administrative password in cleartext from an installation form, or to cause a denial of service by changing database settings to the default.
7099| [CVE-2004-0957] Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
7100| [CVE-2004-0956] MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.
7101| [CVE-2004-0931] MySQL MaxDB before 7.5.00.18 allows remote attackers to cause a denial of service (crash) via an HTTP request to webdbm with high ASCII values in the Server field, which triggers an assert error in the IsAscii7 function.
7102| [CVE-2004-0837] MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
7103| [CVE-2004-0836] Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).
7104| [CVE-2004-0835] MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.
7105| [CVE-2004-0628] Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string.
7106| [CVE-2004-0627] The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.
7107| [CVE-2004-0457] The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
7108| [CVE-2004-0388] The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack.
7109| [CVE-2004-0381] mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.
7110| [CVE-2003-1480] MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods.
7111| [CVE-2003-1421] Unspecified vulnerability in mod_mysql_logger shared object in SuckBot 0.006 allows remote attackers to cause a denial of service (seg fault) via unknown attack vectors.
7112| [CVE-2003-1383] WEB-ERP 0.1.4 and earlier allows remote attackers to obtain sensitive information via an HTTP request for the logicworks.ini file, which contains the MySQL database username and password.
7113| [CVE-2003-1331] Stack-based buffer overflow in the mysql_real_connect function in the MySql client library (libmysqlclient) 4.0.13 and earlier allows local users to execute arbitrary code via a long socket name, a different vulnerability than CVE-2001-1453.
7114| [CVE-2003-0780] Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field.
7115| [CVE-2003-0515] SQL injection vulnerabilities in the (1) PostgreSQL or (2) MySQL authentication modules for teapop 0.3.5 and earlier allow attackers to execute arbitrary SQL and possibly gain privileges.
7116| [CVE-2003-0150] MySQL 3.23.55 and earlier creates world-writeable files and allows mysql users to gain root privileges by using the "SELECT * INFO OUTFILE" operator to overwrite a configuration file and cause mysql to run as root upon restart, as demonstrated by modifying my.cnf.
7117| [CVE-2003-0073] Double-free vulnerability in mysqld for MySQL before 3.23.55 allows attackers with MySQL access to cause a denial of service (crash) via mysql_change_user.
7118| [CVE-2002-2043] SQL injection vulnerability in the LDAP and MySQL authentication patch for Cyrus SASL 1.5.24 and 1.5.27 allows remote attackers to execute arbitrary SQL commands and log in as arbitrary POP mail users via the password.
7119| [CVE-2002-1952] phpRank 1.8 does not properly check the return codes for MySQL operations when authenticating users, which could allow remote attackers to authenticate using a NULL password when database errors occur or if the database is unavailable.
7120| [CVE-2002-1923] The default configuration in MySQL 3.20.32 through 3.23.52, when running on Windows, does not have logging enabled, which could allow remote attackers to conduct activities without detection.
7121| [CVE-2002-1921] The default configuration of MySQL 3.20.32 through 3.23.52, when running on Windows, does set the bind address to the loopback interface, which allows remote attackers to connect to the database.
7122| [CVE-2002-1809] The default configuration of the Windows binary release of MySQL 3.23.2 through 3.23.52 has a NULL root password, which could allow remote attackers to gain unauthorized root access to the MySQL database.
7123| [CVE-2002-1479] Cacti before 0.6.8 stores a MySQL username and password in plaintext in config.php, which has world-readable permissions, which allows local users modify databases as the Cacti user and possibly gain privileges.
7124| [CVE-2002-1376] libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code.
7125| [CVE-2002-1375] The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response.
7126| [CVE-2002-1374] The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.
7127| [CVE-2002-1373] Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL 3.23.x before 3.23.54 allows remote attackers to cause a denial of service (crash or hang) in mysqld by causing large negative integers to be provided to a memcpy call.
7128| [CVE-2002-0969] Buffer overflow in MySQL daemon (mysqld) before 3.23.50, and 4.0 beta before 4.02, on the Win32 platform, allows local users to execute arbitrary code via a long "datadir" parameter in the my.ini initialization file, whose permissions on Windows allow Full Control to the Everyone group.
7129| [CVE-2002-0229] Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using "LOAD DATA INFILE LOCAL" SQL statements.
7130| [CVE-2001-1454] Buffer overflow in MySQL before 3.23.33 allows remote attackers to execute arbitrary code via a long drop database request.
7131| [CVE-2001-1453] Buffer overflow in libmysqlclient.so in MySQL 3.23.33 and earlier allows remote attackers to execute arbitrary code via a long host parameter.
7132| [CVE-2001-1275] MySQL before 3.23.31 allows users with a MySQL account to use the SHOW GRANTS command to obtain the encrypted administrator password from the mysql.user table and possibly gain privileges via password cracking.
7133| [CVE-2001-1274] Buffer overflow in MySQL before 3.23.31 allows attackers to cause a denial of service and possibly gain privileges.
7134| [CVE-2001-1255] WinMySQLadmin 1.1 stores the MySQL password in plain text in the my.ini file, which allows local users to obtain unathorized access the MySQL database.
7135| [CVE-2001-1226] AdCycle 1.17 and earlier allow remote attackers to modify SQL queries, which are not properly sanitized before being passed to the MySQL database.
7136| [CVE-2001-1044] Basilix Webmail 0.9.7beta, and possibly other versions, stores *.class and *.inc files under the document root and does not restrict access, which could allows remote attackers to obtain sensitive information such as MySQL passwords and usernames from the mysql.class file.
7137| [CVE-2001-0990] Inter7 vpopmail 4.10.35 and earlier, when using the MySQL module, compiles authentication information in cleartext into the libvpopmail.a library, which allows local users to obtain the MySQL username and password by inspecting the vpopmail programs that use the library.
7138| [CVE-2001-0645] Symantec/AXENT NetProwler 3.5.x contains several default passwords, which could allow remote attackers to (1) access to the management tier via the "admin" password, or (2) connect to a MySQL ODBC from the management tier using a blank password.
7139| [CVE-2001-0407] Directory traversal vulnerability in MySQL before 3.23.36 allows local users to modify arbitrary files and gain privileges by creating a database whose name starts with .. (dot dot).
7140| [CVE-2000-0981] MySQL Database Engine uses a weak authentication method which leaks information that could be used by a remote attacker to recover the password.
7141| [CVE-2000-0957] The pluggable authentication module for mysql (pam_mysql) before 0.4.7 does not properly cleanse user input when constructing SQL statements, which allows attackers to obtain plaintext passwords or hashes.
7142| [CVE-2000-0707] PCCS MySQLDatabase Admin Tool Manager 1.2.4 and earlier installs the file dbconnect.inc within the web root, which allows remote attackers to obtain sensitive information such as the administrative password.
7143| [CVE-2000-0148] MySQL 3.22 allows remote attackers to bypass password authentication and access a database via a short check string.
7144| [CVE-2000-0045] MySQL allows local users to modify passwords for arbitrary MySQL users via the GRANT privilege.
7145| [CVE-1999-1188] mysqld in MySQL 3.21 creates log files with world-readable permissions, which allows local users to obtain passwords for users who are added to the user database.
7146|
7147| SecurityFocus - https://www.securityfocus.com/bid/:
7148| [104370] MySQL Multi-Master Replication Manager Multiple Remote Command Injection Vulnerabilities
7149| [103954] Oracle MySQL CVE-2018-2767 Incomplete Fix SSL Certificate Validation Security Bypass Vulnerability
7150| [103876] Oracle MySQL Server CVE-2018-2769 Remote Security Vulnerability
7151| [103845] Oracle MySQL Server CVE-2018-2839 Remote Security Vulnerability
7152| [103838] Oracle MySQL Cluster CVE-2018-2877 Local Security Vulnerability
7153| [103836] Oracle MySQL Server CVE-2018-2812 Remote Security Vulnerability
7154| [103831] Oracle MySQL Server CVE-2018-2805 Remote Security Vulnerability
7155| [103830] Oracle MySQL Server CVE-2018-2813 Remote Security Vulnerability
7156| [103828] Oracle MySQL Server CVE-2018-2771 Remote Security Vulnerability
7157| [103825] Oracle MySQL Server CVE-2018-2781 Remote Security Vulnerability
7158| [103824] Oracle MySQL Server CVE-2018-2818 Remote Security Vulnerability
7159| [103820] Oracle MySQL Server CVE-2018-2761 Remote Security Vulnerability
7160| [103818] Oracle MySQL Server CVE-2018-2817 Remote Security Vulnerability
7161| [103814] Oracle MySQL Server CVE-2018-2819 Remote Security Vulnerability
7162| [103811] Oracle MySQL Server CVE-2018-2773 Local Security Vulnerability
7163| [103807] Oracle MySQL Server CVE-2018-2755 Local Security Vulnerability
7164| [103805] Oracle MySQL Server CVE-2018-2766 Remote Security Vulnerability
7165| [103804] Oracle MySQL Server CVE-2018-2787 Remote Security Vulnerability
7166| [103802] Oracle MySQL Server CVE-2018-2758 Remote Security Vulnerability
7167| [103801] Oracle MySQL Server CVE-2018-2784 Remote Security Vulnerability
7168| [103799] Oracle MySQL Server CVE-2018-2782 Remote Security Vulnerability
7169| [103794] Oracle MySQL Server CVE-2018-2762 Remote Security Vulnerability
7170| [103791] Oracle MySQL Server CVE-2018-2776 Remote Security Vulnerability
7171| [103790] Oracle MySQL Server CVE-2018-2846 Remote Security Vulnerability
7172| [103789] Oracle MySQL Server CVE-2018-2816 Remote Security Vulnerability
7173| [103787] Oracle MySQL Server CVE-2018-2779 Remote Security Vulnerability
7174| [103785] Oracle MySQL Server CVE-2018-2778 Remote Security Vulnerability
7175| [103783] Oracle MySQL Server CVE-2018-2810 Remote Security Vulnerability
7176| [103781] Oracle MySQL Server CVE-2018-2777 Remote Security Vulnerability
7177| [103780] Oracle MySQL Server CVE-2018-2759 Remote Security Vulnerability
7178| [103779] Oracle MySQL Server CVE-2018-2786 Remote Security Vulnerability
7179| [103778] Oracle MySQL Server CVE-2018-2780 Remote Security Vulnerability
7180| [103777] Oracle MySQL Server CVE-2018-2775 Remote Security Vulnerability
7181| [102714] Oracle MySQL Server CVE-2018-2591 Remote Security Vulnerability
7182| [102713] Oracle MySQL Server CVE-2018-2562 Remote Security Vulnerability
7183| [102712] Oracle MySQL Server CVE-2018-2565 Remote Security Vulnerability
7184| [102711] Oracle MySQL Server CVE-2018-2647 Remote Security Vulnerability
7185| [102710] Oracle MySQL Server CVE-2018-2573 Remote Security Vulnerability
7186| [102709] Oracle MySQL Server CVE-2018-2612 Remote Security Vulnerability
7187| [102708] Oracle MySQL Server CVE-2018-2583 Remote Security Vulnerability
7188| [102706] Oracle MySQL Server CVE-2018-2622 Remote Security Vulnerability
7189| [102704] Oracle MySQL Server CVE-2018-2703 Remote Security Vulnerability
7190| [102703] Oracle MySQL Server CVE-2018-2646 Remote Security Vulnerability
7191| [102701] Oracle MySQL Server CVE-2018-2696 Remote Security Vulnerability
7192| [102700] Oracle MySQL Server CVE-2018-2586 Remote Security Vulnerability
7193| [102698] Oracle MySQL Server CVE-2018-2645 Remote Security Vulnerability
7194| [102697] Oracle MySQL Server CVE-2018-2590 Remote Security Vulnerability
7195| [102696] Oracle MySQL Server CVE-2018-2600 Remote Security Vulnerability
7196| [102695] Oracle MySQL Server CVE-2018-2576 Remote Security Vulnerability
7197| [102685] Oracle MySQL Server CVE-2018-2667 Remote Security Vulnerability
7198| [102682] Oracle MySQL Server CVE-2018-2668 Remote Security Vulnerability
7199| [102681] Oracle MySQL Server CVE-2018-2665 Remote Security Vulnerability
7200| [102678] Oracle MySQL Server CVE-2018-2640 Remote Security Vulnerability
7201| [102674] Oracle MySQL Connectors CVE-2018-2585 Remote Security Vulnerability
7202| [101448] Oracle MySQL Server CVE-2017-10313 Remote Security Vulnerability
7203| [101446] Oracle MySQL Server CVE-2017-10311 Remote Security Vulnerability
7204| [101444] Oracle MySQL Server CVE-2017-10294 Remote Security Vulnerability
7205| [101441] Oracle MySQL Server CVE-2017-10276 Remote Security Vulnerability
7206| [101439] Oracle MySQL Connectors CVE-2017-10277 Remote Security Vulnerability
7207| [101433] Oracle MySQL Server CVE-2017-10167 Remote Security Vulnerability
7208| [101429] Oracle MySQL Server CVE-2017-10365 Remote Security Vulnerability
7209| [101424] Oracle MySQL Server CVE-2017-10165 Remote Security Vulnerability
7210| [101420] Oracle MySQL Server CVE-2017-10283 Remote Security Vulnerability
7211| [101415] Oracle MySQL Server CVE-2017-10379 Remote Security Vulnerability
7212| [101410] Oracle MySQL Server CVE-2017-10320 Remote Security Vulnerability
7213| [101406] Oracle MySQL Server CVE-2017-10384 Remote Security Vulnerability
7214| [101402] Oracle MySQL Server CVE-2017-10155 Remote Security Vulnerability
7215| [101397] Oracle MySQL Server CVE-2017-10286 Remote Security Vulnerability
7216| [101390] Oracle MySQL Server CVE-2017-10268 Local Security Vulnerability
7217| [101385] Oracle MySQL Server CVE-2017-10284 Remote Security Vulnerability
7218| [101381] Oracle MySQL Enterprise Monitor CVE-2017-10424 Remote Security Vulnerability
7219| [101375] Oracle MySQL Server CVE-2017-10378 Remote Security Vulnerability
7220| [101373] Oracle MySQL Server CVE-2017-10296 Remote Security Vulnerability
7221| [101337] Oracle MySQL Server CVE-2017-10227 Remote Security Vulnerability
7222| [101324] Oracle MySQL Connectors CVE-2017-10203 Remote Security Vulnerability
7223| [101316] Oracle MySQL Server CVE-2017-10279 Remote Security Vulnerability
7224| [101314] Oracle MySQL Server CVE-2017-10314 Remote Security Vulnerability
7225| [99810] Oracle MySQL Server CVE-2017-3653 Remote Security Vulnerability
7226| [99808] Oracle MySQL Server CVE-2017-3650 Remote Security Vulnerability
7227| [99805] Oracle MySQL Server CVE-2017-3652 Remote Security Vulnerability
7228| [99802] Oracle MySQL Server CVE-2017-3651 Remote Security Vulnerability
7229| [99799] Oracle MySQL Server CVE-2017-3649 Remote Security Vulnerability
7230| [99796] Oracle MySQL Server CVE-2017-3647 Remote Security Vulnerability
7231| [99789] Oracle MySQL Server CVE-2017-3648 Remote Security Vulnerability
7232| [99786] Oracle MySQL Server CVE-2017-3646 Remote Security Vulnerability
7233| [99783] Oracle MySQL Server CVE-2017-3645 Remote Security Vulnerability
7234| [99779] Oracle MySQL Server CVE-2017-3642 Remote Security Vulnerability
7235| [99778] Oracle MySQL Server CVE-2017-3638 Remote Security Vulnerability
7236| [99775] Oracle MySQL Server CVE-2017-3644 Remote Security Vulnerability
7237| [99772] Oracle MySQL Server CVE-2017-3643 Remote Security Vulnerability
7238| [99767] Oracle MySQL Server CVE-2017-3641 Remote Security Vulnerability
7239| [99765] Oracle MySQL Server CVE-2017-3640 Remote Security Vulnerability
7240| [99753] Oracle MySQL Server CVE-2017-3639 Remote Security Vulnerability
7241| [99748] Oracle MySQL Server CVE-2017-3637 Remote Security Vulnerability
7242| [99746] Oracle MySQL Server CVE-2017-3529 Remote Security Vulnerability
7243| [99736] Oracle MySQL Server CVE-2017-3636 Local Security Vulnerability
7244| [99730] Oracle MySQL Connectors/MySQL Server CVE-2017-3635 Remote Security Vulnerability
7245| [99729] Oracle MySQL Server CVE-2017-3634 Remote Security Vulnerability
7246| [99722] Oracle MySQL Server CVE-2017-3633 Remote Security Vulnerability
7247| [99374] Perl DBD::mysql Module CVE-2017-10788 Use After Free Denial of Service Vulnerability
7248| [99364] Perl DBD::mysql Module CVE-2017-10789 Man in the Middle Security Bypass Vulnerability
7249| [97982] Oracle MySQL Connectors CVE-2017-3523 Remote Security Vulnerability
7250| [97960] MySQL-GUI-tools CVE-2010-4178 Local Information Disclosure Vulnerability
7251| [97959] MySQL-GUI-tools CVE-2010-4177 Local Information Disclosure Vulnerability
7252| [97851] Oracle MySQL Server CVE-2017-3462 Remote Security Vulnerability
7253| [97849] Oracle MySQL Server CVE-2017-3463 Remote Security Vulnerability
7254| [97848] Oracle MySQL Server CVE-2017-3468 Remote Security Vulnerability
7255| [97847] Oracle MySQL Server CVE-2017-3459 Remote Security Vulnerability
7256| [97845] Oracle MySQL Server CVE-2017-3457 Remote Security Vulnerability
7257| [97844] Oracle MySQL Enterprise Monitor CVE-2017-3307 Remote Security Vulnerability
7258| [97840] Oracle MySQL Connectors CVE-2017-3590 Local Security Vulnerability
7259| [97837] Oracle MySQL Server CVE-2017-3458 Remote Security Vulnerability
7260| [97836] Oracle MySQL Connectors CVE-2017-3589 Local Security Vulnerability
7261| [97833] Oracle MySQL Workbench CVE-2017-3469 Remote Security Vulnerability
7262| [97831] Oracle MySQL Server CVE-2017-3456 Remote Security Vulnerability
7263| [97826] Oracle MySQL Server CVE-2017-3460 Remote Security Vulnerability
7264| [97825] Oracle MySQL Server CVE-2017-3467 Remote Security Vulnerability
7265| [97822] Oracle MySQL Server CVE-2017-3465 Remote Security Vulnerability
7266| [97820] Oracle MySQL Server CVE-2017-3455 Remote Security Vulnerability
7267| [97818] Oracle MySQL Server CVE-2017-3464 Remote Security Vulnerability
7268| [97815] Oracle MySQL Cluster CVE-2017-3304 Remote Security Vulnerability
7269| [97812] Oracle MySQL Server CVE-2017-3461 Remote Security Vulnerability
7270| [97791] Oracle MySQL Server CVE-2017-3454 Remote Security Vulnerability
7271| [97784] Oracle MySQL Connectors CVE-2017-3586 Remote Security Vulnerability
7272| [97779] Oracle MySQL Server CVE-2017-3452 Remote Security Vulnerability
7273| [97776] Oracle MySQL Server CVE-2017-3453 Remote Security Vulnerability
7274| [97772] Oracle MySQL Server CVE-2017-3331 Remote Security Vulnerability
7275| [97765] Oracle MySQL Server CVE-2017-3600 Remote Security Vulnerability
7276| [97763] Oracle MySQL Server CVE-2017-3329 Remote Security Vulnerability
7277| [97754] Oracle MySQL Server CVE-2017-3599 Remote Security Vulnerability
7278| [97747] Oracle MySQL Server CVE-2017-3450 Remote Security Vulnerability
7279| [97742] Oracle MySQL Server CVE-2017-3309 Remote Security Vulnerability
7280| [97725] Oracle MySQL Server CVE-2017-3308 Remote Security Vulnerability
7281| [97724] Oracle MySQL Enterprise Monitor CVE-2017-3306 Remote Security Vulnerability
7282| [97023] MySQL CVE-2017-3305 Man in the Middle Security Bypass Vulnerability
7283| [96300] PHP 'ext/mysqli/mysqli.c' Denial of Service Vulnerability
7284| [96162] MariaDB and MySQL CVE-2017-3302 Denial of Service Vulnerability
7285| [95592] Oracle MySQL Cluster CVE-2016-5541 Remote Security Vulnerability
7286| [95589] Oracle MySQL Server CVE-2017-3257 Remote Security Vulnerability
7287| [95588] Oracle MySQL Server CVE-2017-3318 Local Security Vulnerability
7288| [95585] Oracle MySQL Server CVE-2017-3317 Local Security Vulnerability
