/*! Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one or more contributor license agreements. * Licensed under the Elastic License 2.0; you may not use this file except in compliance with the Elastic License 2.0. */ (window.securitySolution_bundle_jsonpfunction=window.securitySolution_bundle_jsonpfunction||[]).push([[20],{1634:function(t){t.exports=JSON.parse('{"2000015":["http://www.lurhq.com/phatbot.html","http://doc.emergingthreats.net/bin/view/Main/2000015"],"2000026":["http://doc.emergingthreats.net/2000026"],"2000105":["http://doc.emergingthreats.net/2000105"],"2000106":["http://doc.emergingthreats.net/2000106"],"2000328":["http://doc.emergingthreats.net/2000328"],"2000332":["http://www.giac.org/practical/GCIH/Ian_Gosling_GCIH.pdf","http://doc.emergingthreats.net/bin/view/Main/2000332"],"2000333":["http://www.giac.org/practical/GCIH/Ian_Gosling_GCIH.pdf","http://doc.emergingthreats.net/bin/view/Main/2000333"],"2000334":["http://bitconjurer.org/BitTorrent/protocol.html","http://doc.emergingthreats.net/bin/view/Main/2000334"],"2000345":["http://doc.emergingthreats.net/bin/view/Main/2000345"],"2000347":["http://doc.emergingthreats.net/bin/view/Main/2000347"],"2000348":["http://doc.emergingthreats.net/bin/view/Main/2000348"],"2000349":["http://doc.emergingthreats.net/bin/view/Main/2000349"],"2000350":["http://doc.emergingthreats.net/bin/view/Main/2000350"],"2000351":["http://doc.emergingthreats.net/bin/view/Main/2000351"],"2000352":["http://doc.emergingthreats.net/bin/view/Main/2000352"],"2000355":["http://doc.emergingthreats.net/2000355"],"2000357":["http://bitconjurer.org/BitTorrent/protocol.html","http://doc.emergingthreats.net/bin/view/Main/2000357"],"2000369":["http://bitconjurer.org/BitTorrent/protocol.html","http://doc.emergingthreats.net/bin/view/Main/2000369"],"2000418":["http://www.itee.uq.edu.au/~cristina/students/david/honoursThesis96/bff.htm","http://doc.emergingthreats.net/bin/view/Main/2000418"],"2000488":["http://owasp.org/index.php/SQL_Injection","http://doc.emergingthreats.net/bin/view/Main/2000488"],"2000499":["http://doc.emergingthreats.net/bin/view/Main/2000499"],"2000500":["http://doc.emergingthreats.net/bin/view/Main/2000500"],"2000501":["http://doc.emergingthreats.net/bin/view/Main/2000501"],"2000502":["http://doc.emergingthreats.net/bin/view/Main/2000502"],"2000503":["http://doc.emergingthreats.net/bin/view/Main/2000503"],"2000504":["http://doc.emergingthreats.net/bin/view/Main/2000504"],"2000505":["http://doc.emergingthreats.net/bin/view/Main/2000505"],"2000506":["http://doc.emergingthreats.net/bin/view/Main/2000506"],"2000507":["http://doc.emergingthreats.net/bin/view/Main/2000507"],"2000508":["http://doc.emergingthreats.net/bin/view/Main/2000508"],"2000563":["http://doc.emergingthreats.net/bin/view/Main/2000563"],"2000564":["http://doc.emergingthreats.net/bin/view/Main/2000564"],"2000565":["http://doc.emergingthreats.net/bin/view/Main/2000565"],"2000566":["http://doc.emergingthreats.net/bin/view/Main/2000566"],"2000567":["http://doc.emergingthreats.net/bin/view/Main/2000567"],"2000568":["http://doc.emergingthreats.net/bin/view/Main/2000568"],"2000571":["http://doc.emergingthreats.net/bin/view/Main/2000571"],"2000575":["http://www.ks-soft.net/ip-tools.eng","http://www.ks-soft.net/ip-tools.eng/index.htm","http://doc.emergingthreats.net/2000575"],"2000586":["http://www.ezula.com","http://www.spyany.com/program/article_spw_rm_eZuLa.html","http://doc.emergingthreats.net/2000586"],"2000596":["http://www3.ca.com/securityadvisor/pest/content.aspx?q=67999","http://doc.emergingthreats.net/bin/view/Main/2000596"],"2001031":["http://www.888casino.net","http://doc.emergingthreats.net/bin/view/Main/2001031"],"2001035":["http://www.morpheus.com","http://doc.emergingthreats.net/bin/view/Main/2001035"],"2001036":["http://www.morpheus.com","http://doc.emergingthreats.net/bin/view/Main/2001036"],"2001037":["http://www.morpheus.com","http://doc.emergingthreats.net/bin/view/Main/2001037"],"2001052":["http://doc.emergingthreats.net/bin/view/Main/2001052"],"2001053":["http://doc.emergingthreats.net/bin/view/Main/2001053"],"2001059":["http://www.aresgalaxy.org","http://doc.emergingthreats.net/bin/view/Main/2001059"],"2001187":["http://www.slsknet.org","http://doc.emergingthreats.net/bin/view/Main/2001187"],"2001188":["http://www.slsknet.org","http://doc.emergingthreats.net/bin/view/Main/2001188"],"2001195":["http://www.securiteam.com/unixfocus/5ZP0C0KDPG.html","http://doc.emergingthreats.net/bin/view/Main/2001195"],"2001197":["http://www.waraxe.us/index.php?modname=sa&id=35","http://doc.emergingthreats.net/2001197"],"2001202":["http://www.waraxe.us/?modname=sa&id=030","http://www.waraxe.us/?modname=sa&id=036","http://doc.emergingthreats.net/2001202"],"2001219":["http://en.wikipedia.org/wiki/Brute_force_attack","http://doc.emergingthreats.net/2001219"],"2001223":["http://www.regnow.com","http://doc.emergingthreats.net/bin/view/Main/2001223"],"2001239":["http://doc.emergingthreats.net/bin/view/Main/2001239"],"2001240":["http://doc.emergingthreats.net/bin/view/Main/2001240"],"2001254":["http://doc.emergingthreats.net/2001254"],"2001256":["http://doc.emergingthreats.net/2001256"],"2001257":["http://doc.emergingthreats.net/2001257"],"2001258":["http://doc.emergingthreats.net/2001258"],"2001259":["http://doc.emergingthreats.net/2001259"],"2001262":["http://doc.emergingthreats.net/2001262"],"2001263":["http://doc.emergingthreats.net/2001263"],"2001294":["http://doc.emergingthreats.net/2001294"],"2001298":["http://www.edonkey.com","http://doc.emergingthreats.net/bin/view/Main/2001298"],"2001306":["http://malware.wikia.com/wiki/Claria_Corporation","http://doc.emergingthreats.net/bin/view/Main/2001306"],"2001317":["http://securityresponse.symantec.com/avcenter/venc/data/spyware.webhancer.html","http://doc.emergingthreats.net/bin/view/Main/2001317"],"2001325":["http://doc.emergingthreats.net/bin/view/Main/2001325"],"2001330":["http://doc.emergingthreats.net/2001330"],"2001334":["http://www.ezula.com","http://www.spyany.com/program/article_spw_rm_eZuLa.html","http://doc.emergingthreats.net/bin/view/Main/2001334"],"2001339":["http://sarc.com/avcenter/venc/data/pf/adware.betterinternet.html","http://doc.emergingthreats.net/bin/view/Main/2001339"],"2001395":["http://www.isearchtech.com","http://doc.emergingthreats.net/bin/view/Main/2001395"],"2001418":["http://research.sunbelt-software.com/threatdisplay.aspx?name=E2Give&threatid=4728","http://doc.emergingthreats.net/bin/view/Main/2001418"],"2001427":["http://doc.emergingthreats.net/2001427"],"2001448":["http://securityresponse.symantec.com/avcenter/venc/data/adware.winad.html","http://doc.emergingthreats.net/bin/view/Main/2001448"],"2001472":["http://doc.emergingthreats.net/bin/view/Main/2001472","http://www.threatexpert.com/report.aspx?md5=17c204bb156dd7f6a3ebd1547129f347","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AWin32%2FZdesnado.AD&ThreatID=-2147454482"],"2001474":["http://doc.emergingthreats.net/bin/view/Main/2001474"],"2001475":["http://doc.emergingthreats.net/bin/view/Main/2001475"],"2001480":["http://doc.emergingthreats.net/bin/view/Main/2001480"],"2001483":["http://doc.emergingthreats.net/bin/view/Main/2001483"],"2001488":["http://doc.emergingthreats.net/bin/view/Main/2001488"],"2001493":["http://www.isearchtech.com","http://doc.emergingthreats.net/2001493"],"2001494":["http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453082745","http://doc.emergingthreats.net/bin/view/Main/2001494"],"2001496":["http://doc.emergingthreats.net/bin/view/Main/2001496"],"2001497":["http://doc.emergingthreats.net/bin/view/Main/2001497"],"2001498":["http://doc.emergingthreats.net/2001498"],"2001499":["http://securityresponse.symantec.com/avcenter/venc/data/adware.look2me.html","http://doc.emergingthreats.net/bin/view/Main/2001499"],"2001500":["http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453082745","http://doc.emergingthreats.net/bin/view/Main/2001500"],"2001533":["http://www.searchmiracle.com/silent.exe","http://doc.emergingthreats.net/bin/view/Main/2001533"],"2001534":["http://www.searchmiracle.com","http://doc.emergingthreats.net/bin/view/Main/2001534"],"2001535":["http://www.searchmiracle.com","http://doc.emergingthreats.net/bin/view/Main/2001535"],"2001543":["http://doc.emergingthreats.net/bin/view/Main/2001543"],"2001544":["http://doc.emergingthreats.net/bin/view/Main/2001544"],"2001562":["http://www.marketscore.com","http://www.spysweeper.com/remove-marketscore.html","http://doc.emergingthreats.net/2001562"],"2001564":["http://www.marketscore.com","http://www.spysweeper.com/remove-marketscore.html","http://doc.emergingthreats.net/bin/view/Main/2001564"],"2001569":["http://doc.emergingthreats.net/2001569"],"2001576":["http://sarc.com/avcenter/venc/data/pf/adware.betterinternet.html","http://doc.emergingthreats.net/bin/view/Main/2001576"],"2001579":["http://doc.emergingthreats.net/2001579"],"2001580":["http://doc.emergingthreats.net/2001580"],"2001581":["http://doc.emergingthreats.net/2001581"],"2001582":["http://doc.emergingthreats.net/2001582"],"2001583":["http://doc.emergingthreats.net/2001583"],"2001595":["http://www1.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-039-04.pdf","http://doc.emergingthreats.net/2001595"],"2001597":["http://www.netop.com","http://doc.emergingthreats.net/2001597"],"2001616":["http://doc.emergingthreats.net/bin/view/Main/2001616"],"2001622":["http://doc.emergingthreats.net/bin/view/Main/2001622"],"2001623":["http://doc.emergingthreats.net/bin/view/Main/2001623"],"2001624":["http://doc.emergingthreats.net/bin/view/Main/2001624"],"2001664":["http://www.gnutella.com","http://doc.emergingthreats.net/bin/view/Main/2001664"],"2001668":["http://doc.emergingthreats.net/bin/view/Main/2001668"],"2001677":["http://securityresponse.symantec.com/avcenter/venc/data/spyware.webhancer.html","http://doc.emergingthreats.net/bin/view/Main/2001677"],"2001699":["http://www.ysbweb.com","http://doc.emergingthreats.net/2001699"],"2001702":["http://doc.emergingthreats.net/2001702"],"2001703":["http://doc.emergingthreats.net/2001703"],"2001704":["http://doc.emergingthreats.net/bin/view/Main/2001704"],"2001706":["http://doc.emergingthreats.net/2001706"],"2001707":["http://doc.emergingthreats.net/2001707"],"2001731":["http://securityresponse.symantec.com/avcenter/venc/data/adware.surfsidekick.html","http://doc.emergingthreats.net/bin/view/Main/2001731"],"2001736":["http://doc.emergingthreats.net/2001736"],"2001743":["http://securityresponse.symantec.com/avcenter/venc/data/backdoor.hackdefender.html","http://doc.emergingthreats.net/2001743"],"2001746":["http://doc.emergingthreats.net/2001746"],"2001753":["http://doc.emergingthreats.net/bin/view/Main/2001753"],"2001754":["http://doc.emergingthreats.net/bin/view/Main/2001754"],"2001761":["http://isc.sans.org/diary.php?date=2005-03-04","http://doc.emergingthreats.net/bin/view/Main/2001761"],"2001768":["http://www.wiretrip.net/rfp/p/doc.asp/i2/d42.htm","http://doc.emergingthreats.net/2001768"],"2001783":["http://www.benedelman.org/news/010205-1.html","http://static.windupdates.com/Release/v19/Info.txt","http://doc.emergingthreats.net/bin/view/Main/2001783"],"2001796":["http://www.kazaa.com/us/index.htm","http://doc.emergingthreats.net/bin/view/Main/2001796"],"2001801":["http://doc.emergingthreats.net/2001801"],"2001802":["http://doc.emergingthreats.net/2001802"],"2001803":["http://doc.emergingthreats.net/2001803"],"2001804":["http://doc.emergingthreats.net/2001804"],"2001805":["http://doc.emergingthreats.net/2001805"],"2001808":["http://www.limewire.com","http://doc.emergingthreats.net/bin/view/Main/2001808"],"2001809":["http://www.limewire.com","http://doc.emergingthreats.net/bin/view/Main/2001809"],"2001811":["http://doc.emergingthreats.net/2001811"],"2001852":["http://doc.emergingthreats.net/2001852"],"2001853":["http://doc.emergingthreats.net/2001853"],"2001854":["http://doc.emergingthreats.net/2001854"],"2001855":["http://doc.emergingthreats.net/2001855"],"2001858":["http://doc.emergingthreats.net/2001858"],"2001864":["http://doc.emergingthreats.net/2001864"],"2001865":["http://doc.emergingthreats.net/2001865"],"2001867":["http://doc.emergingthreats.net/2001867"],"2001868":["http://doc.emergingthreats.net/2001868"],"2001869":["http://doc.emergingthreats.net/2001869"],"2001870":["http://doc.emergingthreats.net/2001870"],"2001871":["http://doc.emergingthreats.net/2001871"],"2001872":["http://doc.emergingthreats.net/2001872"],"2001890":["http://toolbarpartner.com","http://doc.emergingthreats.net/bin/view/Main/2001890"],"2001891":["http://doc.emergingthreats.net/bin/view/Main/2001891"],"2001906":["http://www.redferni.uklinux.net/mysql/MySQL-323.html","http://doc.emergingthreats.net/2001906"],"2001972":["http://doc.emergingthreats.net/2001972"],"2001992":["http://securityresponse.symantec.com/avcenter/venc/data/adware.surfsidekick.html","http://doc.emergingthreats.net/bin/view/Main/2001992"],"2001995":["http://www3.ca.com/securityadvisor/pest/pest.aspx?id=58660","http://doc.emergingthreats.net/bin/view/Main/2001995"],"2001996":["http://doc.emergingthreats.net/2001996"],"2002002":["http://doc.emergingthreats.net/2002002"],"2002005":["http://doc.emergingthreats.net/2002005"],"2002021":["http://doc.emergingthreats.net/2002021"],"2002023":["http://doc.emergingthreats.net/2002023"],"2002024":["http://doc.emergingthreats.net/2002024"],"2002025":["http://doc.emergingthreats.net/2002025"],"2002026":["http://doc.emergingthreats.net/2002026"],"2002027":["http://doc.emergingthreats.net/2002027"],"2002028":["http://doc.emergingthreats.net/2002028"],"2002029":["http://doc.emergingthreats.net/2002029"],"2002030":["http://doc.emergingthreats.net/2002030"],"2002032":["http://doc.emergingthreats.net/2002032"],"2002034":["http://doc.emergingthreats.net/bin/view/Main/2002034"],"2002038":["http://doc.emergingthreats.net/2002038"],"2002071":["http://castlecops.com/tk781-Xupitertoolbar_dll_t_dll.html","http://doc.emergingthreats.net/2002071"],"2002078":["http://doc.emergingthreats.net/2002078","http://github.com/chetan51/sidestep/"],"2002080":["http://doc.emergingthreats.net/2002080"],"2002087":["http://doc.emergingthreats.net/2002087"],"2002092":["http://www.yupsearch.com","http://doc.emergingthreats.net/bin/view/Main/2002092"],"2002098":["http://www.yupsearch.com","http://doc.emergingthreats.net/bin/view/Main/2002098"],"2002154":["http://doc.emergingthreats.net/bin/view/Main/2002154"],"2002157":["http://doc.emergingthreats.net/2002157"],"2002160":["http://www.spywareguide.com/product_show.php?id=599","http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453075759","http://www.doxdesk.com/parasite/CoolWebSearch.html","http://doc.emergingthreats.net/2002160"],"2002164":["http://www.doxdesk.com/parasite/Hotbar.html","http://www.pchell.com/support/hotbar.shtml","http://doc.emergingthreats.net/2002164"],"2002167":["http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453076771","http://doc.emergingthreats.net/2002167"],"2002192":["http://doc.emergingthreats.net/2002192"],"2002196":["http://doc.emergingthreats.net/bin/view/Main/2002196"],"2002327":["http://talk.google.com","http://www.xmpp.org","http://doc.emergingthreats.net/2002327"],"2002330":["http://talk.google.com","http://www.xmpp.org","http://doc.emergingthreats.net/2002330"],"2002334":["http://www.google.com/talk","http://doc.emergingthreats.net/2002334"],"2002363":["http://doc.emergingthreats.net/2002363"],"2002371":["http://www.securityfocus.com/bid/14828","http://smallbusiness.miva.com/products/mia/","http://www.frsirt.com/english/advisories/2005/1758","http://doc.emergingthreats.net/2002371"],"2002383":["http://doc.emergingthreats.net/2002383"],"2002384":["http://doc.emergingthreats.net/2002384"],"2002386":["http://doc.emergingthreats.net/2002386"],"2002395":["http://www.miva.com","http://www.findwhat.com","http://doc.emergingthreats.net/2002395"],"2002396":["http://www.miva.com","http://doc.emergingthreats.net/2002396"],"2002400":["http://doc.emergingthreats.net/bin/view/Main/2002400"],"2002402":["http://www.websearch.com","http://doc.emergingthreats.net/bin/view/Main/2002402"],"2002403":["http://www.contextplus.net","http://doc.emergingthreats.net/2002403"],"2002405":["http://www.internet-optimizer.com","http://doc.emergingthreats.net/2002405"],"2002659":["http://doc.emergingthreats.net/2002659"],"2002663":["http://www.securityfocus.com/bid/15125","http://doc.emergingthreats.net/2002663"],"2002664":["http://www.nessus.org","http://doc.emergingthreats.net/2002664"],"2002671":["http://www.securityfocus.com/bid/15313","http://doc.emergingthreats.net/2002671"],"2002677":["http://www.cirt.net/code/nikto.shtml","http://doc.emergingthreats.net/2002677"],"2002678":["http://www.securityfocus.com/bid/15418","http://doc.emergingthreats.net/2002678"],"2002710":["http://iframecash.biz","http://isc.sans.org/diary.php?storyid=868","http://doc.emergingthreats.net/bin/view/Main/2002710"],"2002735":["http://www.zenotecnico.com","http://doc.emergingthreats.net/bin/view/Main/2002735"],"2002737":["http://www.zenotecnico.com","http://doc.emergingthreats.net/bin/view/Main/2002737"],"2002739":["http://doc.emergingthreats.net/2002739"],"2002760":["http://doc.emergingthreats.net/bin/view/Main/2002760"],"2002761":["http://doc.emergingthreats.net/bin/view/Main/2002761"],"2002762":["http://www.sophos.com/virusinfo/analyses/trojtorpigr.html","http://doc.emergingthreats.net/2002762"],"2002763":["http://www.norman.com/Virus/Virus_descriptions/24279/","http://doc.emergingthreats.net/2002763"],"2002790":["http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_HAXDOOR.DI","http://doc.emergingthreats.net/2002790","http://www.symantec.com/security_response/writeup.jsp?docid=2003-113016-1420-99&tabid=2","http://www.threatexpert.com/report.aspx?md5=e787c4437ff67061983cd08458f71c94","http://www.threatexpert.com/report.aspx?md5=d86b9eaf9682d60cb8b928dc6ac40954","http://www.threatexpert.com/report.aspx?md5=1777f0ffa890ebfcc7587957f2d08dca"],"2002801":["http://news.com.com/2100-1032_3-6038197.html","http://doc.emergingthreats.net/2002801"],"2002803":["http://www.microsoft.com/technet/security/Bulletin/ms06-005.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-0006","http://www.securityfocus.com/bid/16633","http://doc.emergingthreats.net/bin/view/Main/2002803"],"2002808":["http://doc.emergingthreats.net/2002808"],"2002809":["http://doc.emergingthreats.net/bin/view/Main/2002809"],"2002810":["http://doc.emergingthreats.net/bin/view/Main/2002810"],"2002811":["http://doc.emergingthreats.net/bin/view/Main/2002811"],"2002814":["http://en.wikipedia.org/wiki/Direct_connect_file-sharing_application","http://doc.emergingthreats.net/bin/view/Main/2002814"],"2002823":["http://www.gnu.org/software/wget/","http://doc.emergingthreats.net/2002823"],"2002825":["http://curl.haxx.se","http://doc.emergingthreats.net/2002825"],"2002827":["http://gobsd.com/code/freebsd/lib/libfetch","http://doc.emergingthreats.net/2002827"],"2002839":["http://doc.emergingthreats.net/bin/view/Main/2002839"],"2002840":["http://doc.emergingthreats.net/bin/view/Main/2002840"],"2002841":["http://doc.emergingthreats.net/bin/view/Main/2002841"],"2002842":["http://www.redferni.uklinux.net/mysql/MySQL-Protocol.html","http://doc.emergingthreats.net/2002842"],"2002866":["http://www.winpcap.org","http://doc.emergingthreats.net/2002866"],"2002872":["http://doc.emergingthreats.net/2002872"],"2002874":["http://doc.emergingthreats.net/2002874"],"2002878":["http://hcsoftware.sourceforge.net/jason-rohrer/itms4all/","http://doc.emergingthreats.net/2002878"],"2002879":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2009","http://www.securityfocus.com/bid/17670","http://doc.emergingthreats.net/2002879"],"2002901":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2149","http://www.osvdb.org/25158","http://doc.emergingthreats.net/2002901"],"2002910":["http://doc.emergingthreats.net/2002910"],"2002911":["http://doc.emergingthreats.net/2002911"],"2002929":["http://doc.emergingthreats.net/2002929","http://www.symantec.com/security_response/writeup.jsp?docid=2003-113016-1420-99&tabid=2","http://www.threatexpert.com/report.aspx?md5=e787c4437ff67061983cd08458f71c94","http://www.threatexpert.com/report.aspx?md5=d86b9eaf9682d60cb8b928dc6ac40954","http://www.threatexpert.com/report.aspx?md5=1777f0ffa890ebfcc7587957f2d08dca","http://www.threatexpert.com/report.aspx?md5=0995ecb8bb78f510ae995a50be0c351a"],"2002931":["http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453076035","http://doc.emergingthreats.net/bin/view/Main/2002931"],"2002935":["http://www.linpro.no/lwp/","http://doc.emergingthreats.net/2002935"],"2002943":["http://docs.python.org/lib/module-urllib.html","http://doc.emergingthreats.net/2002943"],"2002945":["http://www.mozilla.org/docs/netlib/seealso/netmods.html","http://doc.emergingthreats.net/2002945"],"2002950":["http://tor.eff.org","http://doc.emergingthreats.net/2002950"],"2002951":["http://tor.eff.org","http://doc.emergingthreats.net/2002951"],"2002952":["http://tor.eff.org","http://doc.emergingthreats.net/2002952"],"2002953":["http://tor.eff.org","http://doc.emergingthreats.net/2002953"],"2002955":["http://www.threatexpert.com/report.aspx?md5=65448c8678f03253ef380c375d6670ce"],"2002959":["http://doc.emergingthreats.net/2002959"],"2002966":["http://elitemediagroup.net","http://doc.emergingthreats.net/bin/view/Main/2002966"],"2002967":["http://dollarrevenue.com","http://doc.emergingthreats.net/bin/view/Main/2002967"],"2002976":["http://www.avira.com/en/threats/section/details/id_vir/1836/tr_banker.delf.df735649.html","http://doc.emergingthreats.net/2002976"],"2002977":["http://www.viruslist.com/en/viruses/encyclopedia?virusid=95586","http://doc.emergingthreats.net/2002977"],"2002979":["http://www.soft-central.net/keylog.php","http://doc.emergingthreats.net/2002979"],"2002981":["http://www.avira.com/en/threats/section/details/id_vir/1836/tr_banker.delf.df735649.html","http://doc.emergingthreats.net/2002981"],"2002992":["http://doc.emergingthreats.net/2002992"],"2002993":["http://doc.emergingthreats.net/2002993"],"2002994":["http://doc.emergingthreats.net/2002994"],"2002995":["http://doc.emergingthreats.net/2002995"],"2003047":["http://doc.emergingthreats.net/2003047"],"2003055":["http://doc.emergingthreats.net/bin/view/Main/2003055"],"2003060":["http://securityresponse.symantec.com/avcenter/venc/data/pf/adware.180search.html","http://doc.emergingthreats.net/bin/view/Main/2003060"],"2003062":["http://doc.emergingthreats.net/2003062"],"2003066":["http://www.sophos.com/virusinfo/analyses/trojtorpigr.html","http://doc.emergingthreats.net/2003066"],"2003068":["http://en.wikipedia.org/wiki/Brute_force_attack","http://doc.emergingthreats.net/2003068"],"2003071":["http://doc.emergingthreats.net/bin/view/Main/2003071"],"2003089":["http://doc.emergingthreats.net/bin/view/Main/2003089"],"2003149":["http://doc.emergingthreats.net/bin/view/Main/2003149"],"2003150":["http://doc.emergingthreats.net/bin/view/Main/2003150"],"2003155":["http://doc.emergingthreats.net/2003155"],"2003171":["http://ftp.inf.utfsm.cl/pub/Docs/IBM/Tivoli/pdfs/sg246021.pdf","http://doc.emergingthreats.net/2003171"],"2003187":["http://www.viruslist.com/en/viruses/encyclopedia?virusid=87732","http://doc.emergingthreats.net/2003187"],"2003188":["http://www.viruslist.com/en/viruses/encyclopedia?virusid=87732","http://doc.emergingthreats.net/2003188"],"2003189":["http://www.viruslist.com/en/viruses/encyclopedia?virusid=87732","http://doc.emergingthreats.net/2003189"],"2003192":["http://doc.emergingthreats.net/2003192"],"2003193":["http://doc.emergingthreats.net/2003193"],"2003194":["http://doc.emergingthreats.net/2003194"],"2003209":["http://doc.emergingthreats.net/bin/view/Main/2003209"],"2003210":["http://doc.emergingthreats.net/bin/view/Main/2003210"],"2003224":["http://www.budsinc.com","http://doc.emergingthreats.net/2003224"],"2003239":["http://doc.emergingthreats.net/2003239"],"2003243":["http://doc.emergingthreats.net/bin