7289| [95583] Oracle MySQL Server CVE-2017-3273 Remote Security Vulnerability
7290| [95580] Oracle MySQL Server CVE-2016-8318 Remote Security Vulnerability
7291| [95575] Oracle MySQL Cluster CVE-2017-3323 Remote Security Vulnerability
7292| [95574] Oracle MySQL Cluster CVE-2017-3322 Remote Security Vulnerability
7293| [95571] Oracle MySQL Server CVE-2017-3238 Remote Security Vulnerability
7294| [95565] Oracle MySQL Server CVE-2017-3244 Remote Security Vulnerability
7295| [95562] Oracle MySQL Cluster CVE-2017-3321 Remote Security Vulnerability
7296| [95560] Oracle MySQL Server CVE-2017-3258 Remote Security Vulnerability
7297| [95542] Oracle MySQL Enterprise Monitor CVE-2016-5590 Remote Security Vulnerability
7298| [95538] Oracle MySQL Server CVE-2017-3243 Remote Security Vulnerability
7299| [95527] Oracle MySQL Server CVE-2017-3313 Local Security Vulnerability
7300| [95520] Oracle MySQL Server CVE-2017-3265 Local Security Vulnerability
7301| [95501] Oracle MySQL Server CVE-2017-3291 Local Security Vulnerability
7302| [95491] Oracle MySQL Server CVE-2017-3312 Local Security Vulnerability
7303| [95486] Oracle MySQL Server CVE-2017-3256 Remote Security Vulnerability
7304| [95482] Oracle MySQL Server CVE-2017-3251 Remote Security Vulnerability
7305| [95479] Oracle MySQL Server CVE-2017-3319 Remote Security Vulnerability
7306| [95470] Oracle MySQL Server CVE-2017-3320 Remote Security Vulnerability
7307| [95146] Pivotal MySQL for PCF CVE-2016-0898 Information Disclosure Vulnerability
7308| [94350] DBD::mysql CVE-2016-1249 Out-Of-Bounds Read Information Disclosure Vulnerability
7309| [93755] Oracle MySQL CVE-2016-8284 Local Security Vulnerability
7310| [93745] Oracle MySQL CVE-2016-8286 Remote Security Vulnerability
7311| [93740] Oracle MySQL CVE-2016-8288 Remote Security Vulnerability
7312| [93737] Oracle MySQL CVE-2016-8283 Remote Security Vulnerability
7313| [93735] Oracle MySQL CVE-2016-5584 Remote Security Vulnerability
7314| [93733] Oracle MySQL CVE-2016-8290 Remote Security Vulnerability
7315| [93727] Oracle MySQL CVE-2016-8287 Remote Security Vulnerability
7316| [93720] Oracle MySQL CVE-2016-8289 Local Security Vulnerability
7317| [93715] Oracle MySQL CVE-2016-5635 Remote Security Vulnerability
7318| [93709] Oracle MySQL CVE-2016-5634 Remote Security Vulnerability
7319| [93702] Oracle MySQL CVE-2016-5633 Remote Security Vulnerability
7320| [93693] Oracle MySQL CVE-2016-5632 Remote Security Vulnerability
7321| [93684] Oracle MySQL CVE-2016-5631 Remote Security Vulnerability
7322| [93678] Oracle MySQL CVE-2016-5507 Remote Security Vulnerability
7323| [93674] Oracle MySQL CVE-2016-5630 Remote Security Vulnerability
7324| [93670] Oracle MySQL CVE-2016-3495 Remote Security Vulnerability
7325| [93668] Oracle MySQL CVE-2016-5629 Remote Security Vulnerability
7326| [93662] Oracle MySQL CVE-2016-5628 Remote Security Vulnerability
7327| [93659] Oracle MySQL CVE-2016-7440 Local Security Vulnerability
7328| [93653] Oracle MySQL Connector CVE-2016-5598 Remote Security Vulnerability
7329| [93650] Oracle MySQL CVE-2016-3492 Remote Security Vulnerability
7330| [93642] Oracle MySQL CVE-2016-5627 Remote Security Vulnerability
7331| [93638] Oracle MySQL CVE-2016-5626 Remote Security Vulnerability
7332| [93635] Oracle MySQL CVE-2016-5624 Remote Security Vulnerability
7333| [93630] Oracle MySQL CVE-2016-5612 Remote Security Vulnerability
7334| [93622] Oracle MySQL CVE-2016-5609 Remote Security Vulnerability
7335| [93617] Oracle MySQL CVE-2016-5625 Local Security Vulnerability
7336| [93614] RETIRED: Oracle MySQL CVE-2016-5616 Local Security Vulnerability
7337| [93612] Oracle MySQL CVE-2016-6664 Local Security Vulnerability
7338| [93480] Pivotal Cloud Foundry cf-mysql CVE-2016-6653 Information Disclosure Vulnerability
7339| [93337] perl-DBD-MySQL CVE-2016-1246 Remote Buffer Overflow Vulnerability
7340| [92912] Oracle MySQL CVE-2016-6662 Remote Code Execution Vulnerability
7341| [92911] Oracle MySQL CVE-2016-6663 Unspecified Security Vulnerability
7342| [92149] DBD::mysql CVE-2014-9906 Incomplete Fix Use After Free Remote Code Execution Vulnerability
7343| [92118] DBD::mysql 'my_login()' Function Use After Free Remote Code Execution Vulnerability
7344| [91999] Oracle MySQL CVE-2016-3452 Remote Security Vulnerability
7345| [91992] Oracle MySQL CVE-2016-3614 Remote Security Vulnerability
7346| [91987] Oracle MySQL CVE-2016-5444 Remote Security Vulnerability
7347| [91983] Oracle MySQL CVE-2016-3588 Remote Security Vulnerability
7348| [91980] Oracle MySQL CVE-2016-3486 Remote Security Vulnerability
7349| [91976] Oracle MySQL CVE-2016-3424 Remote Security Vulnerability
7350| [91974] Oracle MySQL CVE-2016-5442 Remote Security Vulnerability
7351| [91969] Oracle MySQL CVE-2016-5439 Remote Security Vulnerability
7352| [91967] Oracle MySQL CVE-2016-3518 Remote Security Vulnerability
7353| [91963] Oracle MySQL CVE-2016-5443 Local Security Vulnerability
7354| [91960] Oracle MySQL CVE-2016-3615 Remote Security Vulnerability
7355| [91953] Oracle MySQL CVE-2016-5440 Remote Security Vulnerability
7356| [91949] Oracle MySQL CVE-2016-3501 Remote Security Vulnerability
7357| [91943] Oracle MySQL CVE-2016-3459 Remote Security Vulnerability
7358| [91932] Oracle MySQL CVE-2016-3521 Remote Security Vulnerability
7359| [91917] Oracle MySQL CVE-2016-5437 Remote Security Vulnerability
7360| [91915] Oracle MySQL CVE-2016-5441 Remote Security Vulnerability
7361| [91913] Oracle MySQL CVE-2016-3471 Local Security Vulnerability
7362| [91910] Oracle MySQL CVE-2016-3440 Remote Security Vulnerability
7363| [91906] Oracle MySQL CVE-2016-5436 Remote Security Vulnerability
7364| [91902] Oracle MySQL CVE-2016-3477 Local Security Vulnerability
7365| [90165] MySQL CVE-2005-0799 Denial-Of-Service Vulnerability
7366| [89812] xMySQLadmin CVE-2005-1944 Local Security Vulnerability
7367| [89412] MySQL CVE-2005-2573 Directory Traversal Vulnerability
7368| [88627] MySQL CVE-1999-1188 Local Security Vulnerability
7369| [88032] MySQL CVE-2001-1275 Local Security Vulnerability
7370| [87310] Btsavemysql CVE-2006-6378 Remote Security Vulnerability
7371| [86999] MySQL CVE-2001-1274 Denial-Of-Service Vulnerability
7372| [86513] Oracle MySQL CVE-2016-0665 Remote Security Vulnerability
7373| [86511] Oracle MySQL CVE-2016-0661 Remote Security Vulnerability
7374| [86509] Oracle MySQL CVE-2016-0666 Remote Security Vulnerability
7375| [86506] Oracle MySQL CVE-2016-0662 Remote Security Vulnerability
7376| [86504] Oracle MySQL CVE-2016-0654 Remote Security Vulnerability
7377| [86501] Oracle MySQL CVE-2016-0651 Remote Security Vulnerability
7378| [86498] Oracle MySQL CVE-2016-0649 Remote Security Vulnerability
7379| [86496] Oracle MySQL CVE-2016-0650 Remote Security Vulnerability
7380| [86495] Oracle MySQL CVE-2016-0647 Remote Security Vulnerability
7381| [86493] Oracle MySQL CVE-2016-0659 Remote Security Vulnerability
7382| [86489] Oracle MySQL CVE-2016-3461 Remote Security Vulnerability
7383| [86486] Oracle MySQL CVE-2016-0643 Remote Security Vulnerability
7384| [86484] Oracle MySQL CVE-2016-0667 Remote Security Vulnerability
7385| [86470] Oracle MySQL CVE-2016-0641 Remote Security Vulnerability
7386| [86467] Oracle MySQL CVE-2016-0668 Remote Security Vulnerability
7387| [86463] Oracle MySQL CVE-2016-0658 Remote Security Vulnerability
7388| [86457] Oracle MySQL CVE-2016-0648 Remote Security Vulnerability
7389| [86454] Oracle MySQL CVE-2016-0652 Remote Security Vulnerability
7390| [86451] Oracle MySQL CVE-2016-0663 Remote Security Vulnerability
7391| [86445] Oracle MySQL CVE-2016-0642 Remote Security Vulnerability
7392| [86442] Oracle MySQL CVE-2016-0644 Remote Security Vulnerability
7393| [86439] Oracle MySQL CVE-2016-0653 Remote Security Vulnerability
7394| [86436] Oracle MySQL CVE-2016-0646 Remote Security Vulnerability
7395| [86433] Oracle MySQL CVE-2016-0657 Remote Security Vulnerability
7396| [86431] Oracle MySQL CVE-2016-0656 Remote Security Vulnerability
7397| [86427] Oracle MySQL CVE-2016-0640 Remote Security Vulnerability
7398| [86424] Oracle MySQL CVE-2016-0655 Remote Security Vulnerability
7399| [86418] Oracle MySQL CVE-2016-0639 Remote Security Vulnerability
7400| [85985] MariaDB and MySQL CVE-2015-5969 Local Information Disclosure Vulnerability
7401| [85262] MySQL CVE-2007-5970 Remote Security Vulnerability
7402| [85246] Mysql Community Server CVE-2007-6313 Remote Security Vulnerability
7403| [85215] Mysql Banner Exchange CVE-2007-6512 Denial-Of-Service Vulnerability
7404| [83639] MySQLDumper CVE-2006-5264 Cross-Site Scripting Vulnerability
7405| [83232] MySQL Connector/Net CVE-2006-4227 Remote Security Vulnerability
7406| [83194] MySQL CVE-2004-0628 Denial Of Service Vulnerability
7407| [82913] MySQL CVE-2001-1453 Remote Security Vulnerability
7408| [82911] MySQL CVE-2001-1454 Remote Security Vulnerability
7409| [81810] MariaDB/MySQL/Percona Server CVE-2016-2047 SSL Certificate Validation Security Bypass Vulnerability
7410| [81258] Oracle MySQL CVE-2016-0609 Remote Security Vulnerability
7411| [81253] Oracle MySQL CVE-2016-0605 Remote Security Vulnerability
7412| [81245] Oracle MySQL CVE-2015-7744 Remote Security Vulnerability
7413| [81238] Oracle MySQL CVE-2016-0607 Remote Security Vulnerability
7414| [81226] Oracle MySQL CVE-2016-0608 Remote Security Vulnerability
7415| [81211] Oracle MySQL CVE-2016-0601 Remote Security Vulnerability
7416| [81203] Oracle MySQL CVE-2016-0599 Remote Security Vulnerability
7417| [81198] Oracle MySQL CVE-2016-0610 Remote Security Vulnerability
7418| [81188] Oracle MySQL CVE-2016-0600 Remote Security Vulnerability
7419| [81182] Oracle MySQL CVE-2016-0598 Remote Security Vulnerability
7420| [81176] Oracle MySQL CVE-2016-0616 Remote Security Vulnerability
7421| [81164] Oracle MySQL CVE-2016-0611 Remote Security Vulnerability
7422| [81151] Oracle MySQL CVE-2016-0597 Remote Security Vulnerability
7423| [81136] Oracle MySQL CVE-2016-0502 Remote Security Vulnerability
7424| [81130] Oracle MySQL CVE-2016-0596 Remote Security Vulnerability
7425| [81126] Oracle MySQL CVE-2016-0503 Remote Security Vulnerability
7426| [81121] Oracle MySQL CVE-2016-0595 Remote Security Vulnerability
7427| [81108] Oracle MySQL CVE-2016-0594 Remote Security Vulnerability
7428| [81088] Oracle MySQL CVE-2016-0505 Remote Security Vulnerability
7429| [81077] Oracle MySQL CVE-2016-0504 Remote Security Vulnerability
7430| [81066] Oracle MySQL CVE-2016-0546 Local Security Vulnerability
7431| [79408] Mysql-Ocaml CVE-2009-2942 Remote Security Vulnerability
7432| [79044] kiddog_mysqldumper CVE-2010-0336 Information Disclosure Vulnerability
7433| [78373] MySQL CVE-2011-5049 Denial-Of-Service Vulnerability
7434| [77237] Oracle MySQL Server CVE-2015-4826 Remote Security Vulnerability
7435| [77234] Oracle MySQL Server CVE-2015-4910 Remote Security Vulnerability
7436| [77232] Oracle MySQL Server CVE-2015-4766 Local Security Vulnerability
7437| [77231] Oracle MySQL Server CVE-2015-4890 Remote Security Vulnerability
7438| [77228] Oracle MySQL Server CVE-2015-4830 Remote Security Vulnerability
7439| [77222] Oracle MySQL Server CVE-2015-4815 Remote Security Vulnerability
7440| [77219] Oracle MySQL Server CVE-2015-4904 Remote Security Vulnerability
7441| [77216] Oracle MySQL Server CVE-2015-4800 Remote Security Vulnerability
7442| [77213] Oracle MySQL Server CVE-2015-4791 Remote Security Vulnerability
7443| [77208] Oracle MySQL Server CVE-2015-4870 Remote Security Vulnerability
7444| [77205] Oracle MySQL Server CVE-2015-4807 Remote Security Vulnerability
7445| [77199] Oracle MySQL Server CVE-2015-4730 Remote Security Vulnerability
7446| [77196] Oracle MySQL Server CVE-2015-4819 Local Security Vulnerability
7447| [77190] Oracle MySQL Server CVE-2015-4836 Remote Security Vulnerability
7448| [77187] Oracle MySQL Server CVE-2015-4864 Remote Security Vulnerability
7449| [77171] Oracle MySQL Server CVE-2015-4792 Remote Security Vulnerability
7450| [77170] Oracle MySQL Server CVE-2015-4833 Remote Security Vulnerability
7451| [77165] Oracle MySQL Server CVE-2015-4802 Remote Security Vulnerability
7452| [77153] Oracle MySQL Server CVE-2015-4913 Remote Security Vulnerability
7453| [77147] Oracle MySQL Server CVE-2015-4862 Remote Security Vulnerability
7454| [77145] Oracle MySQL Server CVE-2015-4858 Remote Security Vulnerability
7455| [77143] Oracle MySQL Server CVE-2015-4905 Remote Security Vulnerability
7456| [77140] Oracle MySQL Server CVE-2015-4879 Remote Security Vulnerability
7457| [77137] Oracle MySQL Server CVE-2015-4861 Remote Security Vulnerability
7458| [77136] Oracle MySQL Server CVE-2015-4895 Remote Security Vulnerability
7459| [77134] Oracle MySQL Server CVE-2015-4816 Remote Security Vulnerability
7460| [77132] Oracle MySQL Server CVE-2015-4866 Remote Security Vulnerability
7461| [77015] Oracle MySQL Multiple Buffer Overflow Vulnerabilities
7462| [75849] Oracle MySQL Server CVE-2015-4752 Remote Security Vulnerability
7463| [75844] Oracle MySQL Server CVE-2015-4767 Remote Security Vulnerability
7464| [75837] Oracle MySQL Server CVE-2015-2620 Remote Security Vulnerability
7465| [75835] Oracle MySQL Server CVE-2015-4771 Remote Security Vulnerability
7466| [75830] Oracle MySQL Server CVE-2015-2643 Remote Security Vulnerability
7467| [75822] Oracle MySQL Server CVE-2015-2648 Remote Security Vulnerability
7468| [75815] Oracle MySQL Server CVE-2015-2641 Remote Security Vulnerability
7469| [75813] Oracle MySQL Server CVE-2015-2661 Local Security Server Vulnerability
7470| [75802] Oracle MySQL Server CVE-2015-4737 Remote Security Vulnerability
7471| [75785] Oracle MySQL Server CVE-2015-4756 Remote Security Vulnerability
7472| [75781] Oracle MySQL Server CVE-2015-4772 Remote Security Vulnerability
7473| [75774] Oracle MySQL Server CVE-2015-2617 Remote Security Vulnerability
7474| [75770] Oracle MySQL Server CVE-2015-4761 Remote Security Vulnerability
7475| [75762] Oracle MySQL Server CVE-2015-2611 Remote Security Vulnerability
7476| [75760] Oracle MySQL Server CVE-2015-2639 Remote Security Vulnerability
7477| [75759] Oracle MySQL Server CVE-2015-4757 Remote Security Vulnerability
7478| [75753] Oracle MySQL Server CVE-2015-4769 Remote Security Vulnerability
7479| [75751] Oracle MySQL Server CVE-2015-2582 Remote Security Vulnerability
7480| [75397] MySql Lite Administrator Multiple Cross Site Scripting Vulnerabilities
7481| [75394] WordPress wp-instance-rename Plugin 'mysqldump_download.php' Arbitrary File Download Vulnerability
7482| [74695] Tiny MySQL 'tinymy.php' Cross Site Scripting Vulnerability
7483| [74398] Oracle MySQL CVE-2015-3152 SSL Certificate Validation Security Bypass Vulnerability
7484| [74137] Oracle MySQL Utilities CVE-2015-2576 Local Security Vulnerability
7485| [74133] Oracle MySQL Server CVE-2015-0498 Remote Security Vulnerability
7486| [74130] Oracle MySQL Server CVE-2015-0511 Remote Security Vulnerability
7487| [74126] Oracle MySQL Server CVE-2015-2566 Remote Security Vulnerability
7488| [74123] Oracle MySQL Server CVE-2015-2567 Remote Security Vulnerability
7489| [74121] Oracle MySQL Server CVE-2015-0507 Remote Security Vulnerability
7490| [74120] Oracle MySQL Server CVE-2015-0506 Remote Security Vulnerability
7491| [74115] Oracle MySQL Server CVE-2015-0499 Remote Security Vulnerability
7492| [74112] Oracle MySQL Server CVE-2015-0505 Remote Security Vulnerability
7493| [74110] Oracle MySQL Server CVE-2015-0405 Remote Security Vulnerability
7494| [74103] Oracle MySQL Server CVE-2015-0441 Remote Security Vulnerability
7495| [74102] Oracle MySQL Server CVE-2015-0503 Remote Security Vulnerability
7496| [74098] Oracle MySQL Server CVE-2015-0438 Remote Security Vulnerability
7497| [74095] Oracle MySQL Server CVE-2015-2571 Remote Security Vulnerability
7498| [74091] Oracle MySQL Server CVE-2015-0423 Remote Security Vulnerability
7499| [74089] Oracle MySQL Server CVE-2015-0433 Remote Security Vulnerability
7500| [74086] Oracle MySQL Server CVE-2015-0508 Remote Security Vulnerability
7501| [74085] Oracle MySQL Server CVE-2015-0439 Remote Security Vulnerability
7502| [74081] Oracle MySQL Server CVE-2015-0500 Remote Security Vulnerability
7503| [74078] Oracle MySQL Server CVE-2015-2573 Remote Security Vulnerability
7504| [74075] Oracle MySQL Connectors CVE-2015-2575 Remote Security Vulnerability
7505| [74073] Oracle MySQL Server CVE-2015-2568 Remote Security Vulnerability
7506| [74070] Oracle MySQL Server CVE-2015-0501 Remote Security Vulnerability
7507| [72728] RubyGems xaviershay-dm-rails 'storage.rb' MySQL Credential Information Disclosure Vulnerability
7508| [72229] Oracle MySQL Server CVE-2015-0385 Remote Security Vulnerability
7509| [72227] Oracle MySQL Server CVE-2015-0374 Remote Security Vulnerability
7510| [72223] Oracle MySQL Server CVE-2015-0409 Remote Security Vulnerability
7511| [72217] Oracle MySQL Server CVE-2015-0432 Remote Security Vulnerability
7512| [72214] Oracle MySQL Server CVE-2015-0381 Remote Security Vulnerability
7513| [72210] Oracle MySQL Server CVE-2014-6568 Remote Security Vulnerability
7514| [72205] Oracle MySQL Server CVE-2015-0391 Remote Security Vulnerability
7515| [72200] Oracle MySQL Server CVE-2015-0382 Remote Security Vulnerability
7516| [72191] Oracle MySQL Server CVE-2015-0411 Remote Security Vulnerability
7517| [70550] Oracle MySQL Server CVE-2014-6507 Remote Security Vulnerability
7518| [70540] RETIRED: Oracle MySQL Server CVE-2012-5615 Remote Security Vulnerability
7519| [70532] Oracle MySQL Server CVE-2014-6463 Remote Security Vulnerability
7520| [70530] Oracle MySQL Server CVE-2014-6555 Remote Security Vulnerability
7521| [70525] Oracle MySQL Server CVE-2014-6489 Remote Security Vulnerability
7522| [70517] Oracle MySQL Server CVE-2014-4287 Remote Security Vulnerability
7523| [70516] Oracle MySQL Server CVE-2014-6505 Remote Security Vulnerability
7524| [70511] Oracle MySQL Server CVE-2014-6564 Remote Security Vulnerability
7525| [70510] Oracle MySQL Server CVE-2014-6520 Remote Security Vulnerability
7526| [70497] Oracle MySQL Server CVE-2014-6494 Remote Security Vulnerability
7527| [70496] Oracle MySQL Server CVE-2014-6495 Remote Security Vulnerability
7528| [70489] Oracle MySQL Server CVE-2014-6478 Remote Security Vulnerability
7529| [70487] Oracle MySQL Server CVE-2014-6559 Remote Security Vulnerability
7530| [70486] Oracle MySQL Server CVE-2014-6530 Remote Security Vulnerability
7531| [70478] Oracle MySQL Server CVE-2014-6500 Remote Security Vulnerability
7532| [70469] Oracle MySQL Server CVE-2014-6496 Remote Security Vulnerability
7533| [70462] Oracle MySQL Server CVE-2014-6551 Local Security Vulnerability
7534| [70455] Oracle MySQL Server CVE-2014-6484 Remote Security Vulnerability
7535| [70451] Oracle MySQL Server CVE-2014-6464 Remote Security Vulnerability
7536| [70448] Oracle MySQL Server CVE-2014-6474 Remote Security Vulnerability
7537| [70446] Oracle MySQL Server CVE-2014-6469 Remote Security Vulnerability
7538| [70444] Oracle MySQL Server CVE-2014-6491 Remote Security Vulnerability
7539| [69743] Oracle MySQL Client yaSSL Certificate Decode Buffer Overflow Vulnerability
7540| [69732] MySQL MyISAM Insecure Temporary File Creation Vulnerability
7541| [68736] RubyGems lean-ruport MySQL Credential Local Information Disclosure Vulnerability
7542| [68607] Oracle MySQL Server CVE-2014-4214 Remote Security Vulnerability
7543| [68602] Oracle MySQL Server CVE-2014-4240 Local Security Vulnerability
7544| [68598] Oracle MySQL Server CVE-2014-4233 Remote Security Vulnerability
7545| [68593] Oracle MySQL Server CVE-2014-4207 Remote Security Vulnerability
7546| [68587] Oracle MySQL Server CVE-2014-4238 Remote Security Vulnerability