/view/Main/2003243"],"2003244":["http://securityresponse.symantec.com/avcenter/venc/data/backdoor.hackdefender.html","http://doc.emergingthreats.net/2003244"],"2003245":["http://securityresponse.symantec.com/avcenter/venc/data/backdoor.hackdefender.html","http://doc.emergingthreats.net/2003245"],"2003254":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003254"],"2003255":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003255"],"2003256":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003256"],"2003257":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003257"],"2003258":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003258"],"2003259":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003259"],"2003260":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003260"],"2003261":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003261"],"2003262":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003262"],"2003263":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003263"],"2003266":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003266"],"2003267":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003267"],"2003268":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003268"],"2003269":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003269"],"2003270":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003270"],"2003271":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003271"],"2003272":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003272"],"2003273":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003273"],"2003274":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003274"],"2003275":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003275"],"2003276":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003276"],"2003277":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003277"],"2003278":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003278"],"2003279":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003279"],"2003280":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003280"],"2003281":["http://handlers.sans.org/wsalusky/rants/","http://en.wikipedia.org/wiki/SOCKS","http://ss5.sourceforge.net/socks4.protocol.txt","http://ss5.sourceforge.net/socks4A.protocol.txt","http://www.ietf.org/rfc/rfc1928.txt","http://www.ietf.org/rfc/rfc1929.txt","http://www.ietf.org/rfc/rfc1961.txt","http://www.ietf.org/rfc/rfc3089.txt","http://doc.emergingthreats.net/bin/view/Main/2003281"],"2003306":["http://securityresponse.symantec.com/avcenter/venc/data/pf/adware.180search.html","http://doc.emergingthreats.net/bin/view/Main/2003306"],"2003311":["http://www.giac.org/certified_professionals/practicals/gcih/0446.php","http://doc.emergingthreats.net/bin/view/Main/2003311"],"2003312":["http://www.giac.org/certified_professionals/practicals/gcih/0446.php","http://doc.emergingthreats.net/bin/view/Main/2003312"],"2003319":["http://www.giac.org/certified_professionals/practicals/gcih/0446.php","http://doc.emergingthreats.net/bin/view/Main/2003319"],"2003326":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-0015","http://www.securityfocus.com/bid/21829","http://doc.emergingthreats.net/2003326"],"2003327":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-0015","http://www.securityfocus.com/bid/21829","http://doc.emergingthreats.net/2003327"],"2003337":["http://doc.emergingthreats.net/bin/view/Main/2003337"],"2003344":["http://doc.emergingthreats.net/bin/view/Main/2003344"],"2003346":["http://doc.emergingthreats.net/2003346"],"2003347":["http://doc.emergingthreats.net/2003347"],"2003351":["http://doc.emergingthreats.net/bin/view/Main/2003351"],"2003352":["http://doc.emergingthreats.net/bin/view/Main/2003352"],"2003355":["http://doc.emergingthreats.net/2003355"],"2003356":["http://doc.emergingthreats.net/bin/view/Main/2003356"],"2003380":["http://doc.emergingthreats.net/2003380"],"2003383":["http://doc.emergingthreats.net/2003383"],"2003384":["http://doc.emergingthreats.net/2003384"],"2003387":["http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453096347","http://doc.emergingthreats.net/2003387"],"2003390":["http://www.symantec.com/security_response/writeup.jsp?docid=2005-062716-0109-99","http://doc.emergingthreats.net/bin/view/Main/2003390"],"2003396":["http://doc.emergingthreats.net/2003396"],"2003398":["http://doc.emergingthreats.net/2003398"],"2003405":["http://doc.emergingthreats.net/2003405"],"2003406":["http://doc.emergingthreats.net/2003406"],"2003407":["http://doc.emergingthreats.net/2003407"],"2003425":["http://doc.emergingthreats.net/2003425"],"2003426":["http://doc.emergingthreats.net/bin/view/Main/2003426"],"2003428":["http://doc.emergingthreats.net/2003428"],"2003439":["http://doc.emergingthreats.net/2003439"],"2003440":["http://doc.emergingthreats.net/bin/view/Main/2003440"],"2003445":["http://doc.emergingthreats.net/bin/view/Main/2003445"],"2003457":["http://doc.emergingthreats.net/2003457"],"2003458":["http://doc.emergingthreats.net/2003458"],"2003464":["http://www.warftp.org","http://doc.emergingthreats.net/bin/view/Main/2003464"],"2003465":["http://www.freeftp.com","http://doc.emergingthreats.net/bin/view/Main/2003465"],"2003466":["http://www.webmasterworld.com/search_engine_spiders/3227720.htm","http://doc.emergingthreats.net/2003466"],"2003468":["http://doc.emergingthreats.net/2003468"],"2003469":["http://doc.emergingthreats.net/bin/view/Main/2003469"],"2003470":["http://doc.emergingthreats.net/2003470"],"2003476":["http://spywarewarrior.com/rogue_anti-spyware.htm","http://www.virusblast.com","http://doc.emergingthreats.net/2003476"],"2003477":["http://www.terminexor.com","http://netrn.net/spywareblog/archives/2004/12/23/more-rip-off-ware-terminexor","http://doc.emergingthreats.net/2003477"],"2003478":["http://www.spywarewarrior.com/rogue_anti-spyware.htm","http://www.errornuker.com","http://doc.emergingthreats.net/2003478"],"2003481":["http://www.radmin.com","http://doc.emergingthreats.net/2003481"],"2003482":["http://www.radmin.com","http://doc.emergingthreats.net/2003482"],"2003486":["http://www.drivecleaner.com","http://research.sunbelt-software.com/threatdisplay.aspx?name=DriveCleaner&threatid=44533","http://doc.emergingthreats.net/2003486"],"2003489":["http://www.malwarewipeupdate.com","http://research.sunbelt-software.com/threatdisplay.aspx?name=MalwareWipe&threatid=43086","http://doc.emergingthreats.net/2003489"],"2003490":["http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453078818","http://doc.emergingthreats.net/2003490"],"2003492":["http://doc.emergingthreats.net/2003492"],"2003493":["http://doc.emergingthreats.net/2003493"],"2003496":["http://doc.emergingthreats.net/2003496"],"2003497":["http://doc.emergingthreats.net/bin/view/Main/2003497"],"2003498":["http://doc.emergingthreats.net/2003498"],"2003499":["http://www.spywareguide.com/spydet_3366_spydawn.html","http://doc.emergingthreats.net/2003499"],"2003500":["http://doc.emergingthreats.net/2003500"],"2003501":["http://research.sunbelt-software.com/threatdisplay.aspx?name=BestOffersNetworks&threatid=43670","http://doc.emergingthreats.net/2003501"],"2003506":["http://www.bleepingcomputer.com/uninstall/68/Alawar-Toolbar.html","http://doc.emergingthreats.net/2003506"],"2003527":["http://research.sunbelt-software.com/threatdisplay.aspx?name=WinSoftware%20Corporation%2c%20Inc.%20(v)&threatid=90037","http://doc.emergingthreats.net/2003527"],"2003528":["http://research.sunbelt-software.com/threatdisplay.aspx?name=WinSoftware%20Corporation,%20Inc.%20(v)&threatid=90037","http://doc.emergingthreats.net/2003528"],"2003530":["http://doc.emergingthreats.net/2003530"],"2003532":["http://www.pestpatrol.com/spywarecenter/pest.aspx?id=453078618","http://doc.emergingthreats.net/2003532"],"2003535":["http://www.pestpatrol.com/spywarecenter/pest.aspx?id=453096755","http://doc.emergingthreats.net/bin/view/Main/2003535"],"2003544":["http://doc.emergingthreats.net/2003544"],"2003545":["http://doc.emergingthreats.net/2003545"],"2003555":["http://www.nuclearwintercrew.com","http://research.sunbelt-software.com/threatdisplay.aspx?name=Bandook&threatid=40408","http://doc.emergingthreats.net/bin/view/Main/TrojanBandook"],"2003566":["http://doc.emergingthreats.net/2003566"],"2003570":["http://www.applicationsignatures.com/backend/index.php","http://doc.emergingthreats.net/2003570"],"2003576":["http://doc.emergingthreats.net/bin/view/Main/2003576"],"2003582":["http://doc.emergingthreats.net/2003582"],"2003583":["http://doc.emergingthreats.net/2003583"],"2003586":["http://doc.emergingthreats.net/2003586"],"2003590":["http://doc.emergingthreats.net/2003590"],"2003603":["http://www.threatexpert.com/report.aspx?md5=06b522eacdfe51bed5d041fd672e880f","http://doc.emergingthreats.net/2003603"],"2003613":["http://doc.emergingthreats.net/2003613"],"2003614":["http://doc.emergingthreats.net/bin/view/Main/WinPEHeaders"],"2003615":["http://doc.emergingthreats.net/bin/view/Main/WinPEHeaders"],"2003616":["http://www.internetofficer.com/web-robot/datacha0s.html","http://doc.emergingthreats.net/2003616"],"2003622":["http://doc.emergingthreats.net/bin/view/Main/2003622"],"2003623":["http://centralops.net","http://doc.emergingthreats.net/bin/view/Main/2003623"],"2003625":["http://doc.emergingthreats.net/2003625"],"2003626":["http://doc.emergingthreats.net/bin/view/Main/2003626"],"2003627":["http://doc.emergingthreats.net/2003627"],"2003632":["http://secubox.aldria.com/topic-post1618.html#post1618","http://doc.emergingthreats.net/2003632"],"2003634":["http://doc.emergingthreats.net/2003634"],"2003635":["http://doc.emergingthreats.net/2003635"],"2003636":["http://doc.emergingthreats.net/2003636"],"2003639":["http://doc.emergingthreats.net/2003639"],"2003640":["http://doc.emergingthreats.net/2003640"],"2003645":["http://doc.emergingthreats.net/2003645"],"2003646":["http://doc.emergingthreats.net/2003646"],"2003647":["http://doc.emergingthreats.net/2003647"],"2003650":["http://doc.emergingthreats.net/2003650"],"2003654":["http://doc.emergingthreats.net/2003654"],"2003655":["http://doc.emergingthreats.net/2003655"],"2003656":["http://www.f-secure.com/v-descs/rizo.shtml","http://doc.emergingthreats.net/2003656"],"2003657":["http://doc.emergingthreats.net/bin/view/Main/2003657"],"2003658":["http://doc.emergingthreats.net/2003658"],"2003869":["http://doc.emergingthreats.net/2003869"],"2003924":["http://www.governmentsecurity.org/forum/index.php?showtopic=5112&pid=28561&mode=threaded&start=","http://doc.emergingthreats.net/2003924"],"2003926":["http://doc.emergingthreats.net/2003926"],"2003927":["http://doc.emergingthreats.net/bin/view/Main/2003927"],"2003928":["http://doc.emergingthreats.net/2003928"],"2003929":["http://doc.emergingthreats.net/2003929"],"2003930":["http://doc.emergingthreats.net/bin/view/Main/2003930"],"2003933":["http://www.avira.com/en/threats/section/details/id_vir/1836/tr_banker.delf.df735649.html","http://doc.emergingthreats.net/2003933"],"2004000":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2810","http://www.securityfocus.com/bid/23714","http://doc.emergingthreats.net/2004000"],"2004001":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2810","http://www.securityfocus.com/bid/23714","http://doc.emergingthreats.net/2004001"],"2004002":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2810","http://www.securityfocus.com/bid/23714","http://doc.emergingthreats.net/2004002"],"2004003":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2810","http://www.securityfocus.com/bid/23714","http://doc.emergingthreats.net/2004003"],"2004004":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2810","http://www.securityfocus.com/bid/23714","http://doc.emergingthreats.net/2004004"],"2004005":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2817","http://www.milw0rm.com/exploits/3964","http://doc.emergingthreats.net/2004005"],"2004006":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2817","http://www.milw0rm.com/exploits/3964","http://doc.emergingthreats.net/2004006"],"2004007":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2817","http://www.milw0rm.com/exploits/3964","http://doc.emergingthreats.net/2004007"],"2004008":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2817","http://www.milw0rm.com/exploits/3964","http://doc.emergingthreats.net/2004008"],"2004009":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2817","http://www.milw0rm.com/exploits/3964","http://doc.emergingthreats.net/2004009"],"2004010":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2817","http://www.milw0rm.com/exploits/3964","http://doc.emergingthreats.net/2004010"],"2004011":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2821","http://www.securityfocus.com/bid/24076","http://doc.emergingthreats.net/2004011"],"2004012":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2821","http://www.securityfocus.com/bid/24076","http://doc.emergingthreats.net/2004012"],"2004013":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2821","http://www.securityfocus.com/bid/24076","http://doc.emergingthreats.net/2004013"],"2004014":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2821","http://www.securityfocus.com/bid/24076","http://doc.emergingthreats.net/2004014"],"2004015":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2821","http://www.securityfocus.com/bid/24076","http://doc.emergingthreats.net/2004015"],"2004016":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2821","http://www.securityfocus.com/bid/24076","http://doc.emergingthreats.net/2004016"],"2004023":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004023"],"2004024":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004024"],"2004025":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004025"],"2004026":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004026"],"2004027":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004027"],"2004028":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004028"],"2004029":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004029"],"2004030":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004030"],"2004031":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004031"],"2004032":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004032"],"2004033":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004033"],"2004034":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2854","http://www.milw0rm.com/exploits/3970","http://doc.emergingthreats.net/2004034"],"2004035":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2862","http://www.securityfocus.com/archive/1/archive/1/469301/100/0/threaded","http://doc.emergingthreats.net/2004035"],"2004036":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2862","http://www.securityfocus.com/archive/1/archive/1/469301/100/0/threaded","http://doc.emergingthreats.net/2004036"],"2004037":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2862","http://www.securityfocus.com/archive/1/archive/1/469301/100/0/threaded","http://doc.emergingthreats.net/2004037"],"2004038":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2862","http://www.securityfocus.com/archive/1/archive/1/469301/100/0/threaded","http://doc.emergingthreats.net/2004038"],"2004039":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2862","http://www.securityfocus.com/archive/1/archive/1/469301/100/0/threaded","http://doc.emergingthreats.net/2004039"],"2004040":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2862","http://www.securityfocus.com/archive/1/archive/1/469301/100/0/threaded","http://doc.emergingthreats.net/2004040"],"2004041":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2866","http://www.frsirt.com/english/advisories/2007/1937","http://doc.emergingthreats.net/2004041"],"2004042":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2866","http://www.frsirt.com/english/advisories/2007/1937","http://doc.emergingthreats.net/2004042"],"2004043":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2866","http://www.frsirt.com/english/advisories/2007/1937","http://doc.emergingthreats.net/2004043"],"2004044":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2866","http://www.frsirt.com/english/advisories/2007/1937","http://doc.emergingthreats.net/2004044"],"2004045":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2866","http://www.frsirt.com/english/advisories/2007/1937","http://doc.emergingthreats.net/2004045"],"2004046":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2866","http://www.frsirt.com/english/advisories/2007/1937","http://doc.emergingthreats.net/2004046"],"2004047":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2889","http://www.milw0rm.com/exploits/3980","http://doc.emergingthreats.net/2004047"],"2004048":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2889","http://www.milw0rm.com/exploits/3980","http://doc.emergingthreats.net/2004048"],"2004049":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2889","http://www.milw0rm.com/exploits/3980","http://doc.emergingthreats.net/2004049"],"2004050":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2889","http://www.milw0rm.com/exploits/3980","http://doc.emergingthreats.net/2004050"],"2004051":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2889","http://www.milw0rm.com/exploits/3980","http://doc.emergingthreats.net/2004051"],"2004052":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2889","http://www.milw0rm.com/exploits/3980","http://doc.emergingthreats.net/2004052"],"2004053":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2890","http://www.milw0rm.com/exploits/3981","http://doc.emergingthreats.net/2004053"],"2004054":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2890","http://www.milw0rm.com/exploits/3981","http://doc.emergingthreats.net/2004054"],"2004055":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2890","http://www.milw0rm.com/exploits/3981","http://doc.emergingthreats.net/2004055"],"2004056":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2890","http://www.milw0rm.com/exploits/3981","http://doc.emergingthreats.net/2004056"],"2004057":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2890","http://www.milw0rm.com/exploits/3981","http://doc.emergingthreats.net/2004057"],"2004058":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2890","http://www.milw0rm.com/exploits/3981","http://doc.emergingthreats.net/2004058"],"2004059":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2898","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004059"],"2004060":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2898","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004060"],"2004061":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2898","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004061"],"2004062":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2898","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004062"],"2004063":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2898","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004063"],"2004064":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2898","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004064"],"2004065":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2902","http://www.milw0rm.com/exploits/3974","http://doc.emergingthreats.net/2004065"],"2004066":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2902","http://www.milw0rm.com/exploits/3974","http://doc.emergingthreats.net/2004066"],"2004067":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2902","http://www.milw0rm.com/exploits/3974","http://doc.emergingthreats.net/2004067"],"2004068":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2902","http://www.milw0rm.com/exploits/3974","http://doc.emergingthreats.net/2004068"],"2004069":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2902","http://www.milw0rm.com/exploits/3974","http://doc.emergingthreats.net/2004069"],"2004070":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2902","http://www.milw0rm.com/exploits/3974","http://doc.emergingthreats.net/2004070"],"2004071":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2905","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004071"],"2004072":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2905","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004072"],"2004073":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2905","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004073"],"2004074":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2905","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004074"],"2004075":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2905","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004075"],"2004076":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2905","http://www.securityfocus.com/archive/1/archive/1/469351/100/0/threaded","http://doc.emergingthreats.net/2004076"],"2004077":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2911","http://www.vbulletin.com/forum/project.php?issueid=21615","http://doc.emergingthreats.net/2004077"],"2004078":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2911","http://www.vbulletin.com/forum/project.php?issueid=21615","http://doc.emergingthreats.net/2004078"],"2004079":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2911","http://www.vbulletin.com/forum/project.php?issueid=21615","http://doc.emergingthreats.net/2004079"],"2004080":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2911","http://www.vbulletin.com/forum/project.php?issueid=21615","http://doc.emergingthreats.net/2004080"],"2004081":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2911","http://www.vbulletin.com/forum/project.php?issueid=21615","http://doc.emergingthreats.net/2004081"],"2004082":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2911","http://www.vbulletin.com/forum/project.php?issueid=21615","http://doc.emergingthreats.net/2004082"],"2004083":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0693","http://www.securityfocus.com/bid/24201","http://doc.emergingthreats.net/2004083"],"2004084":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0693","http://www.securityfocus.com/bid/24201","http://doc.emergingthreats.net/2004084"],"2004085":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0693","http://www.securityfocus.com/bid/24201","http://doc.emergingthreats.net/2004085"],"2004086":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0693","http://www.securityfocus.com/bid/24201","http://doc.emergingthreats.net/2004086"],"2004087":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0693","http://www.securityfocus.com/bid/24201","http://doc.emergingthreats.net/2004087"],"2004088":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0693","http://www.securityfocus.com/bid/24201","http://doc.emergingthreats.net/2004088"],"2004095":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2942","http://www.exploit-db.com/exploits/3989/","http://doc.emergingthreats.net/2004095"],"2004096":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2942","http://www.exploit-db.com/exploits/3989/","http://doc.emergingthreats.net/2004096"],"2004097":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2942","http://www.exploit-db.com/exploits/3989/","http://doc.emergingthreats.net/2004097"],"2004098":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2942","http://www.exploit-db.com/exploits/3989/","http://doc.emergingthreats.net/2004098"],"2004099":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2942","http://www.exploit-db.com/exploits/3989/","http://doc.emergingthreats.net/2004099"],"2004100":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2942","http://www.exploit-db.com/exploits/3989/","http://doc.emergingthreats.net/2004100"],"2004101":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2959","http://www.securityfocus.com/bid/24223","http://doc.emergingthreats.net/2004101"],"2004102":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2959","http://www.securityfocus.com/bid/24223","http://doc.emergingthreats.net/2004102"],"2004103":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2959","http://www.securityfocus.com/bid/24223","http://doc.emergingthreats.net/2004103"],"2004104":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2959","http://www.securityfocus.com/bid/24223","http://doc.emergingthreats.net/2004104"],"2004105":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2959","http://www.securityfocus.com/bid/24223","http://doc.emergingthreats.net/2004105"],"2004106":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2959","http://www.securityfocus.com/bid/24223","http://doc.emergingthreats.net/2004106"],"2004108":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2971","http://www.milw0rm.com/exploits/3988","http://doc.emergingthreats.net/2004108"],"2004109":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2971","http://www.milw0rm.com/exploits/3988","http://doc.emergingthreats.net/2004109"],"2004110":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2971","http://www.milw0rm.com/exploits/3988","http://doc.emergingthreats.net/2004110"],"2004111":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2971","http://www.milw0rm.com/exploits/3988","http://doc.emergingthreats.net/2004111"],"2004112":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2971","http://www.milw0rm.com/exploits/3988","http://doc.emergingthreats.net/2004112"],"2004113":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2971","http://www.milw0rm.com/exploits/3988","http://doc.emergingthreats.net/2004113"],"2004128":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004128"],"2004129":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004129"],"2004130":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004130"],"2004131":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004131"],"2004132":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004132"],"2004133":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004133"],"2004134":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004134"],"2004135":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004135"],"2004136":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004136"],"2004137":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004137"],"2004138":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004138"],"2004139":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1607","http://www.securityfocus.com/bid/23057","http://doc.emergingthreats.net/2004139"],"2004140":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1602","http://www.securityfocus.com/archive/1/archive/1/462702/100/100/threaded","http://doc.emergingthreats.net/2004140"],"2004141":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1602","http://www.securityfocus.com/archive/1/archive/1/462702/100/100/threaded","http://doc.emergingthreats.net/2004141"],"2004142":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1602","http://www.securityfocus.com/archive/1/archive/1/462702/100/100/threaded","http://doc.emergingthreats.net/2004142"],"2004143":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1602","http://www.securityfocus.com/archive/1/archive/1/462702/100/100/threaded","http://doc.emergingthreats.net/2004143"],"2004144":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1602","http://www.securityfocus.com/archive/1/archive/1/462702/100/100/threaded","http://doc.emergingthreats.net/2004144"],"2004145":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1602","http://www.securityfocus.com/archive/1/archive/1/462702/100/100/threaded","http://doc.emergingthreats.net/2004145"],"2004147":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1573","http://www.secunia.com/advisories/24503","http://doc.emergingthreats.net/2004147"],"2004152":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1572","http://www.frsirt.com/english/advisories/2007/0940","http://doc.emergingthreats.net/2004152"],"2004153":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1572","http://www.frsirt.com/english/advisories/2007/0940","http://doc.emergingthreats.net/2004153"],"2004154":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1572","http://www.frsirt.com/english/advisories/2007/0940","http://doc.emergingthreats.net/2004154"],"2004155":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1572","http://www.frsirt.com/english/advisories/2007/0940","http://doc.emergingthreats.net/2004155"],"2004156":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1572","http://www.frsirt.com/english/advisories/2007/0940","http://doc.emergingthreats.net/2004156"],"2004157":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1572","http://www.frsirt.com/english/advisories/2007/0940","http://doc.emergingthreats.net/2004157"],"2004158":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1566","http://www.exploit-db.com/exploits/3520/","http://doc.emergingthreats.net/2004158"],"2004159":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1566","http://www.exploit-db.com/exploits/3520/","http://doc.emergingthreats.net/2004159"],"2004160":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1566","http://www.exploit-db.com/exploits/3520/","http://doc.emergingthreats.net/2004160"],"2004161":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1566","http://www.exploit-db.com/exploits/3520/","http://doc.emergingthreats.net/2004161"],"2004162":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1566","http://www.exploit-db.com/exploits/3520/","http://doc.emergingthreats.net/2004162"],"2004163":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1566","http://www.exploit-db.com/exploits/3520/","http://doc.emergingthreats.net/2004163"],"2004164":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1555","http://www.milw0rm.com/exploits/3519","http://doc.emergingthreats.net/2004164"],"2004165":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1555","http://www.milw0rm.com/exploits/3519","http://doc.emergingthreats.net/2004165"],"2004166":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1555","http://www.milw0rm.com/exploits/3519","http://doc.emergingthreats.net/2004166"],"2004167":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1555","http://www.milw0rm.com/exploits/3519","http://doc.emergingthreats.net/2004167"],"2004168":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1555","http://www.milw0rm.com/exploits/3519","http://doc.emergingthreats.net/2004168"],"2004169":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1555","http://www.milw0rm.com/exploits/3519","http://doc.emergingthreats.net/2004169"],"2004170":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004170"],"2004171":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004171"],"2004172":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004172"],"2004173":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004173"],"2004174":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004174"],"2004175":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004175"],"2004176":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004176"],"2004177":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004177"],"2004178":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004178"],"2004179":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004179"],"2004180":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004180"],"2004181":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004181"],"2004182":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004182"],"2004183":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004183"],"2004184":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004184"],"2004185":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004185"],"2004186":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004186"],"2004187":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004187"],"2004188":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004188"],"2004189":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004189"],"2004190":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004190"],"2004191":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004191"],"2004192":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004192"],"2004193":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004193"],"2004194":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004194"],"2004195":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004195"],"2004196":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004196"],"2004197":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004197"],"2004198":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004198"],"2004199":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004199"],"2004200":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004200"],"2004201":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004201"],"2004202":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004202"],"2004203":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004203"],"2004204":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004204"],"2004205":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004205"],"2004206":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004206"],"2004207":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004207"],"2004208":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004208"],"2004209":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004209"],"2004210":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004210"],"2004211":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004211"],"2004212":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004212"],"2004213":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004213"],"2004214":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004214"],"2004215":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004215"],"2004216":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004216"],"2004217":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004217"],"2004218":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004218"],"2004219":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004219"],"2004220":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004220"],"2004221":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004221"],"2004222":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004222"],"2004223":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1550","http://www.securityfocus.com/bid/23033","http://doc.emergingthreats.net/2004223"],"2004224":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004224"],"2004225":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004225"],"2004226":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004226"],"2004227":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004227"],"2004228":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004228"],"2004229":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004229"],"2004230":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004230"],"2004231":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004231"],"2004232":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004232"],"2004233":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004233"],"2004234":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004234"],"2004235":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004235"],"2004236":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004236"],"2004237":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004237"],"2004238":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004238"],"2004239":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004239"],"2004240":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004240"],"2004241":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7172","http://www.milw0rm.com/exploits/3497","http://doc.emergingthreats.net/2004241"],"2004242":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7172","http://www.milw0rm.com/exploits/3497","http://doc.emergingthreats.net/2004242"],"2004243":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7172","http://www.milw0rm.com/exploits/3497","http://doc.emergingthreats.net/2004243"],"2004244":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7172","http://www.milw0rm.com/exploits/3497","http://doc.emergingthreats.net/2004244"],"2004245":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7172","http://www.milw0rm.com/exploits/3497","http://doc.emergingthreats.net/2004245"],"2004246":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7172","http://www.milw0rm.com/exploits/3497","http://doc.emergingthreats.net/2004246"],"2004247":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1518","http://www.securityfocus.com/bid/22970","http://doc.emergingthreats.net/2004247"],"2004248":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1518","http://www.securityfocus.com/bid/22970","http://doc.emergingthreats.net/2004248"],"2004249":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1518","http://www.securityfocus.com/bid/22970","http://doc.emergingthreats.net/2004249"],"2004250":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1518","http://www.securityfocus.com/bid/22970","http://doc.emergingthreats.net/2004250"],"2004251":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1518","http://www.securityfocus.com/bid/22970","http://doc.emergingthreats.net/2004251"],"2004252":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1518","http://www.securityfocus.com/bid/22970","http://doc.emergingthreats.net/2004252"],"2004253":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1517","http://www.milw0rm.com/exploits/3477","http://doc.emergingthreats.net/2004253"],"2004254":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1517","http://www.milw0rm.com/exploits/3477","http://doc.emergingthreats.net/2004254"],"2004255":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1517","http://www.milw0rm.com/exploits/3477","http://doc.emergingthreats.net/2004255"],"2004256":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1517","http://www.milw0rm.com/exploits/3477","http://doc.emergingthreats.net/2004256"],"2004257":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1517","http://www.milw0rm.com/exploits/3477","http://doc.emergingthreats.net/2004257"],"2004258":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1517","http://www.milw0rm.com/exploits/3477","http://doc.emergingthreats.net/2004258"],"2004259":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1510","http://www.milw0rm.com/exploits/3500","http://doc.emergingthreats.net/2004259"],"2004260":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1510","http://www.milw0rm.com/exploits/3500","http://doc.emergingthreats.net/2004260"],"2004261":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1510","http://www.milw0rm.com/exploits/3500","http://doc.emergingthreats.net/2004261"],"2004262":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1510","http://www.milw0rm.com/exploits/3500","http://doc.emergingthreats.net/2004262"],"2004263":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1510","http://www.milw0rm.com/exploits/3500","http://doc.emergingthreats.net/2004263"],"2004264":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1510","http://www.milw0rm.com/exploits/3500","http://doc.emergingthreats.net/2004264"],"2004265":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7171","http://xforce.iss.net/xforce/xfdb/30215","http://doc.emergingthreats.net/2004265"],"2004266":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7171","http://xforce.iss.net/xforce/xfdb/30215","http://doc.emergingthreats.net/2004266"],"2004267":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7171","http://xforce.iss.net/xforce/xfdb/30215","http://doc.emergingthreats.net/2004267"],"2004268":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7171","http://xforce.iss.net/xforce/xfdb/30215","http://doc.emergingthreats.net/2004268"],"2004269":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7171","http://xforce.iss.net/xforce/xfdb/30215","http://doc.emergingthreats.net/2004269"],"2004270":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7171","http://xforce.iss.net/xforce/xfdb/30215","http://doc.emergingthreats.net/2004270"],"2004271":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004271"],"2004272":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004272"],"2004273":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004273"],"2004274":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004274"],"2004275":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004275"],"2004276":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004276"],"2004277":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004277"],"2004278":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004278"],"2004279":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004279"],"2004280":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004280"],"2004281":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004281"],"2004282":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004282"],"2004283":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004283"],"2004284":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004284"],"2004285":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004285"],"2004286":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004286"],"2004287":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004287"],"2004288":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004288"],"2004289":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004289"],"2004290":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004290"],"2004291":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004291"],"2004292":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004292"],"2004293":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004293"],"2004294":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004294"],"2004295":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004295"],"2004296":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004296"],"2004297":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004297"],"2004298":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004298"],"2004299":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004299"],"2004300":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004300"],"2004301":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004301"],"2004302":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004302"],"2004303":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004303"],"2004304":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004304"],"2004305":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004305"],"2004306":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7170","http://www.securityfocus.com/bid/21072","http://doc.emergingthreats.net/2004306"],"2004307":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1493","http://www.securityfocus.com/archive/1/archive/1/462453/100/0/threaded","http://doc.emergingthreats.net/2004307"],"2004308":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1493","http://www.securityfocus.com/archive/1/archive/1/462453/100/0/threaded","http://doc.emergingthreats.net/2004308"],"2004309":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1493","http://www.securityfocus.com/archive/1/archive/1/462453/100/0/threaded","http://doc.emergingthreats.net/2004309"],"2004310":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1493","http://www.securityfocus.com/archive/1/archive/1/462453/100/0/threaded","http://doc.emergingthreats.net/2004310"],"2004311":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1493","http://www.securityfocus.com/archive/1/archive/1/462453/100/0/threaded","http://doc.emergingthreats.net/2004311"],"2004312":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1493","http://www.securityfocus.com/archive/1/archive/1/462453/100/0/threaded","http://doc.emergingthreats.net/2004312"],"2004319":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1469","http://www.securityfocus.com/bid/22988","http://doc.emergingthreats.net/2004319"],"2004320":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1469","http://www.securityfocus.com/bid/22988","http://doc.emergingthreats.net/2004320"],"2004321":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1469","http://www.securityfocus.com/bid/22988","http://doc.emergingthreats.net/2004321"],"2004322":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1469","http://www.securityfocus.com/bid/22988","http://doc.emergingthreats.net/2004322"],"2004323":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1469","http://www.securityfocus.com/bid/22988","http://doc.emergingthreats.net/2004323"],"2004324":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1469","http://www.securityfocus.com/bid/22988","http://doc.emergingthreats.net/2004324"],"2004325":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1450","http://www.securityfocus.com/bid/22909","http://doc.emergingthreats.net/2004325"],"2004326":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1450","http://www.securityfocus.com/bid/22909","http://doc.emergingthreats.net/2004326"],"2004327":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1450","http://www.securityfocus.com/bid/22909","http://doc.emergingthreats.net/2004327"],"2004328":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1450","http://www.securityfocus.com/bid/22909","http://doc.emergingthreats.net/2004328"],"2004329":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1450","http://www.securityfocus.com/bid/22909","http://doc.emergingthreats.net/2004329"],"2004330":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1450","http://www.securityfocus.com/bid/22909","http://doc.emergingthreats.net/2004330"],"2004331":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1445","http://www.milw0rm.com/exploits/3466","http://doc.emergingthreats.net/2004331"],"2004332":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1445","http://www.milw0rm.com/exploits/3466","http://doc.emergingthreats.net/2004332"],"2004333":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1445","http://www.milw0rm.com/exploits/3466","http://doc.emergingthreats.net/2004333"],"2004334":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1445","http://www.milw0rm.com/exploits/3466","http://doc.emergingthreats.net/2004334"],"2004335":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1445","http://www.milw0rm.com/exploits/3466","http://doc.emergingthreats.net/2004335"],"2004336":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1445","http://www.milw0rm.com/exploits/3466","http://doc.emergingthreats.net/2004336"],"2004337":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1440","http://www.milw0rm.com/exploits/3470","http://doc.emergingthreats.net/2004337"],"2004338":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1440","http://www.milw0rm.com/exploits/3470","http://doc.emergingthreats.net/2004338"],"2004339":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1440","http://www.milw0rm.com/exploits/3470","http://doc.emergingthreats.net/2004339"],"2004340":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1440","http://www.milw0rm.com/exploits/3470","http://doc.emergingthreats.net/2004340"],"2004341":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1440","http://www.milw0rm.com/exploits/3470","http://doc.emergingthreats.net/2004341"],"2004342":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1440","http://www.milw0rm.com/exploits/3470","http://doc.emergingthreats.net/2004342"],"2004343":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1438","http://www.milw0rm.com/exploits/3469","http://doc.emergingthreats.net/2004343"],"2004344":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1438","http://www.milw0rm.com/exploits/3469","http://doc.emergingthreats.net/2004344"],"2004345":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1438