7547| [68579] Oracle MySQL Server CVE-2014-2494 Remote Security Vulnerability
7548| [68573] Oracle MySQL Server CVE-2014-4260 Remote Security Vulnerability
7549| [68564] Oracle MySQL Server CVE-2014-4258 Remote Security Vulnerability
7550| [66896] Oracle MySQL Server CVE-2014-2436 Remote Security Vulnerability
7551| [66890] Oracle MySQL Server CVE-2014-2431 Remote Security Vulnerability
7552| [66885] Oracle MySQL Server CVE-2014-2444 Remote Security Vulnerability
7553| [66880] Oracle MySQL Server CVE-2014-2419 Remote Security Vulnerability
7554| [66872] Oracle MySQL Server CVE-2014-2434 Remote Security Vulnerability
7555| [66863] Oracle MySQL Server CVE-2014-2450 Remote Security Vulnerability
7556| [66858] Oracle MySQL Server CVE-2014-2430 Remote Security Vulnerability
7557| [66853] Oracle MySQL Server CVE-2014-2435 Remote Security Vulnerability
7558| [66850] Oracle MySQL Client CVE-2014-2440 Remote Security Vulnerability
7559| [66846] Oracle MySQL Server CVE-2014-2438 Remote Security Vulnerability
7560| [66835] Oracle MySQL Server CVE-2014-0384 Remote Security Vulnerability
7561| [66828] Oracle MySQL Server CVE-2014-2451 Remote Security Vulnerability
7562| [66823] Oracle MySQL Server CVE-2014-2442 Remote Security Vulnerability
7563| [66153] lighttpd 'mod_mysql_vhost.c' SQL Injection Vulnerability
7564| [65890] InterWorx MySQL Password Information Disclosure Vulnerability
7565| [65621] Percona Toolkit for MySQL Automatic Version Check Information Disclosure Vulnerability
7566| [65298] Oracle MySQL Client 'main()' Function Buffer Overflow Vulnerability
7567| [64908] Oracle MySQL Server CVE-2014-0402 Remote Security Vulnerability
7568| [64904] Oracle MySQL Server CVE-2014-0386 Remote Security Vulnerability
7569| [64898] Oracle MySQL Server CVE-2014-0401 Remote Security Vulnerability
7570| [64897] Oracle MySQL Server CVE-2014-0431 Remote Security Vulnerability
7571| [64896] Oracle MySQL Server CVE-2013-5908 Remote Security Vulnerability
7572| [64895] Oracle MySQL Server CVE-2014-0433 Remote Security Vulnerability
7573| [64893] Oracle MySQL Server CVE-2014-0430 Remote Security Vulnerability
7574| [64891] Oracle MySQL Server CVE-2013-5891 Remote Security Vulnerability
7575| [64888] Oracle MySQL Server CVE-2014-0420 Remote Security Vulnerability
7576| [64885] Oracle MySQL Server CVE-2013-5881 Remote Security Vulnerability
7577| [64880] Oracle MySQL Server CVE-2014-0412 Remote Security Vulnerability
7578| [64877] Oracle MySQL Server CVE-2014-0393 Remote Security Vulnerability
7579| [64873] Oracle MySQL Server CVE-2013-5894 Remote Security Vulnerability
7580| [64868] Oracle MySQL Server CVE-2014-0427 Remote Security Vulnerability
7581| [64864] Oracle MySQL Server CVE-2013-5860 Remote Security Vulnerability
7582| [64854] Oracle MySQL Server CVE-2013-5882 Remote Security Vulnerability
7583| [64849] Oracle MySQL Server CVE-2014-0437 Remote Security Vulnerability
7584| [64731] CSP MySQL User Manager 'login.php' Script SQL Injection Vulnerability
7585| [64630] Zen Cart 'mysql_zencart.sql' Information Disclosure Vulnerability
7586| [63125] Oracle MySQL Server CVE-2012-2750 Remote Security Vulnerability
7587| [63119] Oracle MySQL Server CVE-2013-5770 Remote Security Vulnerability
7588| [63116] Oracle MySQL Server CVE-2013-5793 Remote Security Vulnerability
7589| [63113] Oracle MySQL Server CVE-2013-5767 Remote Security Vulnerability
7590| [63109] Oracle MySQL Server CVE-2013-3839 Remote Security Vulnerability
7591| [63107] Oracle MySQL Server CVE-2013-5786 Remote Security Vulnerability
7592| [63105] Oracle MySQL Server CVE-2013-5807 Remote Security Vulnerability
7593| [62358] Oracle MySQL CVE-2005-2572 Remote Code Execution Vulnerability
7594| [61274] Oracle MySQL Server CVE-2013-3798 Remote Security Vulnerability
7595| [61272] Oracle MySQL Server CVE-2013-3809 Remote Security Vulnerability
7596| [61269] Oracle MySQL Server CVE-2013-3801 Remote Security Vulnerability
7597| [61264] Oracle MySQL Server CVE-2013-3793 Remote Security Vulnerability
7598| [61260] Oracle MySQL Server CVE-2013-3804 Remote Security Vulnerability
7599| [61256] Oracle MySQL Server CVE-2013-3805 Remote Security Vulnerability
7600| [61252] Oracle MySQL Server CVE-2013-3811 Remote Security Vulnerability
7601| [61249] Oracle MySQL Server CVE-2013-3812 Remote Security Vulnerability
7602| [61244] Oracle MySQL Server CVE-2013-3802 Remote Security Vulnerability
7603| [61241] Oracle MySQL Server CVE-2013-3795 Remote Security Vulnerability
7604| [61238] Oracle MySQL Server CVE-2013-3807 Remote Security Vulnerability
7605| [61235] Oracle MySQL Server CVE-2013-3806 Remote Security Vulnerability
7606| [61233] Oracle MySQL Server CVE-2013-3796 Remote Security Vulnerability
7607| [61227] Oracle MySQL Server CVE-2013-3808 Remote Security Vulnerability
7608| [61222] Oracle MySQL Server CVE-2013-3794 Remote Security Vulnerability
7609| [61214] Oracle MySQL Server CVE-2013-3810 Remote Security Vulnerability
7610| [61210] Oracle MySQL Server CVE-2013-3783 Remote Security Vulnerability
7611| [60424] Debian mysql-server CVE-2013-2162 Insecure File Creation Vulnerability
7612| [60001] Wireshark MySQL Dissector Denial of Service Vulnerability
7613| [59242] Oracle MySQL CVE-2013-2391 Local MySQL Server Vulnerability
7614| [59239] Oracle MySQL CVE-2013-1502 Local MySQL Server Vulnerability
7615| [59237] Oracle MySQL CVE-2013-1506 Remote MySQL Server Vulnerability
7616| [59232] Oracle MySQL CVE-2013-1567 Remote MySQL Server Vulnerability
7617| [59229] Oracle MySQL Server CVE-2013-1544 Remote Security Vulnerability
7618| [59227] Oracle MySQL CVE-2013-2376 Remote MySQL Server Vulnerability
7619| [59225] Oracle MySQL CVE-2013-1523 Remote MySQL Server Vulnerability
7620| [59224] Oracle MySQL Server CVE-2013-2392 Remote Security Vulnerability
7621| [59223] Oracle MySQL Server CVE-2013-1548 Remote Security Vulnerability
7622| [59222] RETIRED: Oracle MySQL CVE-2012-5614 Remote MySQL Server Vulnerability
7623| [59218] Oracle MySQL Server CVE-2013-1512 Remote Security Vulnerability
7624| [59217] Oracle MySQL CVE-2013-1526 Remote MySQL Server Vulnerability
7625| [59216] Oracle MySQL CVE-2013-1570 Remote MySQL Server Vulnerability
7626| [59215] Oracle MySQL Server CVE-2013-2381 Remote Security Vulnerability
7627| [59211] Oracle MySQL Server CVE-2013-1532 Remote Security Vulnerability
7628| [59210] Oracle MySQL CVE-2013-1555 Remote MySQL Server Vulnerability
7629| [59209] Oracle MySQL CVE-2013-2375 Remote MySQL Server Vulnerability
7630| [59207] Oracle MySQL Server CVE-2013-2389 Remote Security Vulnerability
7631| [59205] Oracle MySQL Server CVE-2013-1566 Remote Security Vulnerability
7632| [59202] Oracle MySQL CVE-2013-1531 Remote MySQL Server Vulnerability
7633| [59201] Oracle MySQL Server CVE-2013-1511 Remote Security Vulnerability
7634| [59196] Oracle MySQL CVE-2013-1552 Remote MySQL Server Vulnerability
7635| [59188] Oracle MySQL CVE-2013-2378 Remote MySQL Server Vulnerability
7636| [59180] Oracle MySQL CVE-2013-1521 Remote MySQL Server Vulnerability
7637| [59173] Oracle MySQL CVE-2013-2395 Remote MySQL Server Vulnerability
7638| [58511] MySQL and MariaDB Geometry Query Denial Of Service Vulnerability
7639| [57418] Oracle MySQL Server CVE-2013-0386 Remote Security Vulnerability
7640| [57417] Oracle MySQL Server CVE-2013-0389 Remote Security Vulnerability
7641| [57416] Oracle MySQL Server CVE-2013-0384 Remote Security Vulnerability
7642| [57415] Oracle MySQL Server CVE-2013-0371 Remote Security Vulnerability
7643| [57414] Oracle MySQL Server CVE-2012-0574 Remote Security Vulnerability
7644| [57412] Oracle MySQL Server CVE-2013-0385 Local Security Vulnerability
7645| [57411] Oracle MySQL Server CVE-2012-5060 Remote Security Vulnerability
7646| [57410] Oracle MySQL Server CVE-2012-1705 Remote Security Vulnerability
7647| [57408] Oracle MySQL Server CVE-2013-0367 Remote Security Vulnerability
7648| [57405] Oracle MySQL Server CVE-2013-0383 Remote Security Vulnerability
7649| [57400] Oracle MySQL Server CVE-2012-5096 Remote Security Vulnerability
7650| [57397] Oracle MySQL Server CVE-2013-0368 Remote Security Vulnerability
7651| [57391] Oracle MySQL Server CVE-2013-0375 Remote Security Vulnerability
7652| [57388] Oracle MySQL Server CVE-2012-1702 Remote Security Vulnerability
7653| [57385] Oracle MySQL Server CVE-2012-0572 Remote Security Vulnerability
7654| [57334] Oracle MySQL Server CVE-2012-0578 Remote Security Vulnerability
7655| [56837] Oracle MySQL and MariaDB CVE-2012-5627 Insecure Salt Generation Security Bypass Weakness
7656| [56791] Oracle MySQL Remote Code Execution Vulnerability
7657| [56776] Oracle MySQL CVE-2012-5614 Denial of Service Vulnerability
7658| [56772] Oracle MySQL Remote Code Execution Vulnerability
7659| [56771] Oracle MySQL Server Privilege Escalation Vulnerability
7660| [56769] Oracle MySQL and MariaDB 'acl_get()' Buffer Overflow Vulnerability
7661| [56768] Oracle MySQL Server Heap Overflow Vulnerability
7662| [56766] Oracle MySQL Server Username Enumeration Weakness
7663| [56041] Oracle MySQL Server CVE-2012-3173 Remote MySQL Security Vulnerability
7664| [56036] Oracle MySQL Server CVE-2012-3163 Remote MySQL Security Vulnerability
7665| [56028] Oracle MySQL Server CVE-2012-3166 Remote Security Vulnerability
7666| [56027] Oracle MySQL Server CVE-2012-3160 Local Security Vulnerability
7667| [56022] Oracle MySQL Server CVE-2012-3147 Remote Security Vulnerability
7668| [56021] Oracle MySQL Server CVE-2012-3197 Remote Security Vulnerability
7669| [56018] Oracle MySQL Server CVE-2012-3167 Remote Security Vulnerability
7670| [56017] Oracle MySQL Server CVE-2012-3158 Remote Security Vulnerability
7671| [56013] Oracle MySQL Server CVE-2012-3156 Remote Security Vulnerability
7672| [56008] Oracle MySQL Server CVE-2012-3144 Remote Security Vulnerability
7673| [56006] Oracle MySQL Server CVE-2012-3149 Remote Security Vulnerability
7674| [56005] Oracle MySQL Server CVE-2012-3177 Remote Security Vulnerability
7675| [56003] Oracle MySQL Server CVE-2012-3180 Remote Security Vulnerability
7676| [55990] Oracle MySQL Server CVE-2012-3150 Remote Security Vulnerability
7677| [55715] MySQL MyISAM Table Symbolic Link CVE-2012-4452 Local Privilege Escalation Vulnerability
7678| [55120] Oracle MySQL CVE-2012-2749 Denial Of Service Vulnerability
7679| [54551] Oracle MySQL Server CVE-2012-0540 Remote Security Vulnerability
7680| [54549] Oracle MySQL Server CVE-2012-1735 Remote Security Vulnerability
7681| [54547] Oracle MySQL Server CVE-2012-1689 Remote Security Vulnerability
7682| [54540] Oracle MySQL Server CVE-2012-1734 Remote Security Vulnerability
7683| [54526] Oracle MySQL Server CVE-2012-1757 Remote Security Vulnerability
7684| [54524] Oracle MySQL Server CVE-2012-1756 Remote Security Vulnerability
7685| [53922] RETIRED: MySQL and MariaDB 'sql/password.c' Authentication Bypass Vulnerability
7686| [53911] Oracle MySQL CVE-2012-2122 User Login Security Bypass Vulnerability
7687| [53310] MySQLDumper 'menu.php' Remote PHP Code Execution Vulnerability
7688| [53306] MySQLDumper Multiple Security Vulnerabilities
7689| [53074] Oracle MySQL CVE-2012-1690 Remote MySQL Server Vulnerability
7690| [53071] Oracle MySQL CVE-2012-1696 Remote MySQL Server Vulnerability
7691| [53067] Oracle MySQL CVE-2012-1688 Remote MySQL Server Vulnerability
7692| [53064] Oracle MySQL CVE-2012-1697 Remote MySQL Server Vulnerability
7693| [53061] Oracle MySQL CVE-2012-0583 Remote MySQL Server Vulnerability
7694| [53058] Oracle MySQL CVE-2012-1703 Remote MySQL Server Vulnerability
7695| [52931] Oracle MySQL Server Multiple Unspecified Security Vulnerabilities
7696| [52154] RETIRED: MySQL 5.5.20 Unspecified Remote Code Execution Vulnerability
7697| [51925] MySQL Unspecified Remote Code Execution Vulnerability
7698| [51526] Oracle MySQL CVE-2012-0075 Remote MySQL Server Vulnerability
7699| [51525] Oracle MySQL CVE-2012-0493 Remote Vulnerability
7700| [51524] Oracle MySQL Server CVE-2012-0490 Remote Security Vulnerability
7701| [51523] Oracle MySQL Server CVE-2012-0494 Local Security Vulnerability
7702| [51522] Oracle MySQL Server CVE-2012-0495 Remote Security Vulnerability
7703| [51521] Oracle MySQL Server CVE-2012-0117 Remote MySQL Server Vulnerability
7704| [51520] Oracle MySQL Server CVE-2012-0114 Local Security Vulnerability
7705| [51519] Oracle MySQL Server CVE-2012-0112 Remote MySQL Server Vulnerability
7706| [51518] Oracle MySQL Server CVE-2012-0491 Remote Security Vulnerability
7707| [51517] Oracle MySQL CVE-2012-0120 Remote Vulnerability
7708| [51516] Oracle MySQL Server CVE-2012-0492 Remote MySQL Server Vulnerability
7709| [51515] Oracle MySQL Server CVE-2012-0484 Remote Security Vulnerability
7710| [51514] Oracle MySQL Server CVE-2012-0486 Remote Security Vulnerability
7711| [51513] Oracle MySQL Server CVE-2012-0485 Remote Security Vulnerability
7712| [51512] Oracle MySQL CVE-2012-0119 Remote Vulnerability
7713| [51511] Oracle MySQL CVE-2012-0118 Remote MySQL Server Vulnerability
7714| [51510] Oracle MySQL Server CVE-2012-0489 Remote MySQL Server Vulnerability
7715| [51509] Oracle MySQL Server CVE-2012-0087 Remote Security Vulnerability
7716| [51508] Oracle MySQL CVE-2012-0116 Remote MySQL Server Vulnerability
7717| [51507] Oracle MySQL Server CVE-2012-0496 Remote Security Vulnerability
7718| [51506] Oracle MySQL Server CVE-2012-0488 Remote MySQL Server Vulnerability
7719| [51505] Oracle MySQL Server CVE-2012-0101 Remote Security Vulnerability
7720| [51504] Oracle MySQL CVE-2012-0115 Remote Vulnerability
7721| [51503] Oracle MySQL Server CVE-2012-0487 Remote MySQL Server Vulnerability
7722| [51502] Oracle MySQL Server CVE-2012-0102 Remote Security Vulnerability
7723| [51493] Oracle MySQL CVE-2011-2262 Remote MySQL Server Vulnerability
7724| [51488] Oracle MySQL CVE-2012-0113 Remote MySQL Server Vulnerability
7725| [50139] DBD::mysqlPP Unspecified SQL Injection Vulnerability
7726| [48466] MySQLDriverCS SQL Injection Vulnerability
7727| [47919] Zend Framework 'PDO_MySql' Security Bypass Vulnerability
7728| [47871] Oracle MySQL Prior to 5.1.52 Multiple Denial Of Service Vulnerabilities
7729| [47693] DirectAdmin 'mysql_backup' Folder Permissions Information Disclosure Vulnerability
7730| [46655] pywebdav MySQL Authentication Module SQL Injection Vulnerability
7731| [46456] MySQL Eventum 'full_name' Field HTML Injection Vulnerability
7732| [46380] MySQL Eventum Multiple HTML Injection Vulnerabilities
7733| [46056] PHP MySQLi Extension 'set_magic_quotes_runtime' Function Security-Bypass Weakness
7734| [43884] phpFK - PHP Forum Script ohne MySQL 'page_bottom.php' Local File Include Vulnerability
7735| [43677] Oracle MySQL Prior to 5.1.50 Privilege Escalation Vulnerability
7736| [43676] Oracle MySQL Prior to 5.1.51 Multiple Denial Of Service Vulnerabilities
7737| [42646] Oracle MySQL Prior to 5.1.49 'JOIN' Statement Denial Of Service Vulnerability
7738| [42643] Oracle MySQL Prior to 5.1.49 'DDL' Statements Denial Of Service Vulnerability
7739| [42638] Oracle MySQL Prior to 5.1.49 Malformed 'BINLOG' Arguments Denial Of Service Vulnerability
7740| [42633] Oracle MySQL 'HANDLER' interface Denial Of Service Vulnerability
7741| [42625] Oracle MySQL 'LOAD DATA INFILE' Denial Of Service Vulnerability
7742| [42599] Oracle MySQL 'EXPLAIN' Denial Of Service Vulnerability
7743| [42598] Oracle MySQL 'TEMPORARY InnoDB' Tables Denial Of Service Vulnerability
7744| [42596] Oracle MySQL Prior to 5.1.49 'WITH ROLLUP' Denial Of Service Vulnerability
7745| [42586] RETIRED: Oracle MySQL Prior to 5.1.49 Multiple Denial Of Service Vulnerabilities
7746| [42417] Zmanda Recovery Manager for MySQL Multiple Local Privilege Escalation Vulnerabilities
7747| [41440] phpFK - PHP Forum Script ohne MySQL 'upload.php' Arbitrary File Upload Vulnerability
7748| [41198] Oracle MySQL 'ALTER DATABASE' Remote Denial Of Service Vulnerability
7749| [40537] MySQL Enterprise Monitor Multiple Unspecified Cross Site Request Forgery Vulnerabilities
7750| [40506] RETIRED: phpGraphy 'mysql_cleanup.php' Remote File Include Vulnerability
7751| [40461] PHP Mysqlnd Extension Information Disclosure and Multiple Buffer Overflow Vulnerabilities
7752| [40257] Oracle MySQL DROP TABLE MyISAM Symbolic Link Local Security Bypass Vulnerability
7753| [40109] Oracle MySQL 'COM_FIELD_LIST' Command Packet Security Bypass Vulnerability
7754| [40106] Oracle MySQL 'COM_FIELD_LIST' Command Buffer Overflow Vulnerability
7755| [40100] Oracle MySQL Malformed Packet Handling Remote Denial of Service Vulnerability
7756| [40045] Advanced Poll 'mysql_host' Parameter Cross Site Scripting Vulnerability
7757| [39918] FlexAppsStore Flex MySQL Connector Unauthorized Access Vulnerability
7758| [39543] MySQL UNINSTALL PLUGIN Security Bypass Vulnerability
7759| [38642] Timeclock Software 'mysqldump' Local Information Disclosure Vulnerability
7760| [38043] MySQL 'sql/sql_table.cc' CREATE TABLE Security Bypass Vulnerability
7761| [37943] MySQL with yaSSL SSL Certificate Handling Remote Stack Buffer Overflow Vulnerability
7762| [37770] TYPO3 kiddog_mysqldumper Unspecified Information Disclosure Vulnerability
7763| [37640] MySQL 5.0.51a Unspecified Remote Code Execution Vulnerability
7764| [37297] MySQL Multiple Remote Denial Of Service Vulnerabilities
7765| [37076] MySQL OpenSSL Server Certificate yaSSL Security Bypass Vulnerability
7766| [37075] MySQL MyISAM Table Symbolic Link Local Privilege Escalation Vulnerability
7767| [36242] MySQL 5.x Unspecified Buffer Overflow Vulnerability
7768| [35858] MySQL Connector/J Unicode Character String SQL Injection Vulnerability
7769| [35609] MySQL 'sql_parse.cc' Multiple Format String Vulnerabilities
7770| [35514] MySQL Connector/Net SSL Certificate Validation Security Bypass Vulnerability
7771| [33972] MySQL XPath Expression Remote Denial Of Service Vulnerability
7772| [33392] 'mod_auth_mysql' Package Multibyte Character Encoding SQL Injection Vulnerability
7773| [32978] MySQL Calendar 'username' Parameter SQL Injection Vulnerability
7774| [32914] MySQL Calendar Cookie Authentication Bypass Vulnerability
7775| [32157] MySQL Quick Admin 'actions.php' Local File Include Vulnerability
7776| [32000] Agora 'MysqlfinderAdmin.php' Remote File Include Vulnerability
7777| [31517] MySQL Quick Admin 'index.php' Local File Include Vulnerability
7778| [31486] MySQL Command Line Client HTML Special Characters HTML Injection Vulnerability
7779| [31425] PromoteWeb MySQL 'go.php' SQL Injection Vulnerability
7780| [31081] MySQL Empty Binary String Literal Remote Denial Of Service Vulnerability
7781| [30835] mysql-lists Unspecified Cross Site Scripting Vulnerability
7782| [30529] Keld PHP-MySQL News Script 'login.php' SQL Injection Vulnerability
7783| [30383] phpwebnews-mysql Multiple SQL Injection Vulnerabilities
7784| [29106] MySQL MyISAM Table Privileges Secuity Bypass Vulnerability
7785| [29048] GEDCOM_to_MySQL2 Multiple Cross-Site Scripting Vulnerabilities
7786| [28351] MySQL INFORMATION_SCHEMA Remote Denial Of Service Vulnerability
7787| [27938] DSPAM Debian 'libdspam7-drv-mysql' Cron Job MySQL Calls Local Information Disclosure Vulnerability
7788| [27202] PHP Webquest MySQL Credentials Information Disclosure Vulnerability
7789| [27032] PHP MySQL Open Source Help Desk 'form.php' Code Injection Vulnerability
7790| [26947] MySQL Server Unspecified Remote Arbitrary Command Execution Vulnerability
7791| [26832] MySQL Server Privilege Escalation And Denial Of Service Vulnerabilities
7792| [26829] aurora framework Db_mysql.LIB SQL Injection Vulnerability
7793| [26765] MySQL Server RENAME TABLE System Table Overwrite Vulnerability
7794| [26353] MySQL Server InnoDB CONVERT_SEARCH_MODE_TO_INNOBASE Function Denial Of Service Vulnerability
7795| [26304] AdventNet EventLog Analyzer Insecure Default MySQL Password Unauthorized Access Vulnerability
7796| [26156] Bacula MySQL Password Information Disclosure Vulnerability
7797| [26095] Asterisk 'asterisk-addons' CDR_ADDON_MYSQL Module SQL Injection Vulnerability
7798| [25017] MySQL Access Validation and Denial of Service Vulnerabilities
7799| [24759] MySQLDumper Apache Access Control Authentication Bypass Vulnerability
7800| [24016] MySQL Rename Table Function Access Validation Vulnerability
7801| [24011] MySQL Security Invoker Privilege Escalation Vulnerability
7802| [24008] MySQL Alter Table Function Information Disclosure Vulnerability
7803| [23911] MySQL IF Query Handling Remote Denial Of Service Vulnerability
7804| [23176] Eve-Nuke Forums MySQL.PHP Remote File Include Vulnerability
7805| [22941] MySQL Commander Remote File Include Vulnerability
7806| [22900] MySQL Single Row SubSelect Remote Denial Of Service Vulnerability
7807| [22474] CPanel PassWDMySQL Cross-Site Scripting Vulnerability
7808| [22431] MySQLNewsEngine Affichearticles.PHP3 Remote File Include Vulnerability
7809| [20460] MySQLDumper SQL.PHP Cross-Site Scripting Vulnerability
7810| [20222] PABugs Class.MySQL.PHP Remote File Include Vulnerability
7811| [20165] ZoomStats MySQL.PHP Remote File Include Vulnerability
7812| [19794] MySQL Multiupdate and Subselects Denial Of Service Vulnerability
7813| [19559] MySQL Privilege Elevation and Security Bypass Vulnerabilities
7814| [19279] MySQL MERGE Privilege Revoke Bypass Vulnerability
7815| [19240] Banex PHP MySQL Banner Exchange Multiple Remote Vulnerabilities
7816| [19032] MySQL Server Date_Format Denial Of Service Vulnerability
7817| [18717] PHP/MySQL Classifieds AddAsset1.PHP Multiple HTML Injection Vulnerabilities
7818| [18439] MySQL Server Str_To_Date Remote Denial Of Service Vulnerability
7819| [18219] MySQL Mysql_real_escape Function SQL Injection Vulnerability
7820| [17780] MySQL Remote Information Disclosure and Buffer Overflow Vulnerabilities
7821| [17224] Cholod MySQL Based Message Board Mb.CGI SQL Injection Vulnerability
7822| [17223] Cholod MySQL Based Message Board Multiple HTML Injection Vulnerabilities
7823| [17147] Woltlab Burning Board Class_DB_MySQL.PHP Cross-Site Scripting Vulnerability
7824| [16850] MySQL Query Logging Bypass Vulnerability
7825| [16620] PHP/MYSQL Timesheet Multiple SQL Injection Vulnerabilities
7826| [16564] PAM-MySQL Code Execution And Denial Of Service Vulnerabilities
7827| [16219] PHP MySQLI Error Logging Remote Format String Vulnerability
7828| [16145] PHP MySQL_Connect Remote Buffer Overflow Vulnerability
7829| [15852] MySQL Auction Search Module Cross-Site Scripting Vulnerability
7830| [14509] MySQL User-Defined Function Buffer Overflow Vulnerability
7831| [14437] MySQL Eventum Multiple SQL Injection Vulnerabilities
7832| [14436] MySQL Eventum Multiple Cross-Site Scripting Vulnerabilities
7833| [13913] xMySQLadmin Insecure Temporary File Creation Vulnerability
7834| [13660] MySQL mysql_install_db Insecure Temporary File Creation Vulnerability
7835| [13378] MySQL MaxDB WebDAV IF Parameter Remote Buffer Overflow Vulnerability
7836| [13369] MySQL MaxDB WebDAV Lock Token Remote Buffer Overflow Vulnerability
7837| [13368] MySQL MaxDB HTTP GET Request Remote Buffer Overflow Vulnerability
7838| [12805] MySQL MaxDB WebAgent Input Validation Multiple Remote Denial Of Service Vulnerabilities
7839| [12781] MySQL AB MySQL Multiple Remote Vulnerabilities
7840| [12313] MySQL MaxDB WebAgent Remote Denial of Service Vulnerabilities
7841| [12277] MySQL Database MySQLAccess Local Insecure Temporary File Creation Vulnerability
7842| [12265] MySQL MaxDB WebAgent WebSQL Password Parameter Remote Buffer Overflow Vulnerability
7843| [12133] MySQL Eventum Multiple Input Validation Vulnerabilities
7844| [11844] MySQL MaxDB WebDav Handler Overwrite Header Remote Buffer Overflow Vulnerability
7845| [11843] MySQL MaxDB WAHTTP Server Remote Denial Of Service Vulnerability
7846| [11435] MySQL Database Unauthorized GRANT Privilege Vulnerability
7847| [11432] MySQL Remote FULLTEXT Search Denial Of Service Vulnerability
7848| [11357] MySQL Multiple Local Vulnerabilities
7849| [11346] MySQL MaxDB WebDBM Server Name Denial of Service Vulnerability
7850| [11291] MySQL Unspecified Insecure Temporary File Creation Vulnerability
7851| [11261] MySQL Bounded Parameter Statement Execution Remote Buffer Overflow Vulnerability
7852| [11234] AllWebScripts MySQLGuest HTML Injection Vulnerability
7853| [10986] Ben Yacoub Hatem MySQL Backup Pro Undisclosed 'getbackup()' Vulnerability
7854| [10981] MySQL Mysql_real_connect Function Potential Remote Buffer Overflow Vulnerability
7855| [10969] MySQL Mysqlhotcopy Script Insecure Temporary File Creation Vulnerability
7856| [10655] MySQL Password Length Remote Buffer Overflow Vulnerability
7857| [10654] MySQL Authentication Bypass Vulnerability
7858| [10142] MySQL MYSQLD_Multi Insecure Temporary File Creation Vulnerability
7859| [9976] MySQL Aborted Bug Report Insecure Temporary File Creation Vulnerability
7860| [8796] MySQL Multiple Vulnerabilities
7861| [8590] MySQL Password Handler Buffer Overflow Vulnerability
7862| [8245] MySQL AB ODBC Driver Plain Text Password Vulnerability
7863| [7887] MySQL libmysqlclient Library mysql_real_connect() Buffer Overrun Vulnerability
7864| [7500] MySQL Weak Password Encryption Vulnerability
7865| [7052] MySQL mysqld Privilege Escalation Vulnerability
7866| [7041] MySQL Control Center Insecure Default File Permission Vulnerability
7867| [6718] MySQL Double Free Heap Corruption Vulnerability
7868| [6375] MySQL COM_CHANGE_USER Password Memory Corruption Vulnerability
7869| [6374] MySQL libmysqlclient Library Read_One_Row Buffer Overflow Vulnerability
7870| [6373] MySQL COM_CHANGE_USER Password Length Account Compromise Vulnerability
7871| [6370] MySQL libmysqlclient Library Read_Rows Buffer Overflow Vulnerability
7872| [6368] MySQL COM_TABLE_DUMP Memory Corruption Vulnerability
7873| [5948] PHPRank MySQL Error Unauthorized Access Vulnerability
7874| [5853] MySQL DataDir Parameter Local Buffer Overflow Vulnerability
7875| [5513] MySQL Logging Not Enabled Weak Default Configuration Vulnerability
7876| [5511] MySQL Bind Address Not Enabled Weak Default Configuration Vulnerability
7877| [5503] MySQL Null Root Password Weak Default Configuration Vulnerability
7878| [4409] Cyrus SASL LDAP+MySQL Authentication Patch SQL Command Execution Vulnerability
7879| [4026] PHP MySQL Safe_Mode Filesystem Circumvention Vulnerability
7880| [3907] Conectiva Linux MySQL World Readable Log File Vulnerability
7881| [3381] WinMySQLadmin Plain Text Password Storage Vulnerability
7882| [3284] Inter7 vpopmail MySQL Authentication Data Recovery Vulnerability
7883| [3255] Apache mod_auth_mysql Remote SQL Query Manipulation Vulnerability
7884| [2522] MySQL Root Operation Symbolic Link File Overwriting Vulnerability
7885| [2380] MySQL SHOW GRANTS Pasword Hash Disclosure Vulnerability
7886| [2262] Mysql Local Buffer Overflow Vulnerability
7887| [1850] pam_mysql Authentication Input Validation Vulnerability
7888| [1826] MySQL Authentication Algorithm Vulnerability
7889| [1557] PCCS Mysql Database Admin Tool Username/Password Exposure Vulnerability
7890| [975] MySQL Unauthenticated Remote Access Vulnerability
7891| [926] MySQL GRANT Global Password Changing Vulnerability
7892|
7893| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7894| [85724] Oracle MySQL Server XA Transactions denial of service
7895| [85723] Oracle MySQL Server Server Replication denial of service
7896| [85722] Oracle MySQL Server InnoDB denial of service
7897| [85721] Oracle MySQL Server Server Privileges unspecified
7898| [85720] Oracle MySQL Server Server Partition denial of service
7899| [85719] Oracle MySQL Server Server Parser denial of service
7900| [85718] Oracle MySQL Server Server Options denial of service
7901| [85717] Oracle MySQL Server Server Options denial of service
7902| [85716] Oracle MySQL Server Server Optimizer denial of service
7903| [85715] Oracle MySQL Server Server Optimizer denial of service
7904| [85714] Oracle MySQL Server Prepared Statements denial of service
7905| [85713] Oracle MySQL Server InnoDB denial of service
7906| [85712] Oracle MySQL Server Full Text Search denial of service
7907| [85711] Oracle MySQL Server Data Manipulation Language denial of service
7908| [85710] Oracle MySQL Server Data Manipulation Language denial of service
7909| [85709] Oracle MySQL Server Audit Log unspecified
7910| [85708] Oracle MySQL Server MemCached unspecified
7911| [84846] Debian mysql-server package information disclosure
7912| [84375] Wireshark MySQL dissector denial of service
7913| [83554] Oracle MySQL Server Server Partition denial of service
7914| [83553] Oracle MySQL Server Server Locking denial of service
7915| [83552] Oracle MySQL Server Server Install unspecified
7916| [83551] Oracle MySQL Server Server Types denial of service
7917| [83550] Oracle MySQL Server Server Privileges unspecified
7918| [83549] Oracle MySQL Server InnoDB denial of service
7919| [83548] Oracle MySQL Server InnoDB denial of service
7920| [83547] Oracle MySQL Server Data Manipulation Language denial of service
7921| [83546] Oracle MySQL Server Stored Procedure denial of service
7922| [83545] Oracle MySQL Server Server Replication denial of service
7923| [83544] Oracle MySQL Server Server Partition denial of service
7924| [83543] Oracle MySQL Server Server Optimizer denial of service
7925| [83542] Oracle MySQL Server InnoDB denial of service
7926| [83541] Oracle MySQL Server Information Schema denial of service
7927| [83540] Oracle MySQL Server Data Manipulation Language denial of service
7928| [83539] Oracle MySQL Server Data Manipulation Language denial of service
7929| [83538] Oracle MySQL Server Server Optimizer unspecified
7930| [83537] Oracle MySQL Server MemCached denial of service
7931| [83536] Oracle MySQL Server Server Privileges unspecified
7932| [83535] Oracle MySQL Server Server Privileges unspecified
7933| [83534] Oracle MySQL Server Server unspecified
7934| [83533] Oracle MySQL Server Information Schema unspecified
7935| [83532] Oracle MySQL Server Server Locking unspecified
7936| [83531] Oracle MySQL Server Data Manipulation Language denial of service
7937| [83388] MySQL administrative login attempt detected
7938| [82963] Mambo MySQL database information disclosure
7939| [82946] Oracle MySQL buffer overflow
7940| [82945] Oracle MySQL buffer overflow
7941| [82895] Oracle MySQL and MariaDB geometry queries denial of service
7942| [81577] MySQL2JSON extension for TYPO3 unspecified SQL injection
7943| [81325] Oracle MySQL Server Server Privileges denial of service
7944| [81324] Oracle MySQL Server Server Partition denial of service
7945| [81323] Oracle MySQL Server Server Optimizer denial of service
7946| [81322] Oracle MySQL Server Server Optimizer denial of service
7947| [81321] Oracle MySQL Server Server denial of service
7948| [81320] Oracle MySQL Server MyISAM denial of service
7949| [81319] Oracle MySQL Server InnoDB denial of service
7950| [81318] Oracle MySQL Server InnoDB denial of service
7951| [81317] Oracle MySQL Server Server Locking denial of service
7952| [81316] Oracle MySQL Server Server denial of service
7953| [81315] Oracle MySQL Server Server Replication unspecified
7954| [81314] Oracle MySQL Server Server Replication unspecified
7955| [81313] Oracle MySQL Server Stored Procedure denial of service
7956| [81312] Oracle MySQL Server Server Optimizer denial of service
7957| [81311] Oracle MySQL Server Information Schema denial of service
7958| [81310] Oracle MySQL Server GIS Extension denial of service
7959| [80790] Oracle MySQL yaSSL buffer overflow
7960| [80553] Oracle MySQL and MariaDB salt security bypass
7961| [80443] Oracle MySQL Server unspecified code execution
7962| [80442] Oracle MySQL Server acl_get() buffer overflow
7963| [80440] Oracle MySQL Server table buffer overflow
7964| [80435] Oracle MySQL Server database privilege escalation
7965| [80434] Oracle MySQL Server COM_BINLOG_DUMP denial of service
7966| [80433] Oracle MySQL Server Stuxnet privilege escalation
7967| [80432] Oracle MySQL Server authentication information disclosure
7968| [79394] Oracle MySQL Server Server Installation information disclosure
7969| [79393] Oracle MySQL Server Server Replication denial of service
7970| [79392] Oracle MySQL Server Server Full Text Search denial of service
7971| [79391] Oracle MySQL Server Server denial of service
7972| [79390] Oracle MySQL Server Client information disclosure
7973| [79389] Oracle MySQL Server Server Optimizer denial of service
7974| [79388] Oracle MySQL Server Server Optimizer denial of service
7975| [79387] Oracle MySQL Server Server denial of service
7976| [79386] Oracle MySQL Server InnoDB Plugin denial of service
7977| [79385] Oracle MySQL Server InnoDB denial of service
7978| [79384] Oracle MySQL Server Client unspecified
7979| [79383] Oracle MySQL Server Server denial of service
7980| [79382] Oracle MySQL Server Protocol unspecified
7981| [79381] Oracle MySQL Server Information Schema unspecified
7982| [78954] SilverStripe MySQLDatabase.php information disclosure
7983| [78948] MySQL MyISAM table symlink
7984| [77865] MySQL unknown vuln
7985| [77864] MySQL sort order denial of service
7986| [77768] MySQLDumper refresh_dblist.php information disclosure
7987| [77177] MySQL Squid Access Report unspecified cross-site scripting
7988| [77065] Oracle MySQL Server Optimizer denial of service
7989| [77064] Oracle MySQL Server Optimizer denial of service
7990| [77063] Oracle MySQL Server denial of service
7991| [77062] Oracle MySQL InnoDB denial of service
7992| [77061] Oracle MySQL GIS Extension denial of service
7993| [77060] Oracle MySQL Server Optimizer denial of service
7994| [76189] MySQL unspecified error
7995| [76188] MySQL attempts security bypass
7996| [75287] MySQLDumper restore.php information disclosure
7997| [75286] MySQLDumper filemanagement.php directory traversal
7998| [75285] MySQLDumper main.php cross-site request forgery
7999| [75284] MySQLDumper install.php cross-site scripting
8000| [75283] MySQLDumper install.php file include
8001| [75282] MySQLDumper menu.php code execution
8002| [75022] Oracle MySQL Server Server Optimizer denial of service
8003| [75021] Oracle MySQL Server Server Optimizer denial of service
8004| [75020] Oracle MySQL Server Server DML denial of service
8005| [75019] Oracle MySQL Server Partition denial of service
8006| [75018] Oracle MySQL Server MyISAM denial of service
8007| [75017] Oracle MySQL Server Server Optimizer denial of service
8008| [74672] Oracle MySQL Server multiple unspecified
8009| [73092] MySQL unspecified code execution
8010| [72540] Oracle MySQL Server denial of service
8011| [72539] Oracle MySQL Server unspecified
8012| [72538] Oracle MySQL Server denial of service
8013| [72537] Oracle MySQL Server denial of service
8014| [72536] Oracle MySQL Server unspecified
8015| [72535] Oracle MySQL Server denial of service
8016| [72534] Oracle MySQL Server denial of service
8017| [72533] Oracle MySQL Server denial of service
8018| [72532] Oracle MySQL Server denial of service
8019| [72531] Oracle MySQL Server denial of service
8020| [72530] Oracle MySQL Server denial of service
8021| [72529] Oracle MySQL Server denial of service
8022| [72528] Oracle MySQL Server denial of service
8023| [72527] Oracle MySQL Server denial of service
8024| [72526] Oracle MySQL Server denial of service
8025| [72525] Oracle MySQL Server information disclosure
8026| [72524] Oracle MySQL Server denial of service
8027| [72523] Oracle MySQL Server denial of service
8028| [72522] Oracle MySQL Server denial of service
8029| [72521] Oracle MySQL Server denial of service
8030| [72520] Oracle MySQL Server denial of service
8031| [72519] Oracle MySQL Server denial of service
8032| [72518] Oracle MySQL Server unspecified
8033| [72517] Oracle MySQL Server unspecified
8034| [72516] Oracle MySQL Server unspecified
8035| [72515] Oracle MySQL Server denial of service
8036| [72514] Oracle MySQL Server unspecified
8037| [71965] MySQL port denial of service
8038| [70680] DBD::mysqlPP unspecified SQL injection
8039| [70370] TaskFreak! multi-mysql unspecified path disclosure
8040| [68799] mod_authnz_external module for Apache mysql-auth.pl SQL injection
8041| [68294] MySQLDriverCS statement.cs sql injection
8042| [68175] Prosody MySQL denial of service
8043| [67539] Zend Framework MySQL PDO security bypass
8044| [67254] DirectAdmin MySQL information disclosure
8045| [66567] Xoops mysql.sql information disclosure
8046| [65871] PyWebDAV MySQLAuthHandler class SQL injection
8047| [65543] MySQL Select Arbitrary data into a File
8048| [65529] MySQL Eventum full_name field cross-site scripting
8049| [65380] Oracle MySQL Eventum forgot_password.php cross-site scripting
8050| [65379] Oracle MySQL Eventum list.php cross-site scripting
8051| [65266] Accellion File Transfer Appliance MySQL default password
8052| [64878] MySQL Geometry denial of service
8053| [64877] MySQL EXPLAIN EXTENDED denial of service
8054| [64876] MySQL prepared statement denial of service
8055| [64845] MySQL extreme-value denial of service
8056| [64844] MySQL Gis_line_string::init_from_wkb denial of service
8057| [64843] MySQL user-variable denial of service
8058| [64842] MySQL view preparation denial of service
8059| [64841] MySQL prepared statement denial of service
8060| [64840] MySQL LONGBLOB denial of service
8061| [64839] MySQL invocations denial of service
8062| [64838] MySQL Gis_line_string::init_from_wkb denial of service
8063| [64689] MySQL dict0crea.c denial of service
8064| [64688] MySQL SET column denial of service
8065| [64687] MySQL BINLOG command denial of service
8066| [64686] MySQL InnoDB denial of service
8067| [64685] MySQL HANDLER interface denial of service
8068| [64684] MySQL Item_singlerow_subselect::store denial of service
8069| [64683] MySQL OK packet denial of service
8070| [63518] MySQL Query Browser GUI Tools information disclosure
8071| [63517] MySQL Administrator GUI Tools information disclosure
8072| [62272] MySQL PolyFromWKB() denial of service
8073| [62269] MySQL LIKE predicates denial of service
8074| [62268] MySQL joins denial of service
8075| [62267] MySQL GREATEST() or LEAST() denial of service
8076| [62266] MySQL GROUP_CONCAT() denial of service
8077| [62265] MySQL expression values denial of service
8078| [62264] MySQL temporary table denial of service
8079| [62263] MySQL LEAST() or GREATEST() denial of service
8080| [62262] MySQL replication privilege escalation
8081| [61739] MySQL WITH ROLLUP denial of service
8082| [61343] MySQL LOAD DATA INFILE denial of service
8083| [61342] MySQL EXPLAIN denial of service
8084| [61341] MySQL HANDLER denial of service
8085| [61340] MySQL BINLOG denial of service
8086| [61339] MySQL IN() or CASE denial of service
8087| [61338] MySQL SET denial of service
8088| [61337] MySQL DDL denial of service
8089| [61318] PHP mysqlnd_wireprotocol.c buffer overflow
8090| [61317] PHP php_mysqlnd_read_error_from_line buffer overflow
8091| [61316] PHP php_mysqlnd_auth_write buffer overflow
8092| [61274] MySQL TEMPORARY InnoDB denial of service
8093| [59905] MySQL ALTER DATABASE denial of service
8094| [59841] CMySQLite updateUser.php cross-site request forgery
8095| [59112] MySQL Enterprise Monitor unspecified cross-site request forgery