","http://www.milw0rm.com/exploits/3469","http://doc.emergingthreats.net/2004345"],"2004346":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1438","http://www.milw0rm.com/exploits/3469","http://doc.emergingthreats.net/2004346"],"2004347":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1438","http://www.milw0rm.com/exploits/3469","http://doc.emergingthreats.net/2004347"],"2004348":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1438","http://www.milw0rm.com/exploits/3469","http://doc.emergingthreats.net/2004348"],"2004349":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004349"],"2004350":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004350"],"2004351":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004351"],"2004352":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004352"],"2004353":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004353"],"2004354":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004354"],"2004355":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004355"],"2004356":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004356"],"2004357":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004357"],"2004358":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004358"],"2004359":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004359"],"2004360":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004360"],"2004361":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004361"],"2004362":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004362"],"2004363":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004363"],"2004364":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004364"],"2004365":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004365"],"2004366":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004366"],"2004367":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004367"],"2004368":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004368"],"2004369":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004369"],"2004370":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004370"],"2004371":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004371"],"2004372":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1434","http://www.securityfocus.com/bid/22911","http://doc.emergingthreats.net/2004372"],"2004373":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1428","http://www.exploit-db.com/exploits/3455/","http://doc.emergingthreats.net/2004373"],"2004374":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1428","http://www.exploit-db.com/exploits/3455/","http://doc.emergingthreats.net/2004374"],"2004375":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1428","http://www.exploit-db.com/exploits/3455/","http://doc.emergingthreats.net/2004375"],"2004376":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1428","http://www.exploit-db.com/exploits/3455/","http://doc.emergingthreats.net/2004376"],"2004377":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1428","http://www.exploit-db.com/exploits/3455/","http://doc.emergingthreats.net/2004377"],"2004378":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1428","http://www.exploit-db.com/exploits/3455/","http://doc.emergingthreats.net/2004378"],"2004385":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1422","http://www.securityfocus.com/bid/22910","http://doc.emergingthreats.net/2004385"],"2004386":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1422","http://www.securityfocus.com/bid/22910","http://doc.emergingthreats.net/2004386"],"2004387":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1422","http://www.securityfocus.com/bid/22910","http://doc.emergingthreats.net/2004387"],"2004388":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1422","http://www.securityfocus.com/bid/22910","http://doc.emergingthreats.net/2004388"],"2004389":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1422","http://www.securityfocus.com/bid/22910","http://doc.emergingthreats.net/2004389"],"2004390":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1422","http://www.securityfocus.com/bid/22910","http://doc.emergingthreats.net/2004390"],"2004397":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1410","http://www.milw0rm.com/exploits/3437","http://doc.emergingthreats.net/2004397"],"2004398":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1410","http://www.milw0rm.com/exploits/3437","http://doc.emergingthreats.net/2004398"],"2004399":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1410","http://www.milw0rm.com/exploits/3437","http://doc.emergingthreats.net/2004399"],"2004400":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1410","http://www.milw0rm.com/exploits/3437","http://doc.emergingthreats.net/2004400"],"2004401":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1410","http://www.milw0rm.com/exploits/3437","http://doc.emergingthreats.net/2004401"],"2004402":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1410","http://www.milw0rm.com/exploits/3437","http://doc.emergingthreats.net/2004402"],"2004403":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409","http://www.secunia.com/advisories/24566","http://doc.emergingthreats.net/2004403"],"2004404":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409","http://www.secunia.com/advisories/24566","http://doc.emergingthreats.net/2004404"],"2004405":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409","http://www.secunia.com/advisories/24566","http://doc.emergingthreats.net/2004405"],"2004406":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409","http://www.secunia.com/advisories/24566","http://doc.emergingthreats.net/2004406"],"2004407":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409","http://www.secunia.com/advisories/24566","http://doc.emergingthreats.net/2004407"],"2004408":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409","http://www.secunia.com/advisories/24566","http://doc.emergingthreats.net/2004408"],"2004415":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1326","http://www.securityfocus.com/archive/1/archive/1/461671/100/0/threaded","http://doc.emergingthreats.net/2004415"],"2004416":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1326","http://www.securityfocus.com/archive/1/archive/1/461671/100/0/threaded","http://doc.emergingthreats.net/2004416"],"2004417":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1326","http://www.securityfocus.com/archive/1/archive/1/461671/100/0/threaded","http://doc.emergingthreats.net/2004417"],"2004418":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1326","http://www.securityfocus.com/archive/1/archive/1/461671/100/0/threaded","http://doc.emergingthreats.net/2004418"],"2004419":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1326","http://www.securityfocus.com/archive/1/archive/1/461671/100/0/threaded","http://doc.emergingthreats.net/2004419"],"2004420":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1326","http://www.securityfocus.com/archive/1/archive/1/461671/100/0/threaded","http://doc.emergingthreats.net/2004420"],"2004421":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7161","http://www.securityfocus.com/bid/20375","http://doc.emergingthreats.net/2004421"],"2004422":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7161","http://www.securityfocus.com/bid/20375","http://doc.emergingthreats.net/2004422"],"2004423":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7161","http://www.securityfocus.com/bid/20375","http://doc.emergingthreats.net/2004423"],"2004424":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7161","http://www.securityfocus.com/bid/20375","http://doc.emergingthreats.net/2004424"],"2004425":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7161","http://www.securityfocus.com/bid/20375","http://doc.emergingthreats.net/2004425"],"2004426":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7161","http://www.securityfocus.com/bid/20375","http://doc.emergingthreats.net/2004426"],"2004427":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004427"],"2004428":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004428"],"2004429":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004429"],"2004430":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004430"],"2004431":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004431"],"2004432":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004432"],"2004433":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004433"],"2004434":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004434"],"2004435":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004435"],"2004436":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004436"],"2004437":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004437"],"2004438":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7150","http://www.securityfocus.com/bid/20650","http://doc.emergingthreats.net/2004438"],"2004439":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1548","http://www.securityfocus.com/bid/23051","http://doc.emergingthreats.net/2004439"],"2004440":["http://doc.emergingthreats.net/2004440"],"2004442":["http://www.avira.com/en/threats/section/details/id_vir/1836/tr_banker.delf.df735649.html","http://doc.emergingthreats.net/2004442"],"2004443":["http://doc.emergingthreats.net/bin/view/Main/2004443"],"2004450":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2992","http://www.securityfocus.com/bid/24275","http://doc.emergingthreats.net/2004450"],"2004451":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2992","http://www.securityfocus.com/bid/24275","http://doc.emergingthreats.net/2004451"],"2004452":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2992","http://www.securityfocus.com/bid/24275","http://doc.emergingthreats.net/2004452"],"2004453":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2992","http://www.securityfocus.com/bid/24275","http://doc.emergingthreats.net/2004453"],"2004454":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2992","http://www.securityfocus.com/bid/24275","http://doc.emergingthreats.net/2004454"],"2004455":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2992","http://www.securityfocus.com/bid/24275","http://doc.emergingthreats.net/2004455"],"2004456":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2994","http://www.securityfocus.com/bid/24212","http://doc.emergingthreats.net/2004456"],"2004457":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2994","http://www.securityfocus.com/bid/24212","http://doc.emergingthreats.net/2004457"],"2004458":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2994","http://www.securityfocus.com/bid/24212","http://doc.emergingthreats.net/2004458"],"2004459":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2994","http://www.securityfocus.com/bid/24212","http://doc.emergingthreats.net/2004459"],"2004460":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2994","http://www.securityfocus.com/bid/24212","http://doc.emergingthreats.net/2004460"],"2004461":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2994","http://www.securityfocus.com/bid/24212","http://doc.emergingthreats.net/2004461"],"2004463":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2997","http://www.securityfocus.com/bid/24226","http://doc.emergingthreats.net/2004463"],"2004464":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2997","http://www.securityfocus.com/bid/24226","http://doc.emergingthreats.net/2004464"],"2004465":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2997","http://www.securityfocus.com/bid/24226","http://doc.emergingthreats.net/2004465"],"2004466":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2997","http://www.securityfocus.com/bid/24226","http://doc.emergingthreats.net/2004466"],"2004467":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2997","http://www.securityfocus.com/bid/24226","http://doc.emergingthreats.net/2004467"],"2004468":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2997","http://www.securityfocus.com/bid/24226","http://doc.emergingthreats.net/2004468"],"2004480":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004480"],"2004481":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004481"],"2004482":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004482"],"2004483":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004483"],"2004484":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004484"],"2004485":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004485"],"2004486":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004486"],"2004487":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004487"],"2004488":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004488"],"2004489":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004489"],"2004490":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004490"],"2004491":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3000","http://www.securityfocus.com/bid/24253","http://doc.emergingthreats.net/2004491"],"2004493":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004493"],"2004494":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004494"],"2004495":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004495"],"2004496":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004496"],"2004497":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004497"],"2004498":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004498"],"2004499":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004499"],"2004500":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004500"],"2004501":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004501"],"2004502":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004502"],"2004503":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004503"],"2004504":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004504"],"2004505":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004505"],"2004506":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004506"],"2004507":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004507"],"2004508":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004508"],"2004509":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004509"],"2004510":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004510"],"2004511":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004511"],"2004512":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004512"],"2004513":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004513"],"2004514":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004514"],"2004515":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004515"],"2004516":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004516"],"2004517":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004517"],"2004518":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004518"],"2004519":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004519"],"2004520":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004520"],"2004521":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004521"],"2004522":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1304","http://www.securityfocus.com/bid/22820","http://doc.emergingthreats.net/2004522"],"2004523":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1302","http://www.securityfocus.com/bid/22821","http://doc.emergingthreats.net/2004523"],"2004524":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1302","http://www.securityfocus.com/bid/22821","http://doc.emergingthreats.net/2004524"],"2004525":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1302","http://www.securityfocus.com/bid/22821","http://doc.emergingthreats.net/2004525"],"2004526":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1302","http://www.securityfocus.com/bid/22821","http://doc.emergingthreats.net/2004526"],"2004527":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1302","http://www.securityfocus.com/bid/22821","http://doc.emergingthreats.net/2004527"],"2004528":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1302","http://www.securityfocus.com/bid/22821","http://doc.emergingthreats.net/2004528"],"2004529":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1298","http://www.milw0rm.com/exploits/3408","http://doc.emergingthreats.net/2004529"],"2004530":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1298","http://www.milw0rm.com/exploits/3408","http://doc.emergingthreats.net/2004530"],"2004531":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1298","http://www.milw0rm.com/exploits/3408","http://doc.emergingthreats.net/2004531"],"2004532":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1298","http://www.milw0rm.com/exploits/3408","http://doc.emergingthreats.net/2004532"],"2004533":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1298","http://www.milw0rm.com/exploits/3408","http://doc.emergingthreats.net/2004533"],"2004534":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1298","http://www.milw0rm.com/exploits/3408","http://doc.emergingthreats.net/2004534"],"2004535":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1297","http://www.milw0rm.com/exploits/3409","http://doc.emergingthreats.net/2004535"],"2004536":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1297","http://www.milw0rm.com/exploits/3409","http://doc.emergingthreats.net/2004536"],"2004537":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1297","http://www.milw0rm.com/exploits/3409","http://doc.emergingthreats.net/2004537"],"2004538":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1297","http://www.milw0rm.com/exploits/3409","http://doc.emergingthreats.net/2004538"],"2004539":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1297","http://www.milw0rm.com/exploits/3409","http://doc.emergingthreats.net/2004539"],"2004540":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1297","http://www.milw0rm.com/exploits/3409","http://doc.emergingthreats.net/2004540"],"2004541":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1296","http://www.milw0rm.com/exploits/3410","http://doc.emergingthreats.net/2004541"],"2004542":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1296","http://www.milw0rm.com/exploits/3410","http://doc.emergingthreats.net/2004542"],"2004543":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1296","http://www.milw0rm.com/exploits/3410","http://doc.emergingthreats.net/2004543"],"2004544":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1296","http://www.milw0rm.com/exploits/3410","http://doc.emergingthreats.net/2004544"],"2004545":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1296","http://www.milw0rm.com/exploits/3410","http://doc.emergingthreats.net/2004545"],"2004546":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1296","http://www.milw0rm.com/exploits/3410","http://doc.emergingthreats.net/2004546"],"2004547":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1295","http://www.milw0rm.com/exploits/3411","http://doc.emergingthreats.net/2004547"],"2004548":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1295","http://www.milw0rm.com/exploits/3411","http://doc.emergingthreats.net/2004548"],"2004549":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1295","http://www.milw0rm.com/exploits/3411","http://doc.emergingthreats.net/2004549"],"2004550":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1295","http://www.milw0rm.com/exploits/3411","http://doc.emergingthreats.net/2004550"],"2004551":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1295","http://www.milw0rm.com/exploits/3411","http://doc.emergingthreats.net/2004551"],"2004600":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3051","http://www.milw0rm.com/exploits/4020","http://doc.emergingthreats.net/2004600"],"2004601":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3051","http://www.milw0rm.com/exploits/4020","http://doc.emergingthreats.net/2004601"],"2004602":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3051","http://www.milw0rm.com/exploits/4020","http://doc.emergingthreats.net/2004602"],"2004603":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3051","http://www.milw0rm.com/exploits/4020","http://doc.emergingthreats.net/2004603"],"2004604":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3051","http://www.milw0rm.com/exploits/4020","http://doc.emergingthreats.net/2004604"],"2004605":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3051","http://www.milw0rm.com/exploits/4020","http://doc.emergingthreats.net/2004605"],"2004612":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3063","http://www.securityfocus.com/archive/1/archive/1/470483/100/0/threaded","http://doc.emergingthreats.net/2004612"],"2004613":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3063","http://www.securityfocus.com/archive/1/archive/1/470483/100/0/threaded","http://doc.emergingthreats.net/2004613"],"2004614":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3063","http://www.securityfocus.com/archive/1/archive/1/470483/100/0/threaded","http://doc.emergingthreats.net/2004614"],"2004615":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3063","http://www.securityfocus.com/archive/1/archive/1/470483/100/0/threaded","http://doc.emergingthreats.net/2004615"],"2004616":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3063","http://www.securityfocus.com/archive/1/archive/1/470483/100/0/threaded","http://doc.emergingthreats.net/2004616"],"2004617":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3063","http://www.securityfocus.com/archive/1/archive/1/470483/100/0/threaded","http://doc.emergingthreats.net/2004617"],"2004618":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3065","http://www.milw0rm.com/exploits/4019","http://doc.emergingthreats.net/2004618"],"2004619":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3065","http://www.milw0rm.com/exploits/4019","http://doc.emergingthreats.net/2004619"],"2004620":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3065","http://www.milw0rm.com/exploits/4019","http://doc.emergingthreats.net/2004620"],"2004621":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3065","http://www.milw0rm.com/exploits/4019","http://doc.emergingthreats.net/2004621"],"2004622":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3065","http://www.milw0rm.com/exploits/4019","http://doc.emergingthreats.net/2004622"],"2004623":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3065","http://www.milw0rm.com/exploits/4019","http://doc.emergingthreats.net/2004623"],"2004624":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3077","http://www.milw0rm.com/exploits/4030","http://doc.emergingthreats.net/2004624"],"2004625":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3077","http://www.milw0rm.com/exploits/4030","http://doc.emergingthreats.net/2004625"],"2004626":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3077","http://www.milw0rm.com/exploits/4030","http://doc.emergingthreats.net/2004626"],"2004627":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3077","http://www.milw0rm.com/exploits/4030","http://doc.emergingthreats.net/2004627"],"2004628":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3077","http://www.milw0rm.com/exploits/4030","http://doc.emergingthreats.net/2004628"],"2004629":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3077","http://www.milw0rm.com/exploits/4030","http://doc.emergingthreats.net/2004629"],"2004630":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3080","http://www.securityfocus.com/bid/24288","http://doc.emergingthreats.net/2004630"],"2004631":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3080","http://www.securityfocus.com/bid/24288","http://doc.emergingthreats.net/2004631"],"2004632":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3080","http://www.securityfocus.com/bid/24288","http://doc.emergingthreats.net/2004632"],"2004633":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3080","http://www.securityfocus.com/bid/24288","http://doc.emergingthreats