8096| [59075] PHP php_mysqlnd_auth_write() buffer overflow
8097| [59074] PHP php_mysqlnd_read_error_from_line() buffer overflow
8098| [59073] PHP php_mysqlnd_rset_header_read() buffer overflow
8099| [59072] PHP php_mysqlnd_ok_read() information disclosure
8100| [58842] MySQL DROP TABLE file deletion
8101| [58676] Template Shares MySQL information disclosure
8102| [58531] MySQL COM_FIELD_LIST buffer overflow
8103| [58530] MySQL packet denial of service
8104| [58529] MySQL COM_FIELD_LIST security bypass
8105| [58311] ClanSphere the captcha generator and MySQL driver SQL injection
8106| [57925] MySQL UNINSTALL PLUGIN security bypass
8107| [57006] Quicksilver Forums mysqldump information disclosure
8108| [56800] Employee Timeclock Software mysqldump information disclosure
8109| [56200] Flex MySQL Connector ActionScript SQL injection
8110| [55877] MySQL yaSSL buffer overflow
8111| [55622] kiddog_mysqldumper extension for TYPO3 information disclosure
8112| [55416] MySQL unspecified buffer overflow
8113| [55382] Ublog UblogMySQL.sql information disclosure
8114| [55251] PHP-MySQL-Quiz editquiz.php SQL injection
8115| [54597] MySQL sql_table.cc security bypass
8116| [54596] MySQL mysqld denial of service
8117| [54365] MySQL OpenSSL security bypass
8118| [54364] MySQL MyISAM table symlink
8119| [53950] The mysql-ocaml mysql_real_escape_string weak security
8120| [52978] Zmanda Recovery Manager for MySQL mysqlhotcopy privilege escalation
8121| [52977] Zmanda Recovery Manager for MySQL socket-server.pl command execution
8122| [52660] iScouter PHP Web Portal MySQL Password Retrieval
8123| [52220] aa33code mysql.inc information disclosure
8124| [52122] MySQL Connector/J unicode SQL injection
8125| [51614] MySQL dispatch_command() denial of service
8126| [51406] MySQL Connector/NET SSL spoofing
8127| [49202] MySQL UDF command execution
8128| [49050] MySQL XPath denial of service
8129| [48919] Cisco Application Networking Manager MySQL default account password
8130| [48163] libapache2-mod-auth-mysql module for Debian multibyte encoding SQL injection
8131| [47544] MySQL Calendar index.php SQL injection
8132| [47476] MySQL Calendar index.php nodstrumCalendarV2 security bypass
8133| [45649] MySQL MyISAM symlink security bypass
8134| [45648] MySQL MyISAM symlinks security bypass
8135| [45607] MySQL Quick Admin actions.php file include
8136| [45606] MySQL Quick Admin index.php file include
8137| [45590] MySQL command-line client cross-site scripting
8138| [45436] PromoteWeb MySQL go.php SQL injection
8139| [45042] MySQL empty bit-string literal denial of service
8140| [44662] mysql-lists unspecified cross-site scripting
8141| [42267] MySQL MyISAM security bypass
8142| [42211] GEDCOM_to_MySQL2 index.php, info.php and prenom.php cross-site scripting
8143| [42014] miniBB setup_mysql.php and setup_options.php SQL injection
8144| [40920] MySQL sql_select.cc denial of service
8145| [40734] MySQL Server BINLOG privilege escalation
8146| [40350] MySQL password information disclosure
8147| [39415] Debian GNU/Linux libdspam7-drv-mysql cron job password disclosure
8148| [39402] PHP LOCAL INFILE and MySQL extension security bypass
8149| [38999] aurora framework db_mysql.lib SQL injection
8150| [38990] MySQL federated engine denial of service
8151| [38989] MySQL DEFINER value privilege escalation
8152| [38988] MySQL DATA DIRECTORY and INDEX DIRECTORY privilege escalation
8153| [38964] MySQL RENAME TABLE symlink
8154| [38733] ManageEngine EventLog Analyzer MySQL default password
8155| [38284] MySQL ha_innodb.cc convert_search_mode_to_innobase() denial of service
8156| [38189] MySQL default root password
8157| [37235] Asterisk-Addons cdr_addon_mysql module SQL injection
8158| [37099] RHSA update for MySQL case sensistive database name privilege escalation not installed
8159| [36555] PHP MySQL extension multiple functions security bypass
8160| [35960] MySQL view privilege escalation
8161| [35959] MySQL CREATE TABLE LIKE information disclosure
8162| [35958] MySQL connection protocol denial of service
8163| [35291] MySQLDumper main.php security bypass
8164| [34811] MySQL udf_init and mysql_create_function command execution
8165| [34809] MySQL mysql_update privilege escalation
8166| [34349] MySQL ALTER information disclosure
8167| [34348] MySQL mysql_change_db privilege escalation
8168| [34347] MySQL RENAME TABLE weak security
8169| [34232] MySQL IF clause denial of service
8170| [33388] Advanced Website Creator (AWC) mysql_escape_string SQL injection
8171| [33285] Eve-Nuke mysql.php file include
8172| [32957] MySQL Commander dbopen.php file include
8173| [32933] cPanel load_language.php and mysqlconfig.php file include
8174| [32911] MySQL filesort function denial of service
8175| [32462] cPanel passwdmysql cross-site scripting
8176| [32288] RHSA-2006:0544 updates for mysql not installed
8177| [32266] MySQLNewsEngine affichearticles.php3 file include
8178| [31244] The Address Book MySQL export.php password information disclosure
8179| [31037] Php/Mysql Site Builder (PHPBuilder) htm2php.php directory traversal
8180| [30760] BTSaveMySql URL file disclosure
8181| [30191] StoryStream mysql.php and mysqli.php file include
8182| [30085] MySQL MS-DOS device name denial of service
8183| [30031] Agora MysqlfinderAdmin.php file include
8184| [29438] MySQLDumper mysqldumper_path/sql.php cross-site scripting
8185| [29179] paBugs class.mysql.php file include
8186| [29120] ZoomStats MySQL file include
8187| [28448] MySQL case sensitive database name privilege escalation
8188| [28442] MySQL GRANT EXECUTE privilege escalation
8189| [28387] FunkBoard admin/mysql_install.php and admin/pg_install.php unauthorized access
8190| [28202] MySQL multiupdate subselect query denial of service
8191| [28180] MySQL MERGE table security bypass
8192| [28176] PHP MySQL Banner Exchange lib.inc information disclosure
8193| [27995] Opsware Network Automation System MySQL plaintext password
8194| [27904] MySQL date_format() format string
8195| [27635] MySQL Instance Manager denial of service
8196| [27212] MySQL SELECT str_to_date denial of service
8197| [26875] MySQL ASCII escaping SQL injection
8198| [26420] Apple Mac OS X MySQL Manager blank password
8199| [26236] MySQL login packet information disclosure
8200| [26232] MySQL COM_TABLE_DUMP buffer overflow
8201| [26228] MySQL sql_parce.cc information disclosure
8202| [26042] MySQL running
8203| [25313] WoltLab Burning Board class_db_mysql.php cross-site scripting
8204| [24966] MySQL mysql_real_query logging bypass
8205| [24653] PAM-MySQL logging function denial of service
8206| [24652] PAM-MySQL authentication double free code execution
8207| [24567] PHP/MYSQL Timesheet index.php and changehrs.php SQL injection
8208| [24095] PHP ext/mysqli exception handling format string
8209| [23990] PHP mysql_connect() buffer overflow
8210| [23596] MySQL Auction search module could allow cross-site scripting
8211| [22642] RHSA-2005:334 updates for mysql not installed
8212| [21757] MySQL UDF library functions command execution
8213| [21756] MySQL LoadLibraryEx function denial of service
8214| [21738] MySQL UDF mysql_create_function function directory traversal
8215| [21737] MySQL user defined function buffer overflow
8216| [21640] MySQL Eventum multiple class SQL injection
8217| [21638] MySQL Eventum multiple scripts cross-site scripting
8218| [20984] xmysqladmin temporary file symlink
8219| [20656] MySQL mysql_install_db script symlink
8220| [20333] Plans MySQL password information disclosure
8221| [19659] MySQL CREATE TEMPORARY TABLE command creates insecure files
8222| [19658] MySQL udf_init function gain access
8223| [19576] auraCMS mysql_fetch_row function path disclosure
8224| [18922] MySQL mysqlaccess script symlink attack
8225| [18824] MySQL UDF root privileges
8226| [18464] mysql_auth unspecified vulnerability
8227| [18449] Sugar Sales plaintext MySQL password
8228| [17783] MySQL underscore allows elevated privileges
8229| [17768] MySQL MATCH ... AGAINST SQL statement denial of service
8230| [17667] MySQL UNION change denial of service
8231| [17666] MySQL ALTER TABLE RENAME bypass restriction
8232| [17493] MySQL libmysqlclient bulk inserts buffer overflow
8233| [17462] MySQLGuest AWSguest.php script cross-site scripting
8234| [17047] MySQL mysql_real_connect buffer overflow
8235| [17030] MySQL mysqlhotcopy insecure temporary file
8236| [16612] MySQL my_rnd buffer overflow
8237| [16604] MySQL check_scramble_323 function allows unauthorized access
8238| [15883] MySQL mysqld_multi script symlink attack
8239| [15617] MySQL mysqlbug script symlink attack
8240| [15417] Confixx db_mysql_loeschen2.php SQL injection
8241| [15280] Proofpoint Protection Server MySQL allows unauthorized access
8242| [13404] HP Servicecontrol Manager multiple vulnerabilities in MySQL could allow execution of code
8243| [13153] MySQL long password buffer overflow
8244| [12689] MySQL AB ODBC Driver stores ODBC passwords and usernames in plain text
8245| [12540] Teapop PostSQL and MySQL modules SQL injection
8246| [12337] MySQL mysql_real_connect function buffer overflow
8247| [11510] MySQL datadir/my.cnf modification could allow root privileges
8248| [11493] mysqlcc configuration and connection files are world writable
8249| [11340] SuckBot mod_mysql_logger denial of service
8250| [11199] MySQL mysql_change_user() double-free memory pointer denial of service
8251| [10850] MySQL libmysql client read_one_row buffer overflow
8252| [10849] MySQL libmysql client read_rows buffer overflow
8253| [10848] MySQL COM_CHANGE_USER password buffer overflow
8254| [10847] MySQL COM_CHANGE_USER command password authentication bypass
8255| [10846] MySQL COM_TABLE_DUMP unsigned integer denial of service
8256| [10483] Bugzilla stores passwords in plain text in the MySQL database
8257| [10455] gBook MySQL could allow administrative access
8258| [10243] MySQL my.ini "
8259| [9996] MySQL SHOW GRANTS command discloses adminstrator`s encrypted password
8260| [9909] MySQL logging disabled by default on Windows
8261| [9908] MySQL binding to the loopback adapter is disabled
8262| [9902] MySQL default root password could allow unauthorized access
8263| [8748] Cyrus SASL LDAP+MySQL patch allows user unauthorized POP access
8264| [8105] PHP MySQL client library allows an attacker to bypass safe_mode restrictions
8265| [7923] Conectiva Linux MySQL /var/log/mysql file has insecure permissions
8266| [7206] WinMySQLadmin stores MySQL password in plain text
8267| [6617] MySQL "
8268| [6419] MySQL drop database command buffer overflow
8269| [6418] MySQL libmysqlclient.so buffer overflow
8270| [5969] MySQL select buffer overflow
8271| [5447] pam_mysql authentication input
8272| [5409] MySQL authentication algorithm obtain password hash
8273| [5057] PCCS MySQL Database Admin Tool could reveal username and password
8274| [4228] MySQL unauthenticated remote access
8275| [3849] MySQL default test account could allow any user to connect to the database
8276| [1568] MySQL creates readable log files
8277|
8278| Exploit-DB - https://www.exploit-db.com:
8279| [30744] MySQL <= 5.1.23 Server InnoDB CONVERT_SEARCH_MODE_TO_INNOBASE Function Denial Of Service Vulnerability
8280| [30677] Asterisk 'asterisk-addons' 1.2.7/1.4.3 CDR_ADDON_MYSQL Module SQL Injection Vulnerability
8281| [30020] MySQL 5.0.x - IF Query Handling Remote Denial of Service Vulnerability
8282| [29724] MySQL 5.0.x Single Row SubSelect Remote Denial of Service Vulnerability
8283| [29653] Active Calendar 1.2 data/mysqlevents.php css Parameter XSS
8284| [29572] CPanel <= 11 PassWDMySQL Cross-Site Scripting Vulnerability
8285| [29569] MySQLNewsEngine Affichearticles.PHP3 Remote File Include Vulnerability
8286| [28783] MySQLDumper 1.21 SQL.PHP Cross-Site Scripting Vulnerability
8287| [28398] MySQL 4/5 SUID Routine Miscalculation Arbitrary DML Statement Execution
8288| [28308] Banex PHP MySQL Banner Exchange 2.21 members.php cfg_root Parameter Remote File Inclusion
8289| [28307] Banex PHP MySQL Banner Exchange 2.21 admin.php Multiple Parameter SQL Injection
8290| [28306] Banex PHP MySQL Banner Exchange 2.21 signup.php site_name Parameter SQL Injection
8291| [28234] MySQL 4.x/5.x Server Date_Format Denial of Service Vulnerability
8292| [28026] MySQL Server 4/5 Str_To_Date Remote Denial of Service Vulnerability
8293| [27464] Cholod MySQL Based Message Board Mb.CGI SQL Injection Vulnerability
8294| [27444] Woltlab Burning Board 2.3.4 Class_DB_MySQL.PHP Cross-Site Scripting Vulnerability
8295| [27326] MySQL 5.0.18 Query Logging Bypass Vulnerability
8296| [26058] MySQL AB Eventum 1.x get_jsrs_data.php F Parameter XSS
8297| [26057] MySQL AB Eventum 1.x list.php release Parameter XSS
8298| [26056] MySQL AB Eventum 1.x view.php id Parameter XSS
8299| [25211] MySQL 4.x CREATE TEMPORARY TABLE Symlink Privilege Escalation
8300| [25210] MySQL 4.x CREATE FUNCTION mysql.func Table Arbitrary Library Injection
8301| [25209] MySQL 4.x CREATE FUNCTION Arbitrary libc Code Execution
8302| [24805] MySQL MaxDB 7.5 WAHTTP Server Remote Denial of Service Vulnerability
8303| [24669] MySQL 3.x/4.x ALTER TABLE/RENAME Forces Old Permission Checks
8304| [24250] MySQL 4.1/5.0 Authentication Bypass Vulnerability
8305| [23179] Oracle MySQL for Microsoft Windows MOF Execution
8306| [23138] MySQL 3.23.x/4.0.x Password Handler Buffer Overflow Vulnerability
8307| [23083] MySQL Windows Remote System Level Exploit (Stuxnet technique) 0day
8308| [23081] MySQL Remote Preauth User Enumeration Zeroday
8309| [23078] MySQL Denial of Service Zeroday PoC
8310| [23077] MySQL (Linux) Database Privilege Elevation Zeroday Exploit
8311| [23076] MySQL (Linux) Heap Based Overrun PoC Zeroday
8312| [23075] MySQL (Linux) Stack Based Buffer Overrun PoC Zeroday
8313| [23073] MySQL 5.1/5.5 WiNDOWS REMOTE R00T (mysqljackpot)
8314| [22946] MySQL AB ODBC Driver 3.51 Plain Text Password Vulnerability
8315| [22565] MySQL 3.x/4.0.x Weak Password Encryption Vulnerability
8316| [22340] MySQL 3.23.x mysqld Privilege Escalation Vulnerability
8317| [22085] MySQL 3.23.x/4.0.x COM_CHANGE_USER Password Memory Corruption Vulnerability
8318| [22084] MySQL 3.23.x/4.0.x COM_CHANGE_USER Password Length Account Compromise Vulnerability
8319| [21726] MySQL 3.20.32/3.22.x/3.23.x Null Root Password Weak Default Configuration Vulnerability (2)
8320| [21725] MySQL 3.20.32/3.22.x/3.23.x Null Root Password Weak Default Configuration Vulnerability (1)
8321| [21266] PHP 4.x/5.x MySQL Safe_Mode Filesystem Circumvention Vulnerability (3)
8322| [21265] PHP 4.x/5.x MySQL Safe_Mode Filesystem Circumvention Vulnerability (2)
8323| [21264] PHP 4.x/5.x MySQL Safe_Mode Filesystem Circumvention Vulnerability (1)
8324| [20718] MySQL 3.20.32 a/3.23.34 Root Operation Symbolic Link File Overwriting Vulnerability
8325| [20581] Mysql 3.22.x/3.23.x Local Buffer Overflow Vulnerability
8326| [20355] Plixer Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential
8327| [20055] MySQL Squid Access Report 2.1.4 HTML Injection
8328| [20044] Symantec Web Gateway 5.0.3.18 Blind SQLi Backdoor via MySQL Triggers
8329| [19721] MySQL 3.22.27/3.22.29/3.23.8 GRANT Global Password Changing Vulnerability
8330| [19092] MySQL Remote Root Authentication Bypass
8331| [18269] MySQL 5.5.8 - Remote Denial of Service (DOS)
8332| [16957] Oracle MySQL for Microsoft Windows Payload Execution
8333| [16850] MySQL yaSSL CertDecoder::GetName Buffer Overflow
8334| [16849] MySQL yaSSL SSL Hello Message Buffer Overflow
8335| [16701] MySQL yaSSL SSL Hello Message Buffer Overflow
8336| [15467] Oracle MySQL < 5.1.49 'WITH ROLLUP' Denial of Service Vulnerability
8337| [14654] CMSQLite <= 1.2 & CMySQLite <= 1.3.1 - Remote Code Execution Exploit
8338| [14537] Oracle MySQL 'ALTER DATABASE' Remote Denial of Service Vulnerability
8339| [14096] CMSQlite & CMySQLite CSRF Vulnerability
8340| [10876] PHP-MySQL-Quiz SQL Injection Vulnerability
8341| [10450] Linkster PHP/MySQL SQL Injection Vulnerability
8342| [10260] Robert Zimmerman PHP / MYSQL Scripts Admin Bypass
8343| [9953] MySQL <= 6.0 yaSSL <= 1.7.5 Hello Message Buffer Overflow
8344| [9085] MySQL <= 5.0.45 COM_CREATE_DB Format String PoC (auth)
8345| [8037] ProFTPd with mod_mysql Authentication Bypass Vulnerability
8346| [7856] MySQL 4/5/6 UDF for Command Execution
8347| [7020] MySQL Quick Admin 1.5.5 - Local File Inclusion Vulnerability
8348| [6641] MySQL Quick Admin <= 1.5.5 (COOKIE) Local File Inclusion Vulnerability
8349| [6577] PromoteWeb MySQL (go.php id) Remote SQL Injection Vulnerability
8350| [6136] phpWebNews 0.2 MySQL Edition (SQL) Insecure Cookie Handling Vuln
8351| [5999] phpWebNews 0.2 MySQL Edition (det) SQL Injection Vulnerability
8352| [5998] phpWebNews 0.2 MySQL Edition (id_kat) SQL Injection Vulnerability
8353| [5913] MyBlog: PHP and MySQL Blog/CMS software (SQL/XSS) Vulnerabilities
8354| [4615] MySQL <= 5.0.45 (Alter) Denial of Service Vulnerability
8355| [4392] PHP <= 4.4.7 / 5.2.3 MySQL/MySQLi Safe Mode Bypass Vulnerability
8356| [3685] MyBlog: PHP and MySQL Blog/CMS software RFI Vulnerability
8357| [3591] PHP-Nuke Module Eve-Nuke 0.1 (mysql.php) RFI Vulnerability
8358| [3468] MySQL Commander <= 2.7 (home) Remote File Inclusion Vulnerability
8359| [3450] NukeSentinel <= 2.5.06 (MySQL => 4.0.24) - Remote SQL Injection Exploit
8360| [3344] PHP-Nuke <= 8.0 Final (INSERT) Blind SQL Injection Exploit (mysql)
8361| [3274] MySQL 4.x/5.0 User-Defined Function Command Execution Exploit (win)
8362| [2969] Php/Mysql Site Builder 0.0.2 (htm2php.php) File Disclosure Vulnerability
8363| [2726] Agora 1.4 RC1 (MysqlfinderAdmin.php) Remote File Include Vulnerability
8364| [2554] cPanel <= 10.8.x (cpwrap via mysqladmin) Local Root Exploit (php)
8365| [2466] cPanel <= 10.8.x (cpwrap via mysqladmin) Local Root Exploit
8366| [2437] paBugs <= 2.0 Beta 3 (class.mysql.php) Remote File Include Exploit
8367| [2420] ZoomStats <= 1.0.2 (mysql.php) Remote File Include Vulnerability
8368| [1742] MySQL (<= 4.1.18, 5.0.20) Local/Remote Information Leakage Exploit
8369| [1741] MySQL <= 5.0.20 COM_TABLE_DUMP Memory Leak/Remote BoF Exploit
8370| [1518] MySQL 4.x/5.0 User-Defined Function Local Privilege Escalation Exploit
8371| [1406] PHP <= 4.4.0 (mysql_connect function) Local Buffer Overflow Exploit
8372| [1181] MySQL 4.0.17 UDF Dynamic Library Exploit
8373| [1134] MySQL Eventum <= 1.5.5 (login.php) SQL Injection Exploit
8374| [960] MySQL MaxDB Webtool <= 7.5.00.23 Remote Stack Overflow Exploit
8375| [311] MySQL 4.1/5.0 zero-length password Auth. Bypass Exploit
8376| [98] MySQL 3.23.x/4.0.x Remote Exploit
8377|
8378| OpenVAS (Nessus) - http://www.openvas.org:
8379| [902675] MySQLDumper Multiple Vulnerabilities
8380| [881549] CentOS Update for mysql CESA-2012:1551 centos6
8381| [881538] CentOS Update for mysql CESA-2012:1462 centos6
8382| [881225] CentOS Update for mysql CESA-2012:0105 centos6
8383| [881185] CentOS Update for mysql CESA-2012:0127 centos5
8384| [881061] CentOS Update for mysql CESA-2012:0874 centos6
8385| [880760] CentOS Update for mysql CESA-2009:1289 centos5 i386
8386| [880613] CentOS Update for mysql CESA-2010:0109 centos5 i386
8387| [880577] CentOS Update for mysql CESA-2010:0442 centos5 i386
8388| [880452] CentOS Update for mysql CESA-2010:0824 centos4 i386
8389| [880366] CentOS Update for mysql CESA-2010:0110 centos4 i386
8390| [880329] CentOS Update for mysql CESA-2007:1155 centos4 x86_64
8391| [880324] CentOS Update for mysql CESA-2007:1155 centos4 i386
8392| [870870] RedHat Update for mysql RHSA-2012:1551-01
8393| [870861] RedHat Update for mysql RHSA-2012:1462-01
8394| [870778] RedHat Update for mysql RHSA-2012:0874-04