.net/2004633"],"2004634":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3080","http://www.securityfocus.com/bid/24288","http://doc.emergingthreats.net/2004634"],"2004635":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3088","http://www.securityfocus.com/archive/1/archive/1/470598/100/0/threaded","http://doc.emergingthreats.net/2004635"],"2004636":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3088","http://www.securityfocus.com/archive/1/archive/1/470598/100/0/threaded","http://doc.emergingthreats.net/2004636"],"2004637":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3088","http://www.securityfocus.com/archive/1/archive/1/470598/100/0/threaded","http://doc.emergingthreats.net/2004637"],"2004638":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3088","http://www.securityfocus.com/archive/1/archive/1/470598/100/0/threaded","http://doc.emergingthreats.net/2004638"],"2004639":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3088","http://www.securityfocus.com/archive/1/archive/1/470598/100/0/threaded","http://doc.emergingthreats.net/2004639"],"2004640":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3088","http://www.securityfocus.com/archive/1/archive/1/470598/100/0/threaded","http://doc.emergingthreats.net/2004640"],"2004641":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3119","http://www.exploit-db.com/exploits/4040/","http://doc.emergingthreats.net/2004641"],"2004642":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3119","http://www.exploit-db.com/exploits/4040/","http://doc.emergingthreats.net/2004642"],"2004643":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3119","http://www.exploit-db.com/exploits/4040/","http://doc.emergingthreats.net/2004643"],"2004644":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3119","http://www.exploit-db.com/exploits/4040/","http://doc.emergingthreats.net/2004644"],"2004645":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3119","http://www.exploit-db.com/exploits/4040/","http://doc.emergingthreats.net/2004645"],"2004646":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3119","http://www.exploit-db.com/exploits/4040/","http://doc.emergingthreats.net/2004646"],"2004647":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3133","http://www.securityfocus.com/bid/24364","http://doc.emergingthreats.net/2004647"],"2004648":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3133","http://www.securityfocus.com/bid/24364","http://doc.emergingthreats.net/2004648"],"2004649":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3133","http://www.securityfocus.com/bid/24364","http://doc.emergingthreats.net/2004649"],"2004650":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3133","http://www.securityfocus.com/bid/24364","http://doc.emergingthreats.net/2004650"],"2004651":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3133","http://www.securityfocus.com/bid/24364","http://doc.emergingthreats.net/2004651"],"2004652":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3133","http://www.securityfocus.com/bid/24364","http://doc.emergingthreats.net/2004652"],"2004654":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3140","http://www.milw0rm.com/exploits/4039","http://doc.emergingthreats.net/2004654"],"2004655":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3140","http://www.milw0rm.com/exploits/4039","http://doc.emergingthreats.net/2004655"],"2004656":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3140","http://www.milw0rm.com/exploits/4039","http://doc.emergingthreats.net/2004656"],"2004657":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3140","http://www.milw0rm.com/exploits/4039","http://doc.emergingthreats.net/2004657"],"2004658":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3140","http://www.milw0rm.com/exploits/4039","http://doc.emergingthreats.net/2004658"],"2004659":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3140","http://www.milw0rm.com/exploits/4039","http://doc.emergingthreats.net/2004659"],"2004666":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1292","http://www.milw0rm.com/exploits/3387","http://doc.emergingthreats.net/2004666"],"2004667":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1292","http://www.milw0rm.com/exploits/3387","http://doc.emergingthreats.net/2004667"],"2004668":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1292","http://www.milw0rm.com/exploits/3387","http://doc.emergingthreats.net/2004668"],"2004669":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1292","http://www.milw0rm.com/exploits/3387","http://doc.emergingthreats.net/2004669"],"2004670":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1292","http://www.milw0rm.com/exploits/3387","http://doc.emergingthreats.net/2004670"],"2004671":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1292","http://www.milw0rm.com/exploits/3387","http://doc.emergingthreats.net/2004671"],"2004672":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1290","http://www.secunia.com/advisories/24385","http://doc.emergingthreats.net/2004672"],"2004673":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1290","http://www.secunia.com/advisories/24385","http://doc.emergingthreats.net/2004673"],"2004674":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1290","http://www.secunia.com/advisories/24385","http://doc.emergingthreats.net/2004674"],"2004675":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1290","http://www.secunia.com/advisories/24385","http://doc.emergingthreats.net/2004675"],"2004676":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1290","http://www.secunia.com/advisories/24385","http://doc.emergingthreats.net/2004676"],"2004677":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1290","http://www.secunia.com/advisories/24385","http://doc.emergingthreats.net/2004677"],"2004678":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1289","http://www.securityfocus.com/bid/22799","http://doc.emergingthreats.net/2004678"],"2004679":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1289","http://www.securityfocus.com/bid/22799","http://doc.emergingthreats.net/2004679"],"2004680":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1289","http://www.securityfocus.com/bid/22799","http://doc.emergingthreats.net/2004680"],"2004681":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1289","http://www.securityfocus.com/bid/22799","http://doc.emergingthreats.net/2004681"],"2004682":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1289","http://www.securityfocus.com/bid/22799","http://doc.emergingthreats.net/2004682"],"2004683":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7118","http://www.securityfocus.com/bid/21064","http://doc.emergingthreats.net/2004683"],"2004684":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7118","http://www.securityfocus.com/bid/21064","http://doc.emergingthreats.net/2004684"],"2004685":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7118","http://www.securityfocus.com/bid/21064","http://doc.emergingthreats.net/2004685"],"2004686":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7118","http://www.securityfocus.com/bid/21064","http://doc.emergingthreats.net/2004686"],"2004687":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7118","http://www.securityfocus.com/bid/21064","http://doc.emergingthreats.net/2004687"],"2004688":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7118","http://www.securityfocus.com/bid/21064","http://doc.emergingthreats.net/2004688"],"2004695":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7115","http://www.securityfocus.com/bid/21002","http://doc.emergingthreats.net/2004695"],"2004696":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7115","http://www.securityfocus.com/bid/21002","http://doc.emergingthreats.net/2004696"],"2004697":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7115","http://www.securityfocus.com/bid/21002","http://doc.emergingthreats.net/2004697"],"2004698":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7115","http://www.securityfocus.com/bid/21002","http://doc.emergingthreats.net/2004698"],"2004699":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7115","http://www.securityfocus.com/bid/21002","http://doc.emergingthreats.net/2004699"],"2004700":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7115","http://www.securityfocus.com/bid/21002","http://doc.emergingthreats.net/2004700"],"2004701":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7101","http://www.milw0rm.com/exploits/2759","http://doc.emergingthreats.net/2004701"],"2004702":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7101","http://www.milw0rm.com/exploits/2759","http://doc.emergingthreats.net/2004702"],"2004703":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7101","http://www.milw0rm.com/exploits/2759","http://doc.emergingthreats.net/2004703"],"2004704":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7101","http://www.milw0rm.com/exploits/2759","http://doc.emergingthreats.net/2004704"],"2004705":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1255","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004705"],"2004706":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1255","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004706"],"2004707":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1255","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004707"],"2004708":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1255","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004708"],"2004709":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1255","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004709"],"2004710":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1255","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004710"],"2004711":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1254","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004711"],"2004712":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1254","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004712"],"2004714":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1254","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004714"],"2004715":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1254","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004715"],"2004716":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1254","http://www.milw0rm.com/exploits/3352","http://doc.emergingthreats.net/2004716"],"2004717":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1250","http://www.milw0rm.com/exploits/3390","http://doc.emergingthreats.net/2004717"],"2004718":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1250","http://www.milw0rm.com/exploits/3390","http://doc.emergingthreats.net/2004718"],"2004719":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1250","http://www.milw0rm.com/exploits/3390","http://doc.emergingthreats.net/2004719"],"2004720":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1250","http://www.milw0rm.com/exploits/3390","http://doc.emergingthreats.net/2004720"],"2004721":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1250","http://www.milw0rm.com/exploits/3390","http://doc.emergingthreats.net/2004721"],"2004723":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1250","http://www.milw0rm.com/exploits/3390","http://doc.emergingthreats.net/2004723"],"2004724":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1242","http://www.securityfocus.com/bid/22728","http://doc.emergingthreats.net/2004724"],"2004725":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1242","http://www.securityfocus.com/bid/22728","http://doc.emergingthreats.net/2004725"],"2004726":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1242","http://www.securityfocus.com/bid/22728","http://doc.emergingthreats.net/2004726"],"2004727":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1242","http://www.securityfocus.com/bid/22728","http://doc.emergingthreats.net/2004727"],"2004728":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1242","http://www.securityfocus.com/bid/22728","http://doc.emergingthreats.net/2004728"],"2004729":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1242","http://www.securityfocus.com/bid/22728","http://doc.emergingthreats.net/2004729"],"2004736":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1171","http://www.milw0rm.com/exploits/3337","http://doc.emergingthreats.net/2004736"],"2004737":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1171","http://www.milw0rm.com/exploits/3337","http://doc.emergingthreats.net/2004737"],"2004738":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1171","http://www.milw0rm.com/exploits/3337","http://doc.emergingthreats.net/2004738"],"2004739":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1171","http://www.milw0rm.com/exploits/3337","http://doc.emergingthreats.net/2004739"],"2004740":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1171","http://www.milw0rm.com/exploits/3337","http://doc.emergingthreats.net/2004740"],"2004741":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1171","http://www.milw0rm.com/exploits/3337","http://doc.emergingthreats.net/2004741"],"2004742":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1166","http://www.exploit-db.com/exploits/3355/","http://doc.emergingthreats.net/2004742"],"2004743":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1166","http://www.exploit-db.com/exploits/3355/","http://doc.emergingthreats.net/2004743"],"2004744":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1166","http://www.exploit-db.com/exploits/3355/","http://doc.emergingthreats.net/2004744"],"2004745":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1166","http://www.exploit-db.com/exploits/3355/","http://doc.emergingthreats.net/2004745"],"2004746":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1166","http://www.exploit-db.com/exploits/3355/","http://doc.emergingthreats.net/2004746"],"2004747":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1166","http://www.exploit-db.com/exploits/3355/","http://doc.emergingthreats.net/2004747"],"2004748":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1163","http://www.milw0rm.com/exploits/3351","http://doc.emergingthreats.net/2004748"],"2004749":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1163","http://www.milw0rm.com/exploits/3351","http://doc.emergingthreats.net/2004749"],"2004750":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1163","http://www.milw0rm.com/exploits/3351","http://doc.emergingthreats.net/2004750"],"2004751":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1163","http://www.milw0rm.com/exploits/3351","http://doc.emergingthreats.net/2004751"],"2004752":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1163","http://www.milw0rm.com/exploits/3351","http://doc.emergingthreats.net/2004752"],"2004753":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1163","http://www.milw0rm.com/exploits/3351","http://doc.emergingthreats.net/2004753"],"2004760":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1135","http://www.securityfocus.com/bid/22726","http://doc.emergingthreats.net/2004760"],"2004761":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1135","http://www.securityfocus.com/bid/22726","http://doc.emergingthreats.net/2004761"],"2004762":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1135","http://www.securityfocus.com/bid/22726","http://doc.emergingthreats.net/2004762"],"2004763":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1135","http://www.securityfocus.com/bid/22726","http://doc.emergingthreats.net/2004763"],"2004764":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1135","http://www.securityfocus.com/bid/22726","http://doc.emergingthreats.net/2004764"],"2004765":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1135","http://www.securityfocus.com/bid/22726","http://doc.emergingthreats.net/2004765"],"2004766":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7092","http://www.securityfocus.com/bid/20413","http://doc.emergingthreats.net/2004766"],"2004767":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7092","http://www.securityfocus.com/bid/20413","http://doc.emergingthreats.net/2004767"],"2004768":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7092","http://www.securityfocus.com/bid/20413","http://doc.emergingthreats.net/2004768"],"2004769":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7092","http://www.securityfocus.com/bid/20413","http://doc.emergingthreats.net/2004769"],"2004770":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7092","http://www.securityfocus.com/bid/20413","http://doc.emergingthreats.net/2004770"],"2004771":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7092","http://www.securityfocus.com/bid/20413","http://doc.emergingthreats.net/2004771"],"2004772":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7089","http://marc.theaimsgroup.com/?l=bugtraq&m=116205673106780&w=2","http://doc.emergingthreats.net/2004772"],"2004773":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7089","http://marc.theaimsgroup.com/?l=bugtraq&m=116205673106780&w=2","http://doc.emergingthreats.net/2004773"],"2004774":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7089","http://marc.theaimsgroup.com/?l=bugtraq&m=116205673106780&w=2","http://doc.emergingthreats.net/2004774"],"2004775":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7089","http://marc.theaimsgroup.com/?l=bugtraq&m=116205673106780&w=2","http://doc.emergingthreats.net/2004775"],"2004776":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7089","http://marc.theaimsgroup.com/?l=bugtraq&m=116205673106780&w=2","http://doc.emergingthreats.net/2004776"],"2004778":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7089","http://marc.theaimsgroup.com/?l=bugtraq&m=116205673106780&w=2","http://doc.emergingthreats.net/2004778"],"2004779":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004779"],"2004780":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004780"],"2004781":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004781"],"2004782":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004782"],"2004783":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004783"],"2004784":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004784"],"2004785":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004785"],"2004786":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004786"],"2004787":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004787"],"2004788":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004788"],"2004789":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004789"],"2004790":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7088","http://xforce.iss.net/xforce/xfdb/30252","http://doc.emergingthreats.net/2004790"],"2004797":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7071","http://www.milw0rm.com/exploits/2010","http://doc.emergingthreats.net/2004797"],"2004798":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7071","http://www.milw0rm.com/exploits/2010","http://doc.emergingthreats.net/2004798"],"2004799":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7071","http://www.milw0rm.com/exploits/2010","http://doc.emergingthreats.net/2004799"],"2004800":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7071","http://www.milw0rm.com/exploits/2010","http://doc.emergingthreats.net/2004800"],"2004801":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7071","http://www.milw0rm.com/exploits/2010","http://doc.emergingthreats.net/2004801"],"2004802":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7071","http://www.milw0rm.com/exploits/2010","http://doc.emergingthreats.net/2004802"],"2004803":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1122","http://www.securityfocus.com/bid/22685","http://doc.emergingthreats.net/2004803"],"2004804":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1122","http://www.securityfocus.com/bid/22685","http://doc.emergingthreats.net/2004804"],"2004805":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1122","http://www.securityfocus.com/bid/22685","http://doc.emergingthreats.net/2004805"],"2004806":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1122","http://www.securityfocus.com/bid/22685","http://doc.emergingthreats.net/2004806"],"2004807":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1122","http://www.securityfocus.com/bid/22685","http://doc.emergingthreats.net/2004807"],"2004808":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1122","http://www.securityfocus.com/bid/22685","http://doc.emergingthreats.net/2004808"],"2004809":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1107","http://www.milw0rm.com/exploits/3371","http://doc.emergingthreats.net/2004809"],"2004810":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1107","http://www.milw0rm.com/exploits/3371","http://doc.emergingthreats.net/2004810"],"2004811":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1107","http://www.milw0rm.com/exploits/3371","http://doc.emergingthreats.net/2004811"],"2004812":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1107","http://www.milw0rm.com/exploits/3371","http://doc.emergingthreats.net/2004812"],"2004813":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1107","http://www.milw0rm.com/exploits/3371","http://doc.emergingthreats.net/2004813"],"2004815":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1107","http://www.milw0rm.com/exploits/3371","http://doc.emergingthreats.net/2004815"],"2004816":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7057","http://www.secunia.com/advisories/20131","http://doc.emergingthreats.net/2004816"],"2004817":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7057","http://www.secunia.com/advisories/20131","http://doc.emergingthreats.net/2004817"],"2004818":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7057","http://www.secunia.com/advisories/20131","http://doc.emergingthreats.net/2004818"],"2004819":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7057","http://www.secunia.com/advisories/20131","http://doc.emergingthreats.net/2004819"],"2004820":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7057","http://www.secunia.com/advisories/20131","http://doc.emergingthreats.net/2004820"],"2004821":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7057","http://www.secunia.com/advisories/20131","http://doc.emergingthreats.net/2004821"],"2004822":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7034","http://www.securityfocus.com/archive/1/archive/1/435166/30/4680/threaded","http://doc.emergingthreats.net/2004822"],"2004823":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7034","http://www.securityfocus.com/archive/1/archive/1/435166/30/4680/threaded","http://doc.emergingthreats.net/2004823"],"2004824":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7034","http://www.securityfocus.com/archive/1/archive/1/435166/30/4680/threaded","http://doc.emergingthreats.net/2004824"],"2004825":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7034","http://www.securityfocus.com/archive/1/archive/1/435166/30/4680/threaded","http://doc.emergingthreats.net/2004825"],"2004826":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7034","http://www.securityfocus.com/archive/1/archive/1/435166/30/4680/threaded","http://doc.emergingthreats.net/2004826"],"2004827":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7034","http://www.securityfocus.com/archive/1/archive/1/435166/30/4680/threaded","http://doc.emergingthreats.net/2004827"],"2004828":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7025","http://www.secunia.com/advisories/19758","http://doc.emergingthreats.net/2004828"],"2004829":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7025","http://www.secunia.com/advisories/19758","http://doc.emergingthreats.net/2004829"],"2004830":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7025","http://www.secunia.com/advisories/19758","http://doc.emergingthreats.net/2004830"],"2004831":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7025","http://www.secunia.com/advisories/19758","http://doc.emergingthreats.net/2004831"],"2004832":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7025","http://www.secunia.com/advisories/19758","http://doc.emergingthreats.net/2004832"],"2004833":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7025","http://www.secunia.com/advisories/19758","http://doc.emergingthreats.net/2004833"],"2004834":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1077","http://www.securityfocus.com/bid/22636","http://doc.emergingthreats.net/2004834"],"2004835":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1077","http://www.securityfocus.com/bid/22636","http://doc.emergingthreats.net/2004835"],"2004836":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1077","http://www.securityfocus.com/bid/22636","http://doc.emergingthreats.net/2004836"],"2004837":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1077","http://www.securityfocus.com/bid/22636","http://doc.emergingthreats.net/2004837"],"2004839":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1077","http://www.securityfocus.com/bid/22636","http://doc.emergingthreats.net/2004839"],"2004840":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1073","http://www.securityfocus.com/archive/1/archive/1/459796/100/200/threaded","http://doc.emergingthreats.net/2004840"],"2004841":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1073","http://www.securityfocus.com/archive/1/archive/1/459796/100/200/threaded","http://doc.emergingthreats.net/2004841"],"2004842":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1073","http://www.securityfocus.com/archive/1/archive/1/459796/100/200/threaded","http://doc.emergingthreats.net/2004842"],"2004843":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1073","http://www.securityfocus.com/archive/1/archive/1/459796/100/200/threaded","http://doc.emergingthreats.net/2004843"],"2004844":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1073","http://www.securityfocus.com/archive/1/archive/1/459796/100/200/threaded","http://doc.emergingthreats.net/2004844"],"2004845":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1073","http://www.securityfocus.com/archive/1/archive/1/459796/100/200/threaded","http://doc.emergingthreats.net/2004845"],"2004846":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1058","http://www.milw0rm.com/exploits/3339","http://doc.emergingthreats.net/2004846"],"2004847":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1058","http://www.milw0rm.com/exploits/3339","http://doc.emergingthreats.net/2004847"],"2004848":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1058","http://www.milw0rm.com/exploits/3339","http://doc.emergingthreats.net/2004848"],"2004849":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1058","http://www.milw0rm.com/exploits/3339","http://doc.emergingthreats.net/2004849"],"2004850":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1058","http://www.milw0rm.com/exploits/3339","http://doc.emergingthreats.net/2004850"],"2004851":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1034","http://www.milw0rm.com/exploits/3334","http://doc.emergingthreats.net/2004851"],"2004852":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1034","http://www.milw0rm.com/exploits/3334","http://doc.emergingthreats.net/2004852"],"2004853":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1034","http://www.milw0rm.com/exploits/3334","http://doc.emergingthreats.net/2004853"],"2004854":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1034","http://www.milw0rm.com/exploits/3334","http://doc.emergingthreats.net/2004854"],"2004855":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1034","http://www.milw0rm.com/exploits/3334","http://doc.emergingthreats.net/2004855"],"2004856":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1034","http://www.milw0rm.com/exploits/3334","http://doc.emergingthreats.net/2004856"],"2004857":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1026","http://www.milw0rm.com/exploits/3327","http://doc.emergingthreats.net/2004857"],"2004858":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1026","http://www.milw0rm.com/exploits/3327","http://doc.emergingthreats.net/2004858"],"2004859":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1026","http://www.milw0rm.com/exploits/3327","http://doc.emergingthreats.net/2004859"],"2004860":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1026","http://www.milw0rm.com/exploits/3327","http://doc.emergingthreats.net/2004860"],"2004861":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1026","http://www.milw0rm.com/exploits/3327","http://doc.emergingthreats.net/2004861"],"2004862":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1026","http://www.milw0rm.com/exploits/3327","http://doc.emergingthreats.net/2004862"],"2004863":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1023","http://www.milw0rm.com/exploits/3321","http://doc.emergingthreats.net/2004863"],"2004864":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1023","http://www.milw0rm.com/exploits/3321","http://doc.emergingthreats.net/2004864"],"2004865":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1023","http://www.milw0rm.com/exploits/3321","http://doc.emergingthreats.net/2004865"],"2004866":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1023","http://www.milw0rm.com/exploits/3321","http://doc.emergingthreats.net/2004866"],"2004867":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1023","http://www.milw0rm.com/exploits/3321","http://doc.emergingthreats.net/2004867"],"2004868":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1023","http://www.milw0rm.com/exploits/3321","http://doc.emergingthreats.net/2004868"],"2004869":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1022","http://www.securityfocus.com/bid/22591","http://doc.emergingthreats.net/2004869"],"2004870":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1022","http://www.securityfocus.com/bid/22591","http://doc.emergingthreats.net/2004870"],"2004871":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1022","http://www.securityfocus.com/bid/22591","http://doc.emergingthreats.net/2004871"],"2004872":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1022","http://www.securityfocus.com/bid/22591","http://doc.emergingthreats.net/2004872"],"2004873":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1022","http://www.securityfocus.com/bid/22591","http://doc.emergingthreats.net/2004873"],"2004874":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1022","http://www.securityfocus.com/bid/22591","http://doc.emergingthreats.net/2004874"],"2004875":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1021","http://www.milw0rm.com/exploits/3317","http://doc.emergingthreats.net/2004875"],"2004876":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1021","http://www.milw0rm.com/exploits/3317","http://doc.emergingthreats.net/2004876"],"2004877":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1021","http://www.milw0rm.com/exploits/3317","http://doc.emergingthreats.net/2004877"],"2004878":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1021","http://www.milw0rm.com/exploits/3317","http://doc.emergingthreats.net/2004878"],"2004879":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1021","http://www.milw0rm.com/exploits/3317","http://doc.emergingthreats.net/2004879"],"2004880":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1021","http://www.milw0rm.com/exploits/3317","http://doc.emergingthreats.net/2004880"],"2004887":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004887"],"2004888":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004888"],"2004889":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004889"],"2004890":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004890"],"2004891":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004891"],"2004892":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004892"],"2004893":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004893"],"2004894":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004894"],"2004895":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004895"],"2004896":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004896"],"2004897":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004897"],"2004898":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1016","http://www.frsirt.com/english/advisories/2007/0620","http://doc.emergingthreats.net/2004898"],"2004899":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0985","http://www.milw0rm.com/exploits/3299","http://doc.emergingthreats.net/2004899"],"2004900":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0985","http://www.milw0rm.com/exploits/3299","http://doc.emergingthreats.net/2004900"],"2004901":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0985","http://www.milw0rm.com/exploits/3299","http://doc.emergingthreats.net/2004901"],"2004902":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0985","http://www.milw0rm.com/exploits/3299","http://doc.emergingthreats.net/2004902"],"2004903":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0985","http://www.milw0rm.com/exploits/3299","http://doc.emergingthreats.net/2004903"],"2004904":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0985","http://www.milw0rm.com/exploits/3299","http://doc.emergingthreats.net/2004904"],"2004905":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0984","http://www.milw0rm.com/exploits/3301","http://doc.emergingthreats.net/2004905"],"2004906":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0984","http://www.milw0rm.com/exploits/3301","http://doc.emergingthreats.net/2004906"],"2004907":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0984","http://www.milw0rm.com/exploits/3301","http://doc.emergingthreats.net/2004907"],"2004908":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0984","http://www.milw0rm.com/exploits/3301","http://doc.emergingthreats.net/2004908"],"2004909":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0984","http://www.milw0rm.com/exploits/3301","http://doc.emergingthreats.net/2004909"],"2004910":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0984","http://www.milw0rm.com/exploits/3301","http://doc.emergingthreats.net/2004910"],"2004911":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0970","http://www.securityfocus.com/bid/22559","http://doc.emergingthreats.net/2004911"],"2004912":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0970","http://www.securityfocus.com/bid/22559","http://doc.emergingthreats.net/2004912"],"2004913":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0970","http://www.securityfocus.com/bid/22559","http://doc.emergingthreats.net/2004913"],"2004914":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0970","http://www.securityfocus.com/bid/22559","http://doc.emergingthreats.net/2004914"],"2004915":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0970","http://www.securityfocus.com/bid/22559","http://doc.emergingthreats.net/2004915"],"2004916":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0970","http://www.securityfocus.com/bid/22559","http://doc.emergingthreats.net/2004916"],"2004917":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0951","http://www.securityfocus.com/bid/22545","http://doc.emergingthreats.net/2004917"],"2004918":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0951","http://www.securityfocus.com/bid/22545","http://doc.emergingthreats.net/2004918"],"2004919":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0951","http://www.securityfocus.com/bid/22545","http://doc.emergingthreats.net/2004919"],"2004920":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0951","http://www.securityfocus.com/bid/22545","http://doc.emergingthreats.net/2004920"],"2004921":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0951","http://www.securityfocus.com/bid/22545","http://doc.emergingthreats.net/2004921"],"2004923":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0951","http://www.securityfocus.com/bid/22545","http://doc.emergingthreats.net/2004923"],"2004924":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0920","http://www.milw0rm.com/exploits/3295","http://doc.emergingthreats.net/2004924"],"2004925":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0920","http://www.milw0rm.com/exploits/3295","http://doc.emergingthreats.net/2004925"],"2004926":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0920","http://www.milw0rm.com/exploits/3295","http://doc.emergingthreats.net/2004926"],"2004927":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0920","http://www.milw0rm.com/exploits/3295","http://doc.emergingthreats.net/2004927"],"2004928":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0920","http://www.milw0rm.com/exploits/3295","http://doc.emergingthreats.net/2004928"],"2004929":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0920","http://www.milw0rm.com/exploits/3295","http://doc.emergingthreats.net/2004929"],"2004930":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7005","http://www.securityfocus.com/bid/17974","http://doc.emergingthreats.net/2004930"],"2004931":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7005","http://www.securityfocus.com/bid/17974","http://doc.emergingthreats.net/2004931"],"2004932":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7005","http://www.securityfocus.com/bid/17974","http://doc.emergingthreats.net/2004932"],"2004933":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7005","http://www.securityfocus.com/bid/17974","http://doc.emergingthreats.net/2004933"],"2004934":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7005","http://www.securityfocus.com/bid/17974","http://doc.emergingthreats.net/2004934"],"2004935":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7005","http://www.securityfocus.com/bid/17974","http://doc.emergingthreats.net/2004935"],"2004936":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004936"],"2004937":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004937"],"2004938":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004938"],"2004939":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004939"],"2004940":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004940"],"2004941":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004941"],"2004942":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004942"],"2004943":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004943"],"2004945":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004945"],"2004946":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004946"],"2004947":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004947"],"2004948":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004948"],"2004949":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004949"],"2004950":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004950"],"2004951":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004951"],"2004952":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004952"],"2004953":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004953"],"2004954":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004954"],"2004955":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004955"],"2004956":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004956"],"2004957":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004957"],"2004958":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004958"],"2004959":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004959"],"2004960":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6993","http://www.secunia.com/advisories/19703","http://doc.emergingthreats.net/2004960"],"2004961":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0865","http://www.exploit-db.com/exploits/3287/","http://doc.emergingthreats.net/2004961"],"2004962":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0865","http://www.exploit-db.com/exploits/3287/","http://doc.emergingthreats.net/2004962"],"2004963":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0865","http://www.exploit-db.com/exploits/3287/","http://doc.emergingthreats.net/2004963"],"2004964":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0865","http://www.exploit-db.com/exploits/3287/","http://doc.emergingthreats.net/2004964"],"2004965":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0865","http://www.exploit-db.com/exploits/3287/","http://doc.emergingthreats.net/2004965"],"2004966":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0865","http://www.exploit-db.com/exploits/3287/","http://doc.emergingthreats.net/2004966"],"2004967":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0864","http://www.exploit-db.com/exploits/3288/","http://doc.emergingthreats.net/2004967"],"2004968":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0864","http://www.exploit-db.com/exploits/3288/","http://doc.emergingthreats.net/2004968"],"2004969":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0864","http://www.exploit-db.com/exploits/3288/","http://doc.emergingthreats.net/2004969"],"2004970":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0864","http://www.exploit-db.com/exploits/3288/","http://doc.emergingthreats.net/2004970"],"2004971":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0864","http://www.exploit-db.com/exploits/3288/","http://doc.emergingthreats.net/2004971"],"2004972":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0864","http://www.exploit-db.com/exploits/3288/","http://doc.emergingthreats.net/2004972"],"2004979":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0826","http://www.exploit-db.com/exploits/3278/","http://doc.emergingthreats.net/2004979"],"2004980":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0826","http://www.exploit-db.com/exploits/3278/","http://doc.emergingthreats.net/2004980"],"2004981":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0826","http://www.exploit-db.com/exploits/3278/","http://doc.emergingthreats.net/2004981"],"2004982":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0826","http://www.exploit-db.com/exploits/3278/","http://doc.emergingthreats.net/2004982"],"2004983":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0826","http://www.exploit-db.com/exploits/3278/","http://doc.emergingthreats.net/2004983"],"2004984":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0826","http://www.exploit-db.com/exploits/3278/","http://doc.emergingthreats.net/2004984"],"2004985":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004985"],"2004986":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004986"],"2004987":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004987"],"2004988":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004988"],"2004989":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004989"],"2004990":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004990"],"2004991":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004991"],"2004992":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004992"],"2004993":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004993"],"2004994":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004994"],"2004995":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004995"],"2004996":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6972","http://www.securityfocus.com/bid/18549","http://doc.emergingthreats.net/2004996"],"2004997":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0812","http://www.milw0rm.com/exploits/3262","http://doc.emergingthreats.net/2004997"],"2004998":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0812","http://www.milw0rm.com/exploits/3262","http://doc.emergingthreats.net/2004998"],"2004999":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0812","http://www.milw0rm.com/exploits/3262","http://doc.emergingthreats.net/2004999"],"2005000":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0812","http://www.milw0rm.com/exploits/3262","http://doc.emergingthreats.net/2005000"],"2005001":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0812","http://www.milw0rm.com/exploits/3262","http://doc.emergingthreats.net/2005001"],"2005002":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0812","http://www.milw0rm.com/exploits/3262","http://doc.emergingthreats.net/2005002"],"2005003":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0799","http://www.securityfocus.com/bid/22382","http://doc.emergingthreats.net/2005003"],"2005004":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0799","http://www.securityfocus.com/bid/22382","http://doc.emergingthreats.net/2005004"],"2005005":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0799","http://www.securityfocus.com/bid/22382","http://doc.emergingthreats.net/2005005"],"2005006":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0799","http://www.securityfocus.com/bid/22382","http://doc.emergingthreats.net/2005006"],"2005007":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0799","http://www.securityfocus.com/bid/22382","http://doc.emergingthreats.net/2005007"],"2005008":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0799","http://www.securityfocus.com/bid/22382","http://doc.emergingthreats.net/2005008"],"2005009":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0794","http://www.securityfocus.com/archive/1/archive/1/459151/100/0/threaded","http://doc.emergingthreats.net/2005009"],"2005010":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0794","http://www.securityfocus.com/archive/1/archive/1/459151/100/0/threaded","http://doc.emergingthreats.net/2005010"],"2005011":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0794","http://www.securityfocus.com/archive/1/archive/1/459151/100/0/threaded","http://doc.emergingthreats.net/2005011"],"2005012":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0794","http://www.securityfocus.com/archive/1/archive/1/459151/100/0/threaded","http://doc.emergingthreats.net/2005012"],"2005013":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0794","http://www.securityfocus.com/archive/1/archive/1/459151/100/0/threaded","http://doc.emergingthreats.net/2005013"],"2005014":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0794","http://www.securityfocus.com/archive/1/archive/1/459151/100/0/threaded","http://doc.emergingthreats.net/2005014"],"2005015":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0786","http://www.milw0rm.com/exploits/3261","http://doc.emergingthreats.net/2005015"],"2005016":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0786","http://www.milw0rm.com/exploits/3261","http://doc.emergingthreats.net/2005016"],"2005017":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0786","http://www.milw0rm.com/exploits/3261","http://doc.emergingthreats.net/2005017"],"2005018":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0786","http://www.milw0rm.com/exploits/3261","http://doc.emergingthreats.net/2005018"],"2005019":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0786","http://www.milw0rm.com/exploits/3261","http://doc.emergingthreats.net/2005019"],"2005020":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0786","http://www.milw0rm.com/exploits/3261","http://doc.emergingthreats.net/2005020"],"2005021":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005021"],"2005022":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005022"],"2005023":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005023"],"2005024":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005024"],"2005025":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005025"],"2005026":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005026"],"2005027":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005027"],"2005028":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005028"],"2005029":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005029"],"2005030":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005030"],