8395| [870736] RedHat Update for mysql RHSA-2011:0164-01
8396| [870647] RedHat Update for mysql RHSA-2012:0105-01
8397| [870547] RedHat Update for mysql RHSA-2012:0127-01
8398| [870357] RedHat Update for mysql RHSA-2010:0824-01
8399| [870356] RedHat Update for mysql RHSA-2010:0825-01
8400| [870272] RedHat Update for mysql RHSA-2010:0442-01
8401| [870218] RedHat Update for mysql RHSA-2010:0110-01
8402| [870216] RedHat Update for mysql RHSA-2010:0109-01
8403| [870195] RedHat Update for mysql RHSA-2007:1155-01
8404| [870069] RedHat Update for mysql RHSA-2008:0364-01
8405| [870033] RedHat Update for mysql RHSA-2008:0768-01
8406| [864951] Fedora Update for mysql FEDORA-2012-19823
8407| [864945] Fedora Update for mysql FEDORA-2012-19833
8408| [864504] Fedora Update for mysql FEDORA-2012-9324
8409| [864474] Fedora Update for mysql FEDORA-2012-9308
8410| [863910] Fedora Update for mysql FEDORA-2012-0972
8411| [863725] Fedora Update for mysql FEDORA-2012-0987
8412| [862844] Fedora Update for mod_auth_mysql FEDORA-2011-0100
8413| [862840] Fedora Update for mod_auth_mysql FEDORA-2011-0114
8414| [862676] Fedora Update for mysql FEDORA-2010-15147
8415| [862444] Fedora Update for mysql FEDORA-2010-15166
8416| [862300] Fedora Update for mysql FEDORA-2010-11126
8417| [862290] Fedora Update for mysql FEDORA-2010-11135
8418| [862149] Fedora Update for mysql FEDORA-2010-9053
8419| [862148] Fedora Update for mysql FEDORA-2010-9061
8420| [862136] Fedora Update for mysql FEDORA-2010-9016
8421| [861948] Fedora Update for mysql FEDORA-2010-7355
8422| [861936] Fedora Update for mysql FEDORA-2010-7414
8423| [861707] Fedora Update for mysql FEDORA-2010-1300
8424| [861651] Fedora Update for mysql FEDORA-2010-1348
8425| [861544] Fedora Update for php-pear-MDB2-Driver-mysql FEDORA-2007-3369
8426| [861392] Fedora Update for mysql FEDORA-2007-4471
8427| [861180] Fedora Update for php-pear-MDB2-Driver-mysqli FEDORA-2007-3369
8428| [861162] Fedora Update for php-pear-MDB2-Driver-mysql FEDORA-2007-3376
8429| [861108] Fedora Update for php-pear-MDB2-Driver-mysqli FEDORA-2007-3376
8430| [861033] Fedora Update for mysql FEDORA-2007-4465
8431| [855481] Solaris Update for mysql 120292-02
8432| [855333] Solaris Update for mysql 120293-02
8433| [850182] SuSE Update for mysql openSUSE-SU-2012:0860-1 (mysql)
8434| [841248] Ubuntu Update for mysql-5.5 USN-1658-1
8435| [841207] Ubuntu Update for mysql-5.5 USN-1621-1
8436| [841039] Ubuntu Update for mysql-5.5 USN-1467-1
8437| [840989] Ubuntu Update for mysql-5.1 USN-1427-1
8438| [840944] Ubuntu Update for mysql-5.1 USN-1397-1
8439| [840533] Ubuntu Update for MySQL vulnerabilities USN-1017-1
8440| [840442] Ubuntu Update for MySQL vulnerabilities USN-950-1
8441| [840384] Ubuntu Update for MySQL vulnerabilities USN-897-1
8442| [840292] Ubuntu Update for mysql-dfsg-5.0 vulnerabilities USN-671-1
8443| [840240] Ubuntu Update for mysql-dfsg-5.0 regression USN-588-2
8444| [840219] Ubuntu Update for mysql-dfsg-5.0 vulnerabilities USN-588-1
8445| [840106] Ubuntu Update for mysql-dfsg-5.0 vulnerabilities USN-559-1
8446| [840042] Ubuntu Update for mysql-dfsg-5.0 vulnerabilities USN-528-1
8447| [840012] Ubuntu Update for mysql-dfsg-5.0 vulnerability USN-440-1
8448| [835096] HP-UX Update for on HP 9000 Servers Running MySQL HPSBUX00287
8449| [831755] Mandriva Update for mysql MDVSA-2012:178 (mysql)
8450| [831684] Mandriva Update for mysql MDVA-2012:049 (mysql)
8451| [831547] Mandriva Update for mysql MDVA-2012:022 (mysql)
8452| [831532] Mandriva Update for mysql MDVA-2012:005 (mysql)
8453| [831519] Mandriva Update for mysql MDVA-2011:099 (mysql)
8454| [831425] Mandriva Update for mysql MDVA-2011:025 (mysql)
8455| [831327] Mandriva Update for mysql MDVA-2011:005 (mysql)
8456| [831315] Mandriva Update for mysql MDVSA-2011:012 (mysql)
8457| [831295] Mandriva Update for mysql MDVA-2010:240 (mysql)
8458| [831244] Mandriva Update for mysql MDVSA-2010:155-1 (mysql)
8459| [831243] Mandriva Update for mysql MDVSA-2010:222 (mysql)
8460| [831237] Mandriva Update for mysql MDVSA-2010:223 (mysql)
8461| [831202] Mandriva Update for mysql MDVA-2010:210 (mysql)
8462| [831134] Mandriva Update for mysql MDVSA-2010:155 (mysql)
8463| [831049] Mandriva Update for mysql MDVSA-2010:107 (mysql)
8464| [831048] Mandriva Update for mysql MDVSA-2010:101 (mysql)
8465| [831034] Mandriva Update for mysql MDVA-2010:146 (mysql)
8466| [831033] Mandriva Update for mysql MDVSA-2010:093 (mysql)
8467| [830902] Mandriva Update for mysql MDVSA-2010:044 (mysql)
8468| [830821] Mandriva Update for mysql MDVSA-2010:011 (mysql)
8469| [830806] Mandriva Update for mysql MDVSA-2010:012 (mysql)
8470| [830772] Mandriva Update for mysql MDVSA-2008:150 (mysql)
8471| [830664] Mandriva Update for mysql MDVA-2008:018 (mysql)
8472| [830659] Mandriva Update for mysql MDVSA-2008:017 (mysql)
8473| [830513] Mandriva Update for mysql MDVSA-2008:028 (mysql)
8474| [830421] Mandriva Update for mysql MDVSA-2008:149 (mysql)
8475| [830297] Mandriva Update for MySQL MDKSA-2007:177 (MySQL)
8476| [830223] Mandriva Update for perl-DBD-mysql MDKA-2007:066 (perl-DBD-mysql)
8477| [830063] Mandriva Update for MySQL MDKSA-2007:139 (MySQL)
8478| [830032] Mandriva Update for MySQL MDKSA-2007:243 (MySQL)
8479| [801593] Oracle MySQL Eventum Multiple Cross Site Scripting Vulnerabilities
8480| [801205] MySQL Connector/Net SSL Certificate Validation Security Bypass Vulnerability
8481| [103051] PHP MySQLi Extension 'set_magic_quotes_runtime' Function Security-Bypass Weakness
8482| [100662] PHP Mysqlnd Extension Information Disclosure and Multiple Buffer Overflow Vulnerabilities
8483| [71475] Debian Security Advisory DSA 2496-1 (mysql-5.1)
8484| [71233] Debian Security Advisory DSA 2429-1 (mysql-5.1)
8485| [70803] Gentoo Security Advisory GLSA 201201-02 (MySQL)
8486| [70586] FreeBSD Ports: proftpd, proftpd-mysql
8487| [67541] Debian Security Advisory DSA 2057-1 (mysql-dfsg-5.0)
8488| [66577] Fedora Core 11 FEDORA-2009-13504 (mysql)
8489| [66573] Fedora Core 12 FEDORA-2009-13466 (mysql)
8490| [66553] Mandriva Security Advisory MDVSA-2009:189-1 (apache-mod_auth_mysql)
8491| [66508] Fedora Core 10 FEDORA-2009-12180 (mysql)
8492| [66425] Mandriva Security Advisory MDVSA-2009:326 (mysql)
8493| [66256] Fedora Core 11 FEDORA-2009-10701 (ocaml-mysql)
8494| [66251] Fedora Core 10 FEDORA-2009-10582 (ocaml-mysql)
8495| [66056] Debian Security Advisory DSA 1910-1 (mysql-ocaml)
8496| [66035] Mandrake Security Advisory MDVSA-2009:279 (ocaml-mysql)
8497| [65937] SLES10: Security update for MySQL
8498| [65884] SLES10: Security update for MySQL
8499| [65827] SLES10: Security update for MySQL
8500| [65710] SLES11: Security update for MySQL
8501| [65610] SLES9: Security update for MySQL
8502| [65566] SLES9: Security update for MySQL
8503| [65507] SLES9: Security update for MySQL
8504| [65502] SLES9: Security update for mysql
8505| [65426] SLES9: Security update for MySQL
8506| [65385] SLES9: Security update for mysql
8507| [65341] SLES9: Security update for MySQL
8508| [65181] SLES9: Security update for MySQL
8509| [65176] SLES9: Security update for MySQL
8510| [64932] CentOS Security Advisory CESA-2009:1289 (mysql)
8511| [64820] Debian Security Advisory DSA 1877-1 (mysql-dfsg-5.0)
8512| [64532] Mandrake Security Advisory MDVSA-2009:189 (apache-mod_auth_mysql)
8513| [64522] Mandrake Security Advisory MDVSA-2009:179 (mysql)
8514| [64461] Mandrake Security Advisory MDVSA-2009:159 (mysql)
8515| [63872] Mandrake Security Advisory MDVSA-2009:094 (mysql)
8516| [63630] FreeBSD Ports: proftpd, proftpd-mysql
8517| [63171] FreeBSD Ports: mysql-server
8518| [63170] FreeBSD Ports: mysql-server
8519| [63169] FreeBSD Ports: mysql-server
8520| [63168] FreeBSD Ports: mysql-server
8521| [63095] FreeBSD Ports: mysql-server
8522| [61852] Debian Security Advisory DSA 1662-1 (mysql-dfsg-5.0)
8523| [61699] FreeBSD Ports: mysql-client
8524| [61656] FreeBSD Ports: proftpd, proftpd-mysql
8525| [61618] FreeBSD Ports: mysql-server
8526| [61599] Gentoo Security Advisory GLSA 200809-04 (mysql)
8527| [61283] Debian Security Advisory DSA 1608-1 (mysql-dfsg-5.0)
8528| [60804] Gentoo Security Advisory GLSA 200804-04 (mysql)
8529| [60271] Debian Security Advisory DSA 1478-1 (mysql-dfsg-5.0)
8530| [60106] Debian Security Advisory DSA 1451-1 (mysql-dfsg-5.0)
8531| [60017] Slackware Advisory SSA:2007-348-01 mysql
8532| [59638] Debian Security Advisory DSA 1413-1 (mysql-dfsg, mysql-dfsg-5.0, mysql-dfsg-4.1)
8533| [59245] Gentoo Security Advisory GLSA 200711-25 (mysql)
8534| [58863] FreeBSD Ports: freeradius, freeradius-mysql
8535| [58545] Gentoo Security Advisory GLSA 200708-10 (mysql)
8536| [58261] Gentoo Security Advisory GLSA 200705-11 (MySQL)
8537| [57859] Gentoo Security Advisory GLSA 200608-09 (mysql)
8538| [57725] FreeBSD Ports: proftpd, proftpd-mysql
8539| [57576] FreeBSD Ports: proftpd, proftpd-mysql
8540| [57527] FreeBSD Ports: mysql-server
8541| [57526] FreeBSD Ports: mysql-server
8542| [57337] Debian Security Advisory DSA 1169-1 (mysql-dfsg-4.1)
8543| [57257] FreeBSD Ports: mysql-server
8544| [57167] Slackware Advisory SSA:2006-211-01 mysql
8545| [57109] Debian Security Advisory DSA 1112-1 (mysql-dfsg-4.1)
8546| [56964] Gentoo Security Advisory GLSA 200606-18 (pam_mysql)
8547| [56940] Gentoo Security Advisory GLSA 200606-13 (MySQL)
8548| [56924] Debian Security Advisory DSA 1092-1 (mysql-dfsg-4.1)
8549| [56861] Slackware Advisory SSA:2006-155-01 mysql
8550| [56850] FreeBSD Ports: mysql-server
8551| [56849] FreeBSD Ports: mysql-server
8552| [56833] Debian Security Advisory DSA 1079-1 (mysql-dfsg)
8553| [56789] Debian Security Advisory DSA 1073-1 (mysql-dfsg-4.1)
8554| [56788] Debian Security Advisory DSA 1071-1 (mysql)
8555| [56730] Slackware Advisory SSA:2006-129-02 mysql
8556| [56728] Gentoo Security Advisory GLSA 200605-13 (MySQL)
8557| [56714] FreeBSD Ports: mysql-server
8558| [55520] Debian Security Advisory DSA 833-2 (mysql-dfsg-4.1)
8559| [55514] Debian Security Advisory DSA 833-1 (mysql-dfsg-4.1)
8560| [55493] Debian Security Advisory DSA 829-1 (mysql)
8561| [55492] Debian Security Advisory DSA 831-1 (mysql-dfsg)
8562| [55164] Debian Security Advisory DSA 783-1 (mysql-dfsg-4.1)
8563| [54884] Gentoo Security Advisory GLSA 200503-19 (mysql)
8564| [54819] Gentoo Security Advisory GLSA 200501-33 (mysql)
8565| [54713] Gentoo Security Advisory GLSA 200410-22 (MySQL)
8566| [54659] Gentoo Security Advisory GLSA 200409-02 (MySQL)
8567| [54580] Gentoo Security Advisory GLSA 200405-20 (MySQL)
8568| [54483] FreeBSD Ports: proftpd, proftpd-mysql
8569| [54201] FreeBSD Ports: mysql-server
8570| [53776] Debian Security Advisory DSA 013-1 (mysql)
8571| [53755] Debian Security Advisory DSA 483-1 (mysql)
8572| [53750] Debian Security Advisory DSA 707-1 (mysql)
8573| [53666] Debian Security Advisory DSA 381-1 (mysql)
8574| [53595] Debian Security Advisory DSA 303-1 (mysql)
8575| [53585] Debian Security Advisory DSA 212-1 (mysql)
8576| [53481] Debian Security Advisory DSA 647-1 (mysql)
8577| [53251] Debian Security Advisory DSA 562-1 (mysql)
8578| [53230] Debian Security Advisory DSA 540-1 (mysql)
8579| [52466] FreeBSD Ports: exim, exim-ldap2, exim-mysql, exim-postgresql
8580| [52459] FreeBSD Ports: mysql-client
8581| [52419] FreeBSD Ports: mysql-scripts
8582| [52406] FreeBSD Ports: mysql-server
8583| [52375] FreeBSD Ports: mysql-server, mysql-client
8584| [52274] FreeBSD Ports: mysql-server
8585| [52273] FreeBSD Ports: mysql-server
8586| [52272] FreeBSD Ports: mysql-server
8587| [52271] FreeBSD Ports: mysql-server
8588| [52270] FreeBSD Ports: mysql-server
8589| [52233] FreeBSD Ports: mysql-scripts
8590| [52158] FreeBSD Ports: mysql-server
8591| [16093] MySQL Eventum Multiple flaws
8592| [12639] MySQL Authentication bypass through a zero-length password
8593| [10783] PCCS-Mysql User/Password Exposure
8594|
8595| SecurityTracker - https://www.securitytracker.com:
8596| [1028790] MySQL Multiple Bugs Let Remote Users Deny Service and Partially Access and Modify Data
8597| [1028449] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service and Partially Access and Modify Data
8598| [1028004] MySQL Multiple Bugs Let Remote Authenticated Users Take Full Control or Deny Service and Let Local Users Access and Modify Data
8599| [1027829] MySQL Bug in UpdateXML() Lets Remote Authenticated Users Deny Service
8600| [1027828] MySQL Heap Overflow May Let Remote Authenticated Users Execute Arbitrary Code
8601| [1027827] MySQL Stack Overflow May Let Remote Authenticated Users Execute Arbitrary Code
8602| [1027665] MySQL Multiple Bugs Let Remote Authenticated Users Access and Modify Data and Deny Service and Local Users Access Data
8603| [1027263] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service
8604| [1027143] MySQL memcmp() Comparison Error Lets Remote Users Bypass Authentication
8605| [1026934] MySQL Multiple Bugs Let Remote Users Deny Service
8606| [1026896] MySQL Unspecified Flaws Have Unspecified Impact
8607| [1026659] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
8608| [1026530] MySQL Multiple Bugs Let Local and Remote Users Partially Access and Modifiy Data and Partially Deny Service
8609| [1024508] MySQL Replication Flaw Lets Remote Authenticated Users Gain Elevated Privileges
8610| [1024507] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
8611| [1024360] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
8612| [1024160] MySQL ALTER DATABASE Processing Error Lets Remote Authenticated Users Deny Service
8613| [1024033] MySQL COM_FIELD_LIST Packet Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8614| [1024032] MySQL Large Packet Processing Flaw in my_net_skip_rest() Lets Remote Users Deny Service
8615| [1024031] MySQL COM_FIELD_LIST Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
8616| [1024004] MySQL mi_delete_table() Symlink Flaw Lets Remote Authenticated Users Delete Data and Index Files
8617| [1023402] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
8618| [1023220] MySQL Client Fails to Check Server Certificates in Certain Cases
8619| [1022812] MySQL Unspecified Buffer Overflow Lets Remote Users Execute Arbitrary Code
8620| [1022533] MySQL Format String Bug in dispatch_command() Lets Remote Users Deny Service
8621| [1022482] MySQL Connector/Net is Missing SSL Certificate Validation
8622| [1021786] MySQL Bug in ExtractValue()/UpdateXML() in Processing XPath Expressions Lets Remote Authenticated Users Deny Service
8623| [1021714] (Red Hat Issues Fix) mod_auth_mysql Input Validation Flaw Lets Remote Users Inject SQL Commands
8624| [1020858] MySQL Item_bin_string::Item_bin_string() Binary Value Processing Bug Lets Remote Authenticated Users Deny Service
8625| [1019995] MySQL MyISAM Options Let Local Users Overwrite Table Files
8626| [1019085] MySQL Bugs Let Remote Authenticated Users Gain Elevated Privileges and Deny Service
8627| [1019084] MySQL DATA DIRECTORY and INDEX DIRECTORY Options May Let Remote Authenticated Users Gain Elevated Privileges
8628| [1019083] MySQL BINLOG Filename Path Bug May Let Remote Authenticated Users Gain Elevated Privileges
8629| [1019060] MySQL Rename Table Bug Lets Remote Authenticated Users Modify System Table Information
8630| [1018978] MySQL convert_search_mode_to_innobase() Bug Lets Remote Authenticated Users Deny Service
8631| [1018824] Asterisk-Addons Input Validation Flaw in cdr_addon_mysql Lets Remote Users Inject SQL Commands
8632| [1018663] MySQL Table View Access Bug Lets Remote Authenticated Users Gain Elevated Privileges
8633| [1018629] MySQL Authentication Protocol Bug Lets Remote Users Deny Service
8634| [1018071] MySQL ALTER TABLE Function Lets Remote Authenticated Users Obtain Potentially Sensitive Information
8635| [1018070] MySQL SQL SECURITY INVOKER Routines Let Remote Authenticated Users Gain Elevated Privileges
8636| [1018069] MySQL Lets Remote Authenticated Users Issue the RENAME TABLE Command
8637| [1017746] MySQL Single Row Subselect Statements Let Remote Users Deny Service
8638| [1016790] MySQL Replication Error Lets Local Users Deny Service
8639| [1016710] MySQL Case-Sensitive Database Names May Let Users Access Restricted Databases
8640| [1016709] MySQL Error in Checking suid Routine Arguments May Let Users Gain Elevated Privileges
8641| [1016617] MySQL MERGE Access Control Error May Let Users Access a Restricted Table
8642| [1016566] Opsware Network Automation System Discloses MySQL Password to Local Users
8643| [1016216] MySQL Error in Parsing Multibyte Encoded Data in mysql_real_escape() Lets Remote Users Inject SQL Commands
8644| [1016077] Apple MySQL Manager Database Initialization Bug May Let Local Users Access the Database
8645| [1016017] MySQL Anonymous Login Processing May Disclose Some Memory Contents to Remote Users
8646| [1016016] MySQL COM_TABLE_DUMP Processing Lets Remote Authenticated Users Execute Arbitrary Code or Obtain Information
8647| [1015789] Woltlab Burning Board Input Validation Hole in 'class_db_mysql.php' Permits Cross-Site Scripting Attacks
8648| [1015693] MySQL Query Bug Lets Remote Users Bypass Query Logging
8649| [1015603] PAM-MySQL pam_get_item() Double Free May Let Remote Users Execute Arbitrary Code
8650| [1015485] PHP mysqli Extension Error Mode Format String Flaw May Let Users Execute Arbitrary Code
8651| [1014603] MySQL Eventum Input Validation Hole in 'class.auth.php' Permits SQL Injection and Other Input Validation Bugs Permit Cross-Site Scripting Attacks
8652| [1014172] xMySQLadmin Lets Local Users Delete Files
8653| [1013995] MySQL 'mysql_install_db' Uses Unsafe Temporary Files and May Let Local Users Gain Elevated Privilege
8654| [1013994] MySQL Non-existent '--user' Error May Allow the Database to Run With Incorrect Privileges
8655| [1013415] MySQL CREATE FUNCTION Lets Authenticated Users Invoke libc Functions to Execute Arbitrary Code
8656| [1013414] MySQL udf_init() Path Validation Flaw Lets Authenticated Users Execute Arbitrary Libraries
8657| [1013413] MySQL CREATE TEMPORARY TABLE Uses Predictable Temporary Files That May Let Users Gain Elevated Privileges
8658| [1012914] MySQL 'mysqlaccess.sh' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
8659| [1012893] MySQL MaxDB Buffer Overflow in websql Password Parameter Lets Remote Users Execute Arbitrary Code
8660| [1012500] mysql_auth Memory Leak Has Unspecified Impact
8661| [1011741] MySQL Access Control Error in Databases With Underscore Wildcard Character May Grant Unauthorized Access
8662| [1011606] MySQL May Let Remote Authenticated Users Access Restricted Tables or Crash the System
8663| [1011408] MySQL libmysqlclient Buffer Overflow in Executing Prepared Statements Has Unspecified Impact
8664| [1011376] MySQLGuest Lack of Input Validation Lets Remote Users Conduct Cross-Site Scripting Attacks
8665| [1011008] MySQL Buffer Overflow in mysql_real_connect() May Let Remote Users Execute Arbitrary Code
8666| [1010979] MySQL 'mysqlhotcopy' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
8667| [1010645] MySQL check_scramble_323() Zero-Length Comparison Lets Remote Users Bypass Authentication
8668| [1009784] MySQL 'mysqld_multi' Temporary File Flaw Lets Local Users Overwrite Files
8669| [1009554] MySQL 'mysqlbug' Temporary File Flaw Lets Local Users Overwrite Files
8670| [1007979] MySQL mysql_change_user() Double Free Error Lets Remote Authenticated Users Crash mysqld
8671| [1007673] MySQL acl_init() Buffer Overflow Permits Remote Authenticated Administrators to Execute Arbitrary Code
8672| [1007518] DWebPro Discloses MySQL Database Password to Local Users
8673| [1007312] MySQL World-Writable Configuration File May Let Local Users Gain Root Privileges