"2005031":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005031"],"2005032":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0784","http://www.securityfocus.com/archive/1/archive/1/458560/100/0/threaded","http://doc.emergingthreats.net/2005032"],"2005033":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0765","http://www.milw0rm.com/exploits/3256","http://doc.emergingthreats.net/2005033"],"2005034":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0765","http://www.milw0rm.com/exploits/3256","http://doc.emergingthreats.net/2005034"],"2005035":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0765","http://www.milw0rm.com/exploits/3256","http://doc.emergingthreats.net/2005035"],"2005036":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0765","http://www.milw0rm.com/exploits/3256","http://doc.emergingthreats.net/2005036"],"2005037":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0765","http://www.milw0rm.com/exploits/3256","http://doc.emergingthreats.net/2005037"],"2005038":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0765","http://www.milw0rm.com/exploits/3256","http://doc.emergingthreats.net/2005038"],"2005039":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005039"],"2005040":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005040"],"2005041":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005041"],"2005042":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005042"],"2005043":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005043"],"2005044":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005044"],"2005045":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005045"],"2005046":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005046"],"2005047":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005047"],"2005048":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005048"],"2005049":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005049"],"2005050":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005050"],"2005051":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005051"],"2005052":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005052"],"2005053":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005053"],"2005054":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005054"],"2005055":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005055"],"2005056":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0759","http://www.securityfocus.com/bid/22369","http://doc.emergingthreats.net/2005056"],"2005057":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0698","http://www.frsirt.com/english/advisories/2007/0388","http://doc.emergingthreats.net/2005057"],"2005058":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0698","http://www.frsirt.com/english/advisories/2007/0388","http://doc.emergingthreats.net/2005058"],"2005059":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0698","http://www.frsirt.com/english/advisories/2007/0388","http://doc.emergingthreats.net/2005059"],"2005060":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0698","http://www.frsirt.com/english/advisories/2007/0388","http://doc.emergingthreats.net/2005060"],"2005061":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0698","http://www.frsirt.com/english/advisories/2007/0388","http://doc.emergingthreats.net/2005061"],"2005062":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0698","http://www.frsirt.com/english/advisories/2007/0388","http://doc.emergingthreats.net/2005062"],"2005063":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0688","http://www.milw0rm.com/exploits/3241","http://doc.emergingthreats.net/2005063"],"2005064":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0688","http://www.milw0rm.com/exploits/3241","http://doc.emergingthreats.net/2005064"],"2005065":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0688","http://www.milw0rm.com/exploits/3241","http://doc.emergingthreats.net/2005065"],"2005066":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0688","http://www.milw0rm.com/exploits/3241","http://doc.emergingthreats.net/2005066"],"2005067":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0688","http://www.milw0rm.com/exploits/3241","http://doc.emergingthreats.net/2005067"],"2005068":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0688","http://www.milw0rm.com/exploits/3241","http://doc.emergingthreats.net/2005068"],"2005069":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0687","http://www.exploit-db.com/exploits/3232/","http://doc.emergingthreats.net/2005069"],"2005070":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0687","http://www.exploit-db.com/exploits/3232/","http://doc.emergingthreats.net/2005070"],"2005071":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0687","http://www.exploit-db.com/exploits/3232/","http://doc.emergingthreats.net/2005071"],"2005072":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0687","http://www.exploit-db.com/exploits/3232/","http://doc.emergingthreats.net/2005072"],"2005073":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0687","http://www.exploit-db.com/exploits/3232/","http://doc.emergingthreats.net/2005073"],"2005074":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0687","http://www.exploit-db.com/exploits/3232/","http://doc.emergingthreats.net/2005074"],"2005075":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0678","http://www.milw0rm.com/exploits/3233","http://doc.emergingthreats.net/2005075"],"2005076":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0678","http://www.milw0rm.com/exploits/3233","http://doc.emergingthreats.net/2005076"],"2005077":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0678","http://www.milw0rm.com/exploits/3233","http://doc.emergingthreats.net/2005077"],"2005078":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0678","http://www.milw0rm.com/exploits/3233","http://doc.emergingthreats.net/2005078"],"2005079":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0678","http://www.milw0rm.com/exploits/3233","http://doc.emergingthreats.net/2005079"],"2005080":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0678","http://www.milw0rm.com/exploits/3233","http://doc.emergingthreats.net/2005080"],"2005081":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0676","http://www.milw0rm.com/exploits/3234","http://doc.emergingthreats.net/2005081"],"2005082":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0676","http://www.milw0rm.com/exploits/3234","http://doc.emergingthreats.net/2005082"],"2005083":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0676","http://www.milw0rm.com/exploits/3234","http://doc.emergingthreats.net/2005083"],"2005084":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0676","http://www.milw0rm.com/exploits/3234","http://doc.emergingthreats.net/2005084"],"2005085":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0676","http://www.milw0rm.com/exploits/3234","http://doc.emergingthreats.net/2005085"],"2005086":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0676","http://www.milw0rm.com/exploits/3234","http://doc.emergingthreats.net/2005086"],"2005088":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0663","http://www.frsirt.com/english/advisories/2007/0424","http://doc.emergingthreats.net/2005088"],"2005089":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0663","http://www.frsirt.com/english/advisories/2007/0424","http://doc.emergingthreats.net/2005089"],"2005090":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0663","http://www.frsirt.com/english/advisories/2007/0424","http://doc.emergingthreats.net/2005090"],"2005091":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0663","http://www.frsirt.com/english/advisories/2007/0424","http://doc.emergingthreats.net/2005091"],"2005092":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0663","http://www.frsirt.com/english/advisories/2007/0424","http://doc.emergingthreats.net/2005092"],"2005093":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005093"],"2005094":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005094"],"2005095":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005095"],"2005096":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005096"],"2005097":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005097"],"2005098":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005098"],"2005099":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005099"],"2005100":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005100"],"2005101":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005101"],"2005102":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005102"],"2005103":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005103"],"2005104":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0642","http://www.securityfocus.com/bid/22350","http://doc.emergingthreats.net/2005104"],"2005105":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0632","http://www.frsirt.com/english/advisories/2007/0341","http://doc.emergingthreats.net/2005105"],"2005106":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0632","http://www.frsirt.com/english/advisories/2007/0341","http://doc.emergingthreats.net/2005106"],"2005107":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0632","http://www.frsirt.com/english/advisories/2007/0341","http://doc.emergingthreats.net/2005107"],"2005108":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0632","http://www.frsirt.com/english/advisories/2007/0341","http://doc.emergingthreats.net/2005108"],"2005109":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0632","http://www.frsirt.com/english/advisories/2007/0341","http://doc.emergingthreats.net/2005109"],"2005110":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0632","http://www.frsirt.com/english/advisories/2007/0341","http://doc.emergingthreats.net/2005110"],"2005112":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0631","http://www.milw0rm.com/exploits/3227","http://doc.emergingthreats.net/2005112"],"2005113":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0631","http://www.milw0rm.com/exploits/3227","http://doc.emergingthreats.net/2005113"],"2005114":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0631","http://www.milw0rm.com/exploits/3227","http://doc.emergingthreats.net/2005114"],"2005115":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0631","http://www.milw0rm.com/exploits/3227","http://doc.emergingthreats.net/2005115"],"2005116":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0631","http://www.milw0rm.com/exploits/3227","http://doc.emergingthreats.net/2005116"],"2005117":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005117"],"2005118":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005118"],"2005119":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005119"],"2005120":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005120"],"2005121":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005121"],"2005122":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005122"],"2005123":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005123"],"2005124":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005124"],"2005125":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005125"],"2005126":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005126"],"2005127":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005127"],"2005128":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005128"],"2005129":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005129"],"2005130":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005130"],"2005131":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005131"],"2005132":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005132"],"2005133":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005133"],"2005134":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0630","http://www.frsirt.com/english/advisories/2007/0395","http://doc.emergingthreats.net/2005134"],"2005141":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0600","http://www.exploit-db.com/exploits/3194/","http://doc.emergingthreats.net/2005141"],"2005142":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0600","http://www.exploit-db.com/exploits/3194/","http://doc.emergingthreats.net/2005142"],"2005143":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0600","http://www.exploit-db.com/exploits/3194/","http://doc.emergingthreats.net/2005143"],"2005144":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0600","http://www.exploit-db.com/exploits/3194/","http://doc.emergingthreats.net/2005144"],"2005145":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0600","http://www.exploit-db.com/exploits/3194/","http://doc.emergingthreats.net/2005145"],"2005146":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0600","http://www.exploit-db.com/exploits/3194/","http://doc.emergingthreats.net/2005146"],"2005147":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0589","http://www.milw0rm.com/exploits/3197","http://doc.emergingthreats.net/2005147"],"2005148":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0589","http://www.milw0rm.com/exploits/3197","http://doc.emergingthreats.net/2005148"],"2005149":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0589","http://www.milw0rm.com/exploits/3197","http://doc.emergingthreats.net/2005149"],"2005150":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0589","http://www.milw0rm.com/exploits/3197","http://doc.emergingthreats.net/2005150"],"2005151":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0589","http://www.milw0rm.com/exploits/3197","http://doc.emergingthreats.net/2005151"],"2005152":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0574","http://www.securityfocus.com/bid/22282","http://doc.emergingthreats.net/2005152"],"2005153":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0574","http://www.securityfocus.com/bid/22282","http://doc.emergingthreats.net/2005153"],"2005154":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0574","http://www.securityfocus.com/bid/22282","http://doc.emergingthreats.net/2005154"],"2005155":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0574","http://www.securityfocus.com/bid/22282","http://doc.emergingthreats.net/2005155"],"2005156":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0574","http://www.securityfocus.com/bid/22282","http://doc.emergingthreats.net/2005156"],"2005157":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0574","http://www.securityfocus.com/bid/22282","http://doc.emergingthreats.net/2005157"],"2005158":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0569","http://www.milw0rm.com/exploits/3216","http://doc.emergingthreats.net/2005158"],"2005159":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0569","http://www.milw0rm.com/exploits/3216","http://doc.emergingthreats.net/2005159"],"2005160":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0569","http://www.milw0rm.com/exploits/3216","http://doc.emergingthreats.net/2005160"],"2005161":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0569","http://www.milw0rm.com/exploits/3216","http://doc.emergingthreats.net/2005161"],"2005162":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0569","http://www.milw0rm.com/exploits/3216","http://doc.emergingthreats.net/2005162"],"2005163":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0569","http://www.milw0rm.com/exploits/3216","http://doc.emergingthreats.net/2005163"],"2005164":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0566","http://www.milw0rm.com/exploits/3187","http://doc.emergingthreats.net/2005164"],"2005165":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0566","http://www.milw0rm.com/exploits/3187","http://doc.emergingthreats.net/2005165"],"2005166":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0566","http://www.milw0rm.com/exploits/3187","http://doc.emergingthreats.net/2005166"],"2005167":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0566","http://www.milw0rm.com/exploits/3187","http://doc.emergingthreats.net/2005167"],"2005168":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0566","http://www.milw0rm.com/exploits/3187","http://doc.emergingthreats.net/2005168"],"2005169":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0566","http://www.milw0rm.com/exploits/3187","http://doc.emergingthreats.net/2005169"],"2005170":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0560","http://www.milw0rm.com/exploits/3186","http://doc.emergingthreats.net/2005170"],"2005171":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0560","http://www.milw0rm.com/exploits/3186","http://doc.emergingthreats.net/2005171"],"2005172":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0560","http://www.milw0rm.com/exploits/3186","http://doc.emergingthreats.net/2005172"],"2005173":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0560","http://www.milw0rm.com/exploits/3186","http://doc.emergingthreats.net/2005173"],"2005174":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0560","http://www.milw0rm.com/exploits/3186","http://doc.emergingthreats.net/2005174"],"2005175":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0560","http://www.milw0rm.com/exploits/3186","http://doc.emergingthreats.net/2005175"],"2005176":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0589","http://www.milw0rm.com/exploits/3197","http://doc.emergingthreats.net/2005176"],"2005177":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1295","http://www.milw0rm.com/exploits/3411","http://doc.emergingthreats.net/2005177"],"2005179":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3080","http://www.securityfocus.com/bid/24288","http://doc.emergingthreats.net/2005179"],"2005180":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7101","http://www.milw0rm.com/exploits/2759","http://doc.emergingthreats.net/2005180"],"2005181":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7101","http://www.milw0rm.com/exploits/2759","http://doc.emergingthreats.net/2005181"],"2005185":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1289","http://www.securityfocus.com/bid/22799","http://doc.emergingthreats.net/2005185"],"2005186":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1058","http://www.milw0rm.com/exploits/3339","http://doc.emergingthreats.net/2005186"],"2005187":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005187"],"2005188":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005188"],"2005189":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005189"],"2005190":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005190"],"2005191":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005191"],"2005192":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005192"],"2005193":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005193"],"2005194":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005194"],"2005195":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005195"],"2005196":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005196"],"2005197":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005197"],"2005198":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005198"],"2005199":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005199"],"2005200":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005200"],"2005201":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005201"],"2005202":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005202"],"2005203":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005203"],"2005204":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005204"],"2005205":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005205"],"2005206":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005206"],"2005207":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005207"],"2005208":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005208"],"2005209":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005209"],"2005210":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005210"],"2005211":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005211"],"2005212":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005212"],"2005213":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005213"],"2005214":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005214"],"2005215":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3178","http://www.securityfocus.com/archive/1/archive/1/469710/100/0/threaded","http://doc.emergingthreats.net/2005215"],"2005216":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3179","http://www.securityfocus.com/archive/1/archive/1/469984/100/0/threaded","http://doc.emergingthreats.net/2005216"],"2005217":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3179","http://www.securityfocus.com/archive/1/archive/1/469984/100/0/threaded","http://doc.emergingthreats.net/2005217"],"2005218":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3179","http://www.securityfocus.com/archive/1/archive/1/469984/100/0/threaded","http://doc.emergingthreats.net/2005218"],"2005219":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3179","http://www.securityfocus.com/archive/1/archive/1/469984/100/0/threaded","http://doc.emergingthreats.net/2005219"],"2005220":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3179","http://www.securityfocus.com/archive/1/archive/1/469984/100/0/threaded","http://doc.emergingthreats.net/2005220"],"2005221":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3179","http://www.securityfocus.com/archive/1/archive/1/469984/100/0/threaded","http://doc.emergingthreats.net/2005221"],"2005222":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0554","http://www.milw0rm.com/exploits/3195","http://doc.emergingthreats.net/2005222"],"2005223":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0554","http://www.milw0rm.com/exploits/3195","http://doc.emergingthreats.net/2005223"],"2005224":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0554","http://www.milw0rm.com/exploits/3195","http://doc.emergingthreats.net/2005224"],"2005225":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0554","http://www.milw0rm.com/exploits/3195","http://doc.emergingthreats.net/2005225"],"2005226":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0554","http://www.milw0rm.com/exploits/3195","http://doc.emergingthreats.net/2005226"],"2005227":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0527","http://downloads.securityfocus.com/vulnerabilities/exploits/22176.html","http://doc.emergingthreats.net/2005227"],"2005228":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0527","http://downloads.securityfocus.com/vulnerabilities/exploits/22176.html","http://doc.emergingthreats.net/2005228"],"2005229":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0527","http://downloads.securityfocus.com/vulnerabilities/exploits/22176.html","http://doc.emergingthreats.net/2005229"],"2005230":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0527","http://downloads.securityfocus.com/vulnerabilities/exploits/22176.html","http://doc.emergingthreats.net/2005230"],"2005231":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0527","http://downloads.securityfocus.com/vulnerabilities/exploits/22176.html","http://doc.emergingthreats.net/2005231"],"2005232":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0527","http://downloads.securityfocus.com/vulnerabilities/exploits/22176.html","http://doc.emergingthreats.net/2005232"],"2005233":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.securityfocus.com/archive/1/archive/1/457667/100/0/threaded","http://doc.emergingthreats.net/2005233"],"2005234":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.securityfocus.com/archive/1/archive/1/457667/100/0/threaded","http://doc.emergingthreats.net/2005234"],"2005235":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.securityfocus.com/archive/1/archive/1/457667/100/0/threaded","http://doc.emergingthreats.net/2005235"],"2005236":