8674| [1006976] MySQL Buffer Overflow in 'mysql_real_connect()' Client Function May Let Remote or Local Users Execute Arbitrary Code
8675| [1005800] MySQL Overflow and Authentication Bugs May Let Remote Users Execute Code or Access Database Accounts
8676| [1005345] MySQL Buffer Overflow Lets Local Users Gain System Privileges on Windows NT
8677| [1004506] vBulletin PHP-based Forum Software Has Unspecified Security Flaw in the 'db_mysql.php' Module
8678| [1004172] PHP-Survey Script Discloses Underlying MySQL Database Username and Password to Remote Users
8679| [1003955] 3rd Party Patch for Cyrus SASL ('auxprop for mysql and ldap') Lets Remote Users Access Protected POP Mail Accounts Without Authentication
8680| [1003290] Conectiva Linux MySQL Distribution May Allow Local Users to Obtain Sensitive Information
8681| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
8682| [1002485] WinMySQLadmin Database Administration Tool Discloses MySQL Password to Local Users
8683| [1002324] Vpopmail Mail Server Discloses Database Password to Local Users When Installed with MySQL
8684| [1001411] phpMyAdmin Administration Tool for MySQL Allows Remote Users to Execute Commands on the Server
8685| [1001118] MySQL Database Allows Authorized Users to Modify Server Files to Deny Service or Obtain Additional Access
8686|
8687| OSVDB - http://www.osvdb.org:
8688| [95337] Oracle MySQL Server XA Transactions Subcomponent Unspecified Remote DoS
8689| [95336] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
8690| [95335] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
8691| [95334] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue
8692| [95333] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
8693| [95332] Oracle MySQL Server Parser Subcomponent Unspecified Remote DoS
8694| [95331] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3801)
8695| [95330] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3808)
8696| [95329] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3796)
8697| [95328] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3804)
8698| [95327] Oracle MySQL Server Prepared Statements Subcomponent Unspecified Remote DoS
8699| [95326] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
8700| [95325] Oracle MySQL Server Full Text Search Subcomponent Unspecified Remote DoS
8701| [95324] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3795)
8702| [95323] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3793)
8703| [95322] Oracle MySQL Server Audit Log Subcomponent Unspecified Remote Issue
8704| [95321] Oracle MySQL Server MemCached Subcomponent Unspecified Remote Issue
8705| [95131] AutoMySQLBackup /usr/sbin/automysqlbackup Database Name Arbitrary Code Injection
8706| [94076] Debian Linux MySQL Server mysql-server-5.5.postinst Race Condition debian.cnf Plaintext Credential Local Disclosure
8707| [93505] Wireshark MySQL Dissector (packet-mysql.c) Malformed Packet Handling Infinite Loop Remote DoS
8708| [93174] MySQL Crafted Derived Table Handling DoS
8709| [92967] MySQL2JSON (mn_mysql2json) Extension for TYPO3 Unspecified SQL Injection
8710| [92950] MySQL Running START SLAVE Statement Process Listing Plaintext Local Password Disclosure
8711| [92485] Oracle MySQL Server Partition Subcomponent Unspecified Local DoS
8712| [92484] Oracle MySQL Server Locking Subcomponent Unspecified Remote DoS (2013-1506)
8713| [92483] Oracle MySQL Server Install Subcomponent Unspecified Local Issue
8714| [92482] Oracle MySQL Server Types Subcomponent Unspecified Remote DoS
8715| [92481] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2381)
8716| [92480] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1566)
8717| [92479] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1511)
8718| [92478] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1567)
8719| [92477] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
8720| [92476] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
8721| [92475] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
8722| [92474] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS
8723| [92473] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-2389)
8724| [92472] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
8725| [92471] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1512)
8726| [92470] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1544)
8727| [92469] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote Issue
8728| [92468] Oracle MySQL Server MemCached Subcomponent Unspecified Remote DoS
8729| [92467] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2375)
8730| [92466] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-1531)
8731| [92465] Oracle MySQL Server Server Subcomponent Unspecified Remote Issue
8732| [92464] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Issue
8733| [92463] Oracle MySQL Server Locking Subcomponent Unspecified Remote Issue (2013-1521)
8734| [92462] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-2395)
8735| [91536] Oracle MySQL yaSSL Unspecified Overflow (2012-0553)
8736| [91534] Oracle MySQL yaSSL Unspecified Overflow (2013-1492)
8737| [91415] MySQL Raw Geometry Object String Conversion Remote DoS
8738| [91108] Juju mysql Charm Install Script mysql.passwd MySQL Password Plaintext Local Disclosure
8739| [89970] Site Go /site-go/admin/extra/mysql/index.php idm Parameter Traversal Arbitrary File Access
8740| [89265] Oracle MySQL Server Server Privileges Subcomponent Unspecified Remote DoS
8741| [89264] Oracle MySQL Server Server Partition Subcomponent Unspecified Remote DoS
8742| [89263] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-0578)
8743| [89262] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-1705)
8744| [89261] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-0574)
8745| [89260] Oracle MySQL Server MyISAM Subcomponent Unspecified Remote DoS
8746| [89259] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2012-0572)
8747| [89258] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-0368)
8748| [89257] Oracle MySQL Server Server Locking Subcomponent Unspecified Remote DoS
8749| [89256] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-1702)
8750| [89255] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote Issue
8751| [89254] Oracle MySQL Server Server Replication Subcomponent Unspecified Local Issue
8752| [89253] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
8753| [89252] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS
8754| [89251] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
8755| [89250] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
8756| [89042] ViciBox Server MySQL cron Service Default Credentials
8757| [88415] Oracle MySQL Server COM_CHANGE_USER Account Password Brute-Force Weakness
8758| [88118] Oracle MySQL Server FILE Privilege Database Privilege Escalation
8759| [88067] Oracle MySQL Server Authentication Error Message User Enumeration
8760| [88066] Oracle MySQL Server for Linux Access Rights Checking Routine Database Name Handling Stack Buffer Overflow
8761| [88065] Oracle MySQL Server COM_BINLOG_DUMP Invalid Data Handling DoS
8762| [88064] Oracle MySQL Server Multiple-Table DELETE Heap Buffer Overflow
8763| [87704] CodeIgniter MySQL / MySQLi Driver Database Client Multi-byte Character Set Unspecified SQL Injection
8764| [87507] Oracle MySQL Statement Logging Multiple Log Plaintext Local Password Disclosure
8765| [87501] Oracle MySQL optimizer_switch Malformed Value Processing Local DoS
8766| [87494] Oracle MySQL on Windows Field_new_decimal::store_value dbug_buff Variable Overflow DoS
8767| [87480] MySQL Malformed XML Comment Handling DoS
8768| [87466] MySQL SSL Certificate Revocation Weakness
8769| [87356] Oracle MySQL do_div_mod DIV Expression Handling Remote DoS
8770| [87355] Oracle MySQL handler::pushed_cond Table Cache Handling mysqld DoS
8771| [87354] Oracle MySQL Polygon Union / Intersection Spatial Operations DoS
8772| [86273] Oracle MySQL Server Server Installation Subcomponent Unspecified Local Information Disclosure
8773| [86272] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote DoS
8774| [86271] Oracle MySQL Server Server Full Text Search Subcomponent Unspecified Remote DoS
8775| [86270] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3156)
8776| [86269] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Information Disclosure
8777| [86268] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3180)
8778| [86267] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3150)
8779| [86266] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3144)
8780| [86265] Oracle MySQL Server InnoDB Plugin Subcomponent Unspecified Remote DoS
8781| [86264] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
8782| [86263] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Issue
8783| [86262] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3177)
8784| [86261] Oracle MySQL Server Protocol Subcomponent Unspecified Remote Issue
8785| [86260] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Code Execution
8786| [86175] Oracle MySQL on Windows Path Subversion Arbitrary DLL Injection Code Execution
8787| [85155] Icinga module/idoutils/db/scripts/create_mysqldb.sh Icinga User Database Access Restriction Bypass
8788| [84755] Oracle MySQL Sort Order Index Calculation Remote DoS
8789| [84719] MySQLDumper index.php page Parameter XSS
8790| [84680] MySQL Squid Access Report access.log File Path XSS
8791| [83980] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1689)
8792| [83979] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1734)
8793| [83978] Oracle MySQL Server Subcomponent Unspecified Remote DoS
8794| [83977] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
8795| [83976] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
8796| [83975] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1735)
8797| [83661] Oracle MySQL Unspecified Issue (59533)
8798| [82804] Oracle MySQL Authentication Protocol Token Comparison Casting Failure Password Bypass
8799| [82803] Oracle MySQL Unspecified Issue (59387)
8800| [82120] Oracle MySQL Version Specific Comment Handling Arbitrary SQL Command Execution
8801| [81897] Viscacha classes/database/mysql.inc.php Multiple Parameter SQL Injection
8802| [81616] MySQLDumper Multiple Script Direct Request Information Disclosure
8803| [81615] MySQLDumper filemanagement.php f Parameter Traversal Arbitrary File Access
8804| [81614] MySQLDumper File Upload PHP Code Execution
8805| [81613] MySQLDumper main.php Multiple Function CSRF
8806| [81612] MySQLDumper restore.php filename Parameter XSS
8807| [81611] MySQLDumper sql.php Multiple Parameter XSS
8808| [81610] MySQLDumper install.php Multiple Parameter XSS
8809| [81609] MySQLDumper install.php language Parameter Traversal Arbitrary File Access
8810| [81378] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1690)
8811| [81377] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1696)
8812| [81376] Oracle MySQL Server Server DML Component Unspecified Remote DoS
8813| [81375] Oracle MySQL Server Partition Component Unspecified Remote DoS
8814| [81374] Oracle MySQL Server MyISAM Component Unspecified Remote DoS
8815| [81373] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1703)
8816| [81059] Oracle MySQL Server Multiple Unspecified Issues
8817| [79038] Webmin Process Listing MySQL Password Local Disclosure
8818| [78919] Oracle MySQL Unspecified Pre-authentication Remote Code Execution
8819| [78710] WordPress wp-admin/setup-config.php MySQL Query Saturation Brute-Force Proxy Weakness
8820| [78708] WordPress wp-admin/setup-config.php MySQL Database Verification Code Injection Weakness
8821| [78707] WordPress wp-admin/setup-config.php MySQL Credentials Error Message Brute-Force Weakness
8822| [78394] Oracle MySQL Server Unspecified Remote DoS (2012-0493)
8823| [78393] Oracle MySQL Server Unspecified Remote DoS (2012-0492)
8824| [78392] Oracle MySQL Server Unspecified Remote DoS (2012-0117)
8825| [78391] Oracle MySQL Server Unspecified Remote DoS (2012-0112)
8826| [78390] Oracle MySQL Server Unspecified Remote DoS (2012-0495)
8827| [78389] Oracle MySQL Server Unspecified Remote DoS (2012-0491)
8828| [78388] Oracle MySQL Server Unspecified Remote DoS (2012-0490)
8829| [78387] Oracle MySQL Server Unspecified Remote DoS (2012-0489)
8830| [78386] Oracle MySQL Server Unspecified Remote DoS (2012-0488)
8831| [78385] Oracle MySQL Server Unspecified Remote DoS (2012-0487)
8832| [78384] Oracle MySQL Server Unspecified Remote DoS (2012-0486)
8833| [78383] Oracle MySQL Server Unspecified Remote DoS (2012-0485)
8834| [78382] Oracle MySQL Server Unspecified Remote DoS (2012-0120)
8835| [78381] Oracle MySQL Server Unspecified Remote DoS (2012-0119)
8836| [78380] Oracle MySQL Server Unspecified Remote DoS (2012-0115)
8837| [78379] Oracle MySQL Server Unspecified Remote DoS (2012-0102)
8838| [78378] Oracle MySQL Server Unspecified Remote DoS (2012-0101)
8839| [78377] Oracle MySQL Server Unspecified Remote DoS (2012-0087)
8840| [78376] Oracle MySQL Server Unspecified Remote DoS (2011-2262)
8841| [78375] Oracle MySQL Server Unspecified Local DoS
8842| [78374] Oracle MySQL Server Unspecified Remote Issue (2012-0075)
8843| [78373] Oracle MySQL Server Unspecified Local Issue
8844| [78372] Oracle MySQL Server Unspecified Remote Information Disclosure
8845| [78371] Oracle MySQL Server Unspecified Remote Issue (2012-0496)
8846| [78370] Oracle MySQL Server Unspecified Remote Issue (2012-0118)
8847| [78369] Oracle MySQL Server Unspecified Remote Issue (2012-0116)
8848| [78368] Oracle MySQL Server Unspecified Remote Issue (2012-0113)
8849| [78283] Oracle MySQL NULL Pointer Dereference Packet Parsing Remote DoS
8850| [77042] e107 CMS install_.php MySQL Server Name Parsing Remote PHP Code Execution
8851| [77040] DBD::mysqlPP Unspecified SQL Injection
8852| [75888] TaskFreak! multi-mysql Multiple Script Direct Request Path Disclosure
8853| [74120] Apache HTTP Server mod_authnz_external mysql/mysql-auth.pl user Field SQL Injection
8854| [73555] Prosody MySQL Value Column Invalid Data Type Handling DoS
8855| [73387] Zend Framework PDO_MySql Character Set Security Bypass
8856| [72836] Arctic Fox CMS Multiple Script Direct Request MySQL Settings Disclosure
8857| [72660] MySQL GUI Tools Administrator / Query Browser Command Line Credentials Local Disclosure
8858| [72120] DirectAdmin mysql_backups Folder MySQL Database Backup Local Disclosure
8859| [71368] Accellion File Transfer Appliance Weak MySQL root Password
8860| [70967] MySQL Eventum Admin User Creation CSRF
8861| [70966] MySQL Eventum preferences.php full_name Parameter XSS
8862| [70961] MySQL Eventum list.php Multiple Parameter XSS
8863| [70960] MySQL Eventum forgot_password.php URI XSS
8864| [70947] PyWebDAV DAVServer/mysqlauth.py get_userinfo() Multiple Parameter SQL Injection
8865| [70610] PHP MySQLi Extension set_magic_quotes_runtime Function mysqli_fetch_assoc Function Interaction Weakness
8866| [69885] SilverStripe modules/sapphire/trunk/core/model/MySQLDatabase.php showqueries Parameter SQL Command Disclosure
8867| [69395] MySQL Derived Table Grouping DoS
8868| [69394] MySQL Temporary Table Expression Re-Evaluation DoS
8869| [69393] MySQL GROUP_CONCAT() WITH ROLLUP Modifier DoS
8870| [69392] MySQL Extreme-Value Functions Mixed Arguments DoS
8871| [69391] MySQL Stored Procedures / Prepared Statements Nested Joins DoS
8872| [69390] MySQL Extreme-Value Functions Argument Parsing Type Error DoS
8873| [69389] MySQL CONVERT_TZ() Function Empty SET Column DoS
8874| [69388] MySQL InnoDB Storage Engine Table Handling Overflow
8875| [69387] MySQL LIKE Predicates Pre-Evaluation DoS
8876| [69001] MySQL PolyFromWKB() Function WKB Data Remote DoS
8877| [69000] MySQL HANDLER Interface Unspecified READ Request DoS
8878| [68997] MySQL Prepared-Statement Mode EXPLAIN DoS
8879| [68996] MySQL EXPLAIN EXTENDED Statement DoS
8880| [68995] MySQL GeometryCollection non-Geometry Value Assignment DoS
8881| [67488] phpMyAdmin libraries/dbi/mysqli.dbi.lib.php Unspecified Parameter XSS
8882| [67487] phpMyAdmin libraries/dbi/mysql.dbi.lib.php Unspecified Parameter XSS
8883| [67421] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_rset_header_read Function Overflow
8884| [67420] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_ok_read Function Arbitrary Memory Content Disclosure
8885| [67419] PHP Mysqlnd Extension php_mysqlnd_read_error_from_line Function Negative Buffer Length Value Overflow
8886| [67418] PHP Mysqlnd Extension php_mysqlnd_auth_write Function Multiple Overflows
8887| [67384] MySQL LOAD DATA INFILE Statement Incorrect OK Packet DoS
8888| [67383] MySQL EXPLAIN Statement Item_singlerow_subselect::store Function NULL Dereference DoS
8889| [67381] MySQL InnoDB Temporary Table Handling DoS
8890| [67380] MySQL BINLOG Statement Unspecified Argument DoS
8891| [67379] MySQL Multiple Operation NULL Argument Handling DoS
8892| [67378] MySQL Unique SET Column Join Statement Remote DoS
8893| [67377] MySQL DDL Statement Multiple Configuration Parameter DoS
8894| [66800] PHP Multiple mysqlnd_* Function Unspecified Overflow
8895| [66799] PHP mysqlnd Error Packet Handling Multiple Overflows
8896| [66731] PHP Bundled MySQL Library Unspecified Issue
8897| [66665] PHP MySQL LOAD DATA LOCAL open_basedir Bypass
8898| [65851] MySQL ALTER DATABASE #mysql50# Prefix Handling DoS
8899| [65450] phpGraphy mysql_cleanup.php include_path Parameter Remote File Inclusion
8900| [65085] MySQL Enterprise Monitor Unspecified CSRF
8901| [64843] MySQL DROP TABLE Command Symlink MyISAM Table Local Data Deletion
8902| [64588] MySQL sql/net_serv.cc my_net_skip_rest Function Large Packet Handling Remote DoS
8903| [64587] MySQL COM_FIELD_LIST Command Packet Table Name Argument Overflow
8904| [64586] MySQL COM_FIELD_LIST Command Packet Authentication Bypass
8905| [64524] Advanced Poll misc/get_admin.php mysql_host Parameter XSS
8906| [64447] Tirzen Framework (TZN) tzn_mysql.php Username Parameter SQL Injection Authentication Bypass
8907| [64320] ClanSphere MySQL Driver s_email Parameter SQL Injection
8908| [63903] MySQL sql/sql_plugin.cc mysql_uninstall_plugin Function UNINSTALL PLUGIN Command Privilege Check Weakness
8909| [63115] Quicksilver Forums mysqldump Process List Database Password Disclosure
8910| [62830] Employee Timeclock Software mysqldump Command-line Database Password Disclosure
8911| [62640] PHP mysqli_real_escape_string() Function Error Message Path Disclosure
8912| [62216] Flex MySQL Connector ActionScript SQL Query Arbitrary Code Execution
8913| [61752] kiddog_mysqldumper Extension for TYPO3 Unspecified Information Disclosure
8914| [61497] microTopic admin/mysql.php rating Parameter SQL Injection
8915| [60665] MySQL CREATE TABLE MyISAM Table mysql_unpacked_real_data_home Local Restriction Bypass
8916| [60664] MySQL sql/sql_table.cc Data Home Directory Symlink CREATE TABLE Access Restriction Bypass
8917| [60516] RADIO istek scripti estafresgaftesantusyan.inc Direct Request MySQL Database Credentials Disclosure
8918| [60489] MySQL GeomFromWKB() Function First Argument Geometry Value Handling DoS
8919| [60488] MySQL SELECT Statement WHERE Clause Sub-query DoS
8920| [60487] MySQL vio_verify_callback() Function Crafted Certificate MiTM Weakness
8921| [60356] MySql Client Library (libmysqlclient) mysql_real_connect Function Local Overflow
8922| [59907] MySQL on Windows bind-address Remote Connection Weakness
8923| [59906] MySQL on Windows Default Configuration Logging Weakness
8924| [59616] MySQL Hashed Password Weakness
8925| [59609] Suckbot mod_mysql_logger Shared Object Unspecified Remote DoS
8926| [59495] Cyrus SASL LDAP / MySQL Authentication Patch password Field SQL Injection Authentication Bypass
8927| [59062] phpMyAdmin Extension for TYPO3 MySQL Table Name Unspecified XSS
8928| [59045] phpMyAdmin Crafted MYSQL Table Name XSS
8929| [59030] mysql-ocaml for MySQL mysql_real_escape_string() Function Character Escaping Weakness
8930| [57587] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Local Privilege Escalation
8931| [57586] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Remote Shell Command Execution
8932| [56741] MySQL Connector/J Unicode w/ SJIS/Windows-31J Charset SQL Injection
8933| [56134] Virtualmin MySQL Module Execute SQL Feature Arbitrary File Access
8934| [55734] MySQL sql_parse.cc dispatch_command() Function Format String DoS
8935| [55566] MySQL Connector/NET SSL Certificate Verification Weakness
8936| [53525] MyBlog /config/mysqlconnection.inc Direct Request Information Disclosure
8937| [53524] blog+ includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
8938| [53523] blog+ includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
8939| [53522] blog+ includes/block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
8940| [53521] blog+ includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
8941| [53520] blog+ includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
8942| [53519] blog+ includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
8943| [53366] GEDCOM_TO_MYSQL php/info.php Multiple Parameter XSS
8944| [53365] GEDCOM_TO_MYSQL php/index.php nom_branche Parameter XSS
8945| [53364] GEDCOM_TO_MYSQL php/prenom.php Multiple Parameter XSS
8946| [53360] Blogplus includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
8947| [53359] Blogplus includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
8948| [53358] Blogplus includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
8949| [53357] Blogplus includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
8950| [53356] Blogplus block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
8951| [53355] Blogplus includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
8952| [53110] XOOPS Cube Legacy ErrorHandler::show() Function MySQL Error Message XSS
8953| [52729] Asterisk-addon cdr_addon_mysql.c Call Detail Record SQL Injection
8954| [52728] Tribox cdr_addon_mysql.c Call Detail Record XSS
8955| [52727] FreePBX cdr_addon_mysql.c Call Detail Record XSS
8956| [52726] Areski cdr_addon_mysql.c Call Detail Record XSS
8957| [52464] MySQL charset Column Truncation Weakness
8958| [52453] MySQL sql/item_xmlfunc.cc ExtractValue() / UpdateXML() Functions Scalar XPath DoS
8959| [52378] Cisco ANM MySQL root Account Default Password
8960| [52264] Broadcast Machine MySQLController.php controllers/baseDir Parameter Remote File Inclusion
8961| [51923] Apache HTTP Server mod-auth-mysql Module mod_auth_mysql.c Multibyte Character Encoding SQL Injection
8962| [51171] MySQL InnoDB convert_search_mode_to_innobase Function DoS
8963| [50892] MySQL Calendar index.php username Parameter SQL Injection
8964| [50827] Nodstrum MySQL Calendar nodstrumCalendarV2 Cookie Manipulation Admin Authentication Bypass
8965| [49875] PromoteWeb MySQL go.php id Parameter SQL Injection
8966| [48710] MySQL Command Line Client HTML Output XSS
8967| [48709] MySQL Quick Admin actions.php lang Parameter Traversal Local File Inclusion
8968| [48708] MySQL Quick Admin index.php language Cookie Traversal Local File Inclusion
8969| [48021] MySQL Empty Bit-String Literal Token SQL Statement DoS
8970| [47789] mysql-lists Unspecified XSS
8971| [47394] Keld PHP-MySQL News Script login.php username Parameter SQL Injection
8972| [45073] MySQLDumper Extension for TYPO3 Unspecified Authentication Bypass
8973| [44937] MySQL MyISAM Table CREATE TABLE Privilege Check Bypass
8974| [44138] Debian GNU/Linux libdspam7-drv-mysql Cron MySQL dspam Database Password Local Disclosure
8975| [44071] Phorum /include/db/mysql.php Unspecified Search SQL Injection
8976| [43180] MySQL sql_select.cc INFORMATION_SCHEMA Table Crafted Query Remote DoS
8977| [43179] MySQL Server BINLOG Statement Rights Checking Failure
8978| [42610] MySQL DEFINER View Value Crafted Statements Remote Privilege Escalation
8979| [42609] MySQL Federated Engine SHOW TABLE STATUS Query Remote DoS
8980| [42608] MySQL RENAME TABLE Symlink System Table Overwrite
8981| [42607] MySQL Multiple table-level DIRECTORY Remote Privilege Escalation
8982| [42460] MySQLDumper HTTP POST Request Remote Authentication Bypass
8983| [42423] AdventNet EventLog Analyzer MySQL Installation Default root Account
8984| [41861] Bacula make_catalog_backup Function MySQL Director Password Cleartext Disclosure
8985| [40232] PHP MySQL Banner Exchange inc/lib.inc Direct Request Database Disclosure
8986| [40188] Password Manager Pro (PMP) mysql Unspecified Remote Command Injection
8987| [39279] PHP mysql_error() Function XSS
8988| [39145] aurora framework db_mysql.lib pack_var() value Parameter SQL Injection
8989| [38567] NetClassifieds Mysql_db.php Halt_On_Error Setting Error Message Path Disclosure
8990| [38112] Excel Parser Pro sample/xls2mysql parser_path Parameter Remote File Inclusion
8991| [37880] Asterisk-Addons source/destination Numbers cdr_addon_mysql Module SQL Injection
8992| [37784] PHP MySQL Extension Multiple Function Security Restriction Bypass
8993| [37783] MySQL Community Server CREATE TABLE LIKE Table Structure Disclosure
8994| [37782] MySQL Community Server External Table View Privilege Escalation
8995| [37781] MySQL ALTER TABLE Information Disclosure
8996| [37539] GPL PHP Board db.mysql.inc.php root_path Parameter Remote File Inclusion
8997| [37195] Eve-Nuke Module for PHP-Nuke db/mysql.php phpbb_root_path
8998| [37015] paBugs class.mysql.php path_to_bt_dir Parameter Remote File Inclusion
8999| [36868] PHP MySQLi Extension LOCAL INFILE Operation Security Restriction Bypass
9000| [36867] PHP MySQL Extension LOCAL INFILE Operation Security Restriction Bypass
9001| [36771] InterWorx-CP SiteWorx mysql.php PATH_INFO Parameter XSS
9002| [36757] InterWorx-CP NodeWorx mysql.php PATH_INFO Parameter XSS
9003| [36732] MySQL Community Server Connection Protocol Malformed Password Packet Remote DoS
9004| [36251] Associated Press (AP) Newspower Default MySQL root Password
9005| [35168] Study Planner (Studiewijzer) db/mysql/db.inc.php SPL_CFG[dirroot] Parameter Remote File Inclusion
9006| [35037] Fantastico for cPanel includes/mysqlconfig.php fantasticopath Parameter Traversal Local File Inclusion
9007| [34780] Backup Manager Command Line Cleartext MySQL Password Disclosure
9008| [34766] MySQL RENAME TABLE Statement Arbitrary Table Name Modification
9009| [34765] MySQL mysql_change_db Function THD::db_access Privilege Escalation
9010| [34734] MySQL Crafted IF Clause Divide-by-zero NULL Dereference DoS
9011| [34038] MySQL Commander ressourcen/dbopen.php home Parameter Remote File Inclusion
9012| [33974] MySQL information_schema Table Subselect Single-Row DoS
9013| [33678] MySQLNewsEngine affichearticles.php3 newsenginedir Parameter Remote File Inclusion
9014| [33447] WGS-PPC (PPC Search Engine) config/mysql_config.php INC Parameter Remote File Inclusion
9015| [33372] deV!L'z Clanportal inc/filebrowser/browser.php MySQL Data Disclosure
9016| [33147] ActiveCalendar data/mysqlevents.php css Parameter XSS
9017| [32784] Storystream mysqli.php baseDir Parameter Remote File Inclusion
9018| [32783] Storystream mysql.php baseDir Parameter Remote File Inclusion
9019| [32421] Contenido CMS conlib/db_mysqli.inc Direct Request Path Disclosure
9020| [32272] JevonCMS /phplib/db_mysql.inc Direct Request Path Disclosure
9021| [32171] Blue Magic Board db_mysql_error.php Direct Request Path Disclosure
9022| [32056] BTSaveMySql Direct Request Config File Disclosure
9023| [32044] cPanel WebHost Manager (WHM) scripts/passwdmysql password Parameter XSS
9024| [32024] TikiWiki tiki-wiki_rss.php ver MySQL Credential Disclosure
9025| [31963] Agora MysqlfinderAdmin.php _SESSION[PATH_COMPOSANT] Parameter Remote File Inclusion
9026| [31431] ZoomStats libs/dbmax/mysql.php GLOBALS[lib][db][path] Parameter Remote File Inclusion
9027| [30172] TikiWiki Multiple Script Empty sort_mode Parameter MySQL Authentication Credential Disclosure
9028| [29696] MySQLDumper sql.php db Parameter XSS
9029| [29453] ConPresso CMS db_mysql.inc.php msg Parameter XSS
9030| [29122] cPanel mysqladmin/hooksadmin Unspecified Privilege Escalation
9031| [28296] MySQL Crafted multiupdate / subselects Query Local DoS
9032| [28288] MySQL Instance_options::complete_initialization Function Overflow
9033| [28030] Tutti Nova class.novaRead.mysql.php TNLIB_DIR Parameter Remote File Inclusion
9034| [28029] Tutti Nova class.novaAdmin.mysql.php TNLIB_DIR Parameter Remote File Inclusion
9035| [28028] Tutti Nova class.novaEdit.mysql.php TNLIB_DIR Parameter Remote File Inclusion
9036| [28013] MySQL SUID Routine Miscalculation Arbitrary DML Statement Execution
9037| [28012] MySQL Case Sensitivity Unauthorized Database Creation
9038| [27919] MySQL VIEW Access information_schema.views Information Disclosure
9039| [27703] MySQL MERGE Table Privilege Persistence
9040| [27593] Drupal database.mysqli.inc Multiple Parameter SQL Injection
9041| [27549] Opsware NAS /etc/init.d/mysqll MySQL root Cleartext Password Local Disclosure
9042| [27416] MySQL Server time.cc date_format Function Format String
9043| [27054] MySQL mysqld str_to_date Function NULL Argument DoS
9044| [26923] PHP/MySQL Classifieds (PHP Classifieds) search.php rate Parameter SQL Injection
9045| [26922] PHP/MySQL Classifieds (PHP Classifieds) AddAsset1.php Multiple Field XSS
9046| [26822] Bee-hive Lite include/listall.inc.php mysqlcall Parameter Remote File Inclusion
9047| [26821] Bee-hive Lite conad/include/mysqlCall.inc.php config Parameter Remote File Inclusion
9048| [26820] Bee-hive Lite conad/logout.inc.php mysqlCall Parameter Remote File Inclusion
9049| [26819] Bee-hive Lite conad/login.inc.php mysqlCall Parameter Remote File Inclusion
9050| [26818] Bee-hive Lite conad/checkPasswd.inc.php mysqlCall Parameter Remote File Inclusion
9051| [26817] Bee-hive Lite conad/changeUserDetails.inc.php mysqlCall Parameter Remote File Inclusion
9052| [26816] Bee-hive Lite conad/changeEmail.inc.php mysqlCall Parameter Remote File Inclusion
9053| [26125] Open Searchable Image Catalogue core.php do_mysql_query Function Error Message XSS
9054| [26123] Open Searchable Image Catalogue core.php do_mysql_query Function SQL Injection
9055| [25987] MySQL Multibyte Encoding SQL Injection Filter Bypass
9056| [25908] Drupal database.mysql.inc Multiple Parameter SQL Injection
9057| [25595] Apple Mac OS X MySQL Manager Blank root Password
9058| [25228] MySQL Crafted COM_TABLE_DUMP Request Arbitrary Memory Disclosure
9059| [25227] MySQL COM_TABLE_DUMP Packet Overflow
9060| [25226] MySQL Malformed Login Packet Remote Memory Disclosure
9061| [24245] Cholod Mysql Based Message Board Unspecified XSS
9062| [24244] Cholod Mysql Based Message Board mb.cgi showmessage Action SQL Injection
9063| [23963] WoltLab Burning Board class_db_mysql.php SQL Error Message XSS
9064| [23915] Netcool/NeuSecure MySQL Database Connection Restriction Bypass
9065| [23611] Aztek Forum index.php msg Variable Forced MySQL Error Information Disclosure
9066| [23526] MySQL Query NULL Charcter Logging Bypass
9067| [23157] PHP/MYSQL Timesheet changehrs.php Multiple Parameter SQL Injection
9068| [23156] PHP/MYSQL Timesheet index.php Multiple Parameter SQL Injection
9069| [22995] PAM-MySQL Authentication pam_get_item() Function Unspecified Privilege Escalation
9070| [22994] PAM-MySQL SQL Logging Facility Segfault DoS
9071| [22485] Recruitment Software admin/site.xml MySQL Authentication Credential Disclosure
9072| [22479] PHP mysqli Extension Error Message Format String
9073| [22232] PHP Pipe Variable mysql_connect() Function Overflow
9074| [21685] MySQL Auction Search Module keyword XSS
9075| [20698] Campsite notifyendsubs Cron MySQL Password Cleartext Remote Disclosure
9076| [20145] Proofpoint Protection Server Embedded MySQL Server Unpassworded root Account
9077| [19457] aMember Pro mysql.inc.php Remote File Inclusion
9078| [19377] MAXdev MD-Pro /MySQL_Tools/admin.php Path Disclosure
9079| [18899] MySQL UDF Library Arbitrary Function Load Privilege Escalation
9080| [18898] MySQL UDF LoadLibraryEx Function Nonexistent Library Load DoS
9081| [18897] MySQL on Windows UDF Create Function Traversal Privilege Escalation
9082| [18896] MySQL User-Defined Function init_syms() Function Overflow
9083| [18895] MySQL libmysqlclient.so host Parameter Remote Overflow
9084| [18894] MySQL drop database Request Remote Overflow
9085| [18622] FunkBoard mysql_install.php Email Field Arbitrary PHP Code Injection
9086| [18620] FunkBoard mysql_install.php Admin/Database Password Manipulation
9087| [18406] MySQL Eventum releases.php SQL Injection
9088| [18405] MySQL Eventum custom_fields_graph.php SQL Injection
9089| [18404] MySQL Eventum custom_fields.php SQL Injection
9090| [18403] MySQL Eventum login.php email Parameter SQL Injection Authentication Bypass
9091| [18402] MySQL Eventum get_jsrs_data.php F Parameter XSS
9092| [18401] MySQL Eventum list.php release Parameter XSS
9093| [18400] MySQL Eventum view.php id Parameter XSS
9094| [18173] MySQL on Windows USE Command MS-DOS Device Name DoS
9095| [17801] Bugzilla MySQL Replication Race Condition Information Disclosure
9096| [17223] xMySQLadmin Symlink Arbitrary File Deletion
9097| [16727] MySQL Nonexistent '--user' Error Incorrect Privilege Database Invocation
9098| [16689] MySQL mysql_install_db Symlink Arbitrary File Overwrite
9099| [16056] Plans Unspecified mySQL Remote Password Disclosure
9100| [15993] MySQL MaxDB Webtool Remote getIfHeader() WebDAV Function Remote Overflow
9101| [15817] MySQL MaxDB Web Tool getLockTokenHeader() Function Remote Overflow
9102| [15816] MySQL MaxDB Web Administration Service Malformed GET Request Overflow
9103| [15451] paNews auth.php mysql_prefix Parameter SQL Injection
9104| [14748] MySQL MS-DOS Device Names Request DoS
9105| [14678] MySQL CREATE FUNCTION Arbitrary libc Code Execution
9106| [14677] MySQL CREATE FUNCTION mysql.func Table Arbitrary Library Injection
9107| [14676] MySQL CREATE TEMPORARY TABLE Symlink Privilege Escalation
9108| [14386] phpMyAdmin mysqli.dbi.lib.php Path Disclosure
9109| [14052] Symantec Brightmail AntiSpam Multiple Default MySQL Accounts
9110| [13086] MySQL MaxDB Web Agent Malformed HTTP Header DoS
9111| [13085] MySQL MaxDB Web Agent WebDAV sapdbwa_GetUserData() Function Remote DoS
9112| [13013] MySQL mysqlaccess.sh Symlink Arbitrary File Manipulation
9113| [12919] MySQL MaxDB WebAgent websql Remote Overflow
9114| [12779] MySQL User Defined Function Privilege Escalation
9115| [12609] MySQL Eventum projects.php Multiple Parameter XSS
9116| [12608] MySQL Eventum preferences.php Multiple Parameter XSS
9117| [12607] MySQL Eventum forgot_password.php email Parameter XSS
9118| [12606] MySQL Eventum index.php email Parameter XSS
9119| [12605] MySQL Eventum Default Vendor Account
9120| [12275] MySQL MaxDB Web Tools wahttp Nonexistent File Request DoS
9121| [12274] MySQL MaxDB Web Tools WebDAV Handler Remote Overflow
9122| [11689] Roxen Web Server MySQL Socket Permission Weakness
9123| [10985] MySQL MATCH..AGAINST Query DoS
9124| [10959] MySQL GRANT ALL ON Privilege Escalation
9125| [10660] MySQL ALTER TABLE/RENAME Forces Old Permission Checks
9126| [10659] MySQL ALTER MERGE Tables to Change the UNION DoS
9127| [10658] MySQL mysql_real_connect() Function Remote Overflow
9128| [10532] MySQL MaxDB webdbm Server Field DoS
9129| [10491] AWS MySQLguest AWSguest.php Script Insertion
9130| [10244] MySQL libmysqlclient Prepared Statements API Overflow
9131| [10226] MySQLGuest AWSguest.php Multiple Field XSS
9132| [9912] PHP safe_mode MySQL Database Access Restriction Bypass
9133| [9911] Inter7 vpopmail MySQL Module Authentication Credential Disclosure
9134| [9910] MySQL mysql_change_user() Double-free Memory Pointer DoS
9135| [9909] MySQL datadir/my.cnf Modification Privilege Escalation
9136| [9908] MySQL my.ini Initialization File datadir Parameter Overflow
9137| [9907] MySQL SELECT Statement String Handling Overflow
9138| [9906] MySQL GRANT Privilege Arbitrary Password Modification
9139| [9509] teapop MySQL Authentication Module SQL Injection
9140| [9018] MySQL Backup Pro getbackup() Method Unspecified Issue
9141| [9015] MySQL mysqlhotcopy Insecure Temporary File Creation
9142| [8997] Cacti config.php MySQL Authentication Credential Cleartext Disclosure
9143| [8979] MySQL SHOW GRANTS Encrypted Password Disclosure
9144| [8889] MySQL COM_TABLE_DUMP Package Negative Integer DoS
9145| [8888] MySQL COM_CHANGE_USER Command Long Repsonse Overflow
9146| [8887] MySQL COM_CHANGE_USER Command One Character Password Brute Force
9147| [8886] MySQL libmysqlclient Library read_one_row Overflow
9148| [8885] MySQL libmysqlclient Library read_rows Overflow
9149| [7476] MySQL Protocol 4.1 Authentication Scramble String Overflow
9150| [7475] MySQL Zero-length Scrambled String Crafted Packet Authentication Bypass
9151| [7245] MySQL Pluggable Authentication Module (pam_mysql) Password Disclosure
9152| [7128] MySQL show database Database Name Exposure
9153| [6716] MySQL Database Engine Weak Authentication Information Disclosure
9154| [6605] MySQL mysqld Readable Log File Information Disclosure
9155| [6443] PowerPhlogger db_dump.php View Arbitrary mySQL Dump
9156| [6421] MySQL mysqld_multi Symlink Arbitrary File Overwrite
9157| [6420] MySQL mysqlbug Symlink Arbitrary File Overwrite
9158| [2537] MySQL sql_acl.cc get_salt_from_password Function Password Handling Remote Overflow
9159| [2144] WinMySQLadmin my.ini Cleartext Password Disclosure
9160| [653] PCCS-Linux MySQL Database Admin Tool Authentication Credential Disclosure
9161| [520] MySQL Database Name Traversal Arbitrary File Modification
9162| [380] MySQL Server on Windows Default Null Root Password
9163| [261] MySQL Short Check String Authentication Bypass
9164|_
9165Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
9166Aggressive OS guesses: HP P2000 G3 NAS device (96%), Android 4.1 (Linux 3.0) (95%), Linux 2.6.32 (95%), OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (95%), Linux 3.2 (95%), Linux 3.5 (95%), Linux 3.8 (95%), Lorex NV408 video recorder (95%), MikroTik RouterOS 6.32.1 (95%), MikroTik RouterOS 6.34 (95%)
9167No exact OS matches for host (test conditions non-ideal).
9168Network Distance: 14 hops
9169
9170TRACEROUTE (using port 3306/tcp)
9171HOP RTT ADDRESS
91721 109.06 ms 10.250.204.1
91732 109.15 ms 104.245.145.177
91743 87.39 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
91754 88.87 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41)
91765 118.50 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
91776 86.26 ms ix-ae-16-0.tcore1.tnk-toronto.as6453.net (64.86.33.98)
91787 118.56 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
91798 118.59 ms if-ae-8-2.tcore1.ct8-chicago.as6453.net (66.110.48.2)
91809 118.61 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28)
918110 118.64 ms if-ae-12-2.tcore1.n75-new-york.as6453.net (66.110.96.5)
918211 149.62 ms 66.110.96.22
918312 ... 13
918414 56.06 ms teenidols4you.com (45.55.35.220)
9185#######################################################################################################################################
9186 Anonymous JTSEC #OpDeathEathers Full Recon #7