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.securityfocus.com/archive/1/archive/1/457667/100/0/threaded","http://doc.emergingthreats.net/2005236"],"2005237":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.securityfocus.com/archive/1/archive/1/457667/100/0/threaded","http://doc.emergingthreats.net/2005237"],"2005238":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.securityfocus.com/archive/1/archive/1/457667/100/0/threaded","http://doc.emergingthreats.net/2005238"],"2005239":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.milw0rm.com/exploits/3172","http://doc.emergingthreats.net/2005239"],"2005240":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.milw0rm.com/exploits/3172","http://doc.emergingthreats.net/2005240"],"2005241":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.milw0rm.com/exploits/3172","http://doc.emergingthreats.net/2005241"],"2005242":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.milw0rm.com/exploits/3172","http://doc.emergingthreats.net/2005242"],"2005243":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.milw0rm.com/exploits/3172","http://doc.emergingthreats.net/2005243"],"2005244":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0520","http://www.milw0rm.com/exploits/3172","http://doc.emergingthreats.net/2005244"],"2005245":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005245"],"2005246":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005246"],"2005247":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005247"],"2005248":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005248"],"2005249":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005249"],"2005250":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005250"],"2005251":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005251"],"2005252":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005252"],"2005253":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005253"],"2005254":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005254"],"2005255":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005255"],"2005256":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005256"],"2005257":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005257"],"2005258":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005258"],"2005259":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005259"],"2005260":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005260"],"2005261":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005261"],"2005262":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005262"],"2005263":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005263"],"2005264":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005264"],"2005265":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005265"],"2005266":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005266"],"2005267":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0484","http://www.securityfocus.com/bid/22180","http://doc.emergingthreats.net/2005267"],"2005268":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0403","http://www.securityfocus.com/archive/1/archive/1/457506/100/0/threaded","http://doc.emergingthreats.net/2005268"],"2005269":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0403","http://www.securityfocus.com/archive/1/archive/1/457506/100/0/threaded","http://doc.emergingthreats.net/2005269"],"2005270":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0403","http://www.securityfocus.com/archive/1/archive/1/457506/100/0/threaded","http://doc.emergingthreats.net/2005270"],"2005271":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0403","http://www.securityfocus.com/archive/1/archive/1/457506/100/0/threaded","http://doc.emergingthreats.net/2005271"],"2005272":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0403","http://www.securityfocus.com/archive/1/archive/1/457506/100/0/threaded","http://doc.emergingthreats.net/2005272"],"2005273":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0403","http://www.securityfocus.com/archive/1/archive/1/457506/100/0/threaded","http://doc.emergingthreats.net/2005273"],"2005274":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0401","http://www.securityfocus.com/archive/1/archive/1/457505/100/0/threaded","http://doc.emergingthreats.net/2005274"],"2005275":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0401","http://www.securityfocus.com/archive/1/archive/1/457505/100/0/threaded","http://doc.emergingthreats.net/2005275"],"2005276":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0401","http://www.securityfocus.com/archive/1/archive/1/457505/100/0/threaded","http://doc.emergingthreats.net/2005276"],"2005277":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0401","http://www.securityfocus.com/archive/1/archive/1/457505/100/0/threaded","http://doc.emergingthreats.net/2005277"],"2005278":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0401","http://www.securityfocus.com/archive/1/archive/1/457505/100/0/threaded","http://doc.emergingthreats.net/2005278"],"2005279":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0401","http://www.securityfocus.com/archive/1/archive/1/457505/100/0/threaded","http://doc.emergingthreats.net/2005279"],"2005280":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005280"],"2005281":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005281"],"2005282":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005282"],"2005283":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005283"],"2005284":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005284"],"2005285":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005285"],"2005286":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005286"],"2005287":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005287"],"2005288":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005288"],"2005289":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005289"],"2005290":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005290"],"2005291":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0388","http://www.milw0rm.com/exploits/3144","http://doc.emergingthreats.net/2005291"],"2005292":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0387","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005292"],"2005293":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0387","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005293"],"2005294":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0387","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005294"],"2005295":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0387","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005295"],"2005296":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0387","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005296"],"2005297":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0387","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005297"],"2005298":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0382","http://www.securityfocus.com/bid/22117","http://doc.emergingthreats.net/2005298"],"2005299":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0382","http://www.securityfocus.com/bid/22117","http://doc.emergingthreats.net/2005299"],"2005300":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0382","http://www.securityfocus.com/bid/22117","http://doc.emergingthreats.net/2005300"],"2005301":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0382","http://www.securityfocus.com/bid/22117","http://doc.emergingthreats.net/2005301"],"2005302":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0382","http://www.securityfocus.com/bid/22117","http://doc.emergingthreats.net/2005302"],"2005303":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0382","http://www.securityfocus.com/bid/22117","http://doc.emergingthreats.net/2005303"],"2005304":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005304"],"2005305":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005305"],"2005306":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005306"],"2005307":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005307"],"2005308":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005308"],"2005309":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005309"],"2005310":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175","http://xforce.iss.net/xforce/xfdb/34593","http://doc.emergingthreats.net/2005310"],"2005311":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0554","http://www.milw0rm.com/exploits/3195","http://doc.emergingthreats.net/2005311"],"2005312":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0492","http://www.frsirt.com/english/advisories/2007/0270","http://doc.emergingthreats.net/2005312"],"2005318":["http://doc.emergingthreats.net/2005318"],"2005320":["http://doc.emergingthreats.net/bin/view/Main/2005320"],"2005321":["http://doc.emergingthreats.net/2005321"],"2005324":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3244","http://trac.bbpress.org/ticket/592","http://doc.emergingthreats.net/2005324"],"2005325":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3244","http://trac.bbpress.org/ticket/592","http://doc.emergingthreats.net/2005325"],"2005326":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3244","http://trac.bbpress.org/ticket/592","http://doc.emergingthreats.net/2005326"],"2005327":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3244","http://trac.bbpress.org/ticket/592","http://doc.emergingthreats.net/2005327"],"2005328":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3244","http://trac.bbpress.org/ticket/592","http://doc.emergingthreats.net/2005328"],"2005329":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3244","http://trac.bbpress.org/ticket/592","http://doc.emergingthreats.net/2005329"],"2005330":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3235","http://www.milw0rm.com/exploits/4062","http://doc.emergingthreats.net/2005330"],"2005331":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3235","http://www.milw0rm.com/exploits/4062","http://doc.emergingthreats.net/2005331"],"2005332":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3235","http://www.milw0rm.com/exploits/4062","http://doc.emergingthreats.net/2005332"],"2005333":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3235","http://www.milw0rm.com/exploits/4062","http://doc.emergingthreats.net/2005333"],"2005334":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3235","http://www.milw0rm.com/exploits/4062","http://doc.emergingthreats.net/2005334"],"2005335":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3235","http://www.milw0rm.com/exploits/4062","http://doc.emergingthreats.net/2005335"],"2005336":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3214","http://www.milw0rm.com/exploits/4054","http://doc.emergingthreats.net/2005336"],"2005337":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3214","http://www.milw0rm.com/exploits/4054","http://doc.emergingthreats.net/2005337"],"2005338":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3214","http://www.milw0rm.com/exploits/4054","http://doc.emergingthreats.net/2005338"],"2005339":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3214","http://www.milw0rm.com/exploits/4054","http://doc.emergingthreats.net/2005339"],"2005340":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3214","http://www.milw0rm.com/exploits/4054","http://doc.emergingthreats.net/2005340"],"2005341":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3214","http://www.milw0rm.com/exploits/4054","http://doc.emergingthreats.net/2005341"],"2005342":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3204","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005342"],"2005343":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3204","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005343"],"2005344":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3204","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005344"],"2005345":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3204","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005345"],"2005346":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3204","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005346"],"2005347":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3204","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005347"],"2005348":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3197","http://www.vbulletin.org/forum/showthread.php?t=94023&page=38","http://doc.emergingthreats.net/2005348"],"2005349":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3197","http://www.vbulletin.org/forum/showthread.php?t=94023&page=38","http://doc.emergingthreats.net/2005349"],"2005350":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3197","http://www.vbulletin.org/forum/showthread.php?t=94023&page=38","http://doc.emergingthreats.net/2005350"],"2005351":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3197","http://www.vbulletin.org/forum/showthread.php?t=94023&page=38","http://doc.emergingthreats.net/2005351"],"2005352":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3197","http://www.vbulletin.org/forum/showthread.php?t=94023&page=38","http://doc.emergingthreats.net/2005352"],"2005353":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3197","http://www.vbulletin.org/forum/showthread.php?t=94023&page=38","http://doc.emergingthreats.net/2005353"],"2005354":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3196","http://www.securityfocus.com/bid/24397","http://doc.emergingthreats.net/2005354"],"2005355":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3196","http://www.securityfocus.com/bid/24397","http://doc.emergingthreats.net/2005355"],"2005356":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3196","http://www.securityfocus.com/bid/24397","http://doc.emergingthreats.net/2005356"],"2005357":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3196","http://www.securityfocus.com/bid/24397","http://doc.emergingthreats.net/2005357"],"2005358":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3196","http://www.securityfocus.com/bid/24397","http://doc.emergingthreats.net/2005358"],"2005359":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3196","http://www.securityfocus.com/bid/24397","http://doc.emergingthreats.net/2005359"],"2005360":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3190","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005360"],"2005361":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3190","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005361"],"2005362":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3190","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005362"],"2005363":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3190","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005363"],"2005364":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3190","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005364"],"2005365":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3190","http://www.secunia.com/advisories/25587","http://doc.emergingthreats.net/2005365"],"2005372":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3188","http://www.milw0rm.com/exploits/4057","http://doc.emergingthreats.net/2005372"],"2005373":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3188","http://www.milw0rm.com/exploits/4057","http://doc.emergingthreats.net/2005373"],"2005374":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3188","http://www.milw0rm.com/exploits/4057","http://doc.emergingthreats.net/2005374"],"2005375":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3188","http://www.milw0rm.com/exploits/4057","http://doc.emergingthreats.net/2005375"],"2005376":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3188","http://www.milw0rm.com/exploits/4057","http://doc.emergingthreats.net/2005376"],"2005377":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3188","http://www.milw0rm.com/exploits/4057","http://doc.emergingthreats.net/2005377"],"2005378":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005378"],"2005379":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005379"],"2005380":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005380"],"2005381":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005381"],"2005382":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005382"],"2005383":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005383"],"2005384":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005384"],"2005385":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005385"],"2005386":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005386"],"2005387":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005387"],"2005388":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005388"],"2005389":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0377","http://www.securityfocus.com/bid/22399","http://doc.emergingthreats.net/2005389"],"2005390":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005390"],"2005391":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005391"],"2005392":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005392"],"2005394":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005394"],"2005395":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005395"],"2005396":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005396"],"2005397":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005397"],"2005398":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005398"],"2005399":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005399"],"2005400":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005400"],"2005401":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005401"],"2005402":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005402"],"2005403":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005403"],"2005404":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005404"],"2005405":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005405"],"2005406":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005406"],"2005407":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005407"],"2005408":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005408"],"2005409":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005409"],"2005410":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005410"],"2005411":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005411"],"2005412":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005412"],"2005413":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005413"],"2005414":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005414"],"2005415":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005415"],"2005416":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005416"],"2005417":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005417"],"2005418":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005418"],"2005419":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005419"],"2005420":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005420"],"2005421":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005421"],"2005422":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005422"],"2005423":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005423"],"2005424":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005424"],"2005425":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005425"],"2005426":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005426"],"2005427":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005427"],"2005428":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005428"],"2005429":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005429"],"2005430":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005430"],"2005431":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005431"],"2005432":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005432"],"2005433":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005433"],"2005434":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005434"],"2005435":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005435"],"2005436":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005436"],"2005437":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005437"],"2005438":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005438"],"2005439":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005439"],"2005440":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005440"],"2005441":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005441"],"2005442":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005442"],"2005443":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005443"],"2005444":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005444"],"2005445":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005445"],"2005446":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005446"],"2005447":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005447"],"2005448":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005448"],"2005449":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005449"],"2005450":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005450"],"2005451":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005451"],"2005452":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005452"],"2005453":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005453"],"2005454":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005454"],"2005455":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0373","http://www.securityfocus.com/bid/22122","http://doc.emergingthreats.net/2005455"],"2005456":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005456"],"2005457":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005457"],"2005458":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005458"],"2005459":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005459"],"2005460":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005460"],"2005461":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005461"],"2005462":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005462"],"2005463":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005463"],"2005464":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005464"],"2005465":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005465"],"2005466":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005466"],"2005467":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005467"],"2005468":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005468"],"2005469":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005469"],"2005470":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005470"],"2005471":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005471"],"2005472":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005472"],"2005473":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005473"],"2005474":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005474"],"2005475":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005475"],"2005476":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005476"],"2005477":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005477"],"2005478":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005478"],"2005479":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005479"],"2005480":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005480"],"2005481":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005481"],"2005482":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005482"],"2005483":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005483"],"2005484":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005484"],"2005485":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005485"],"2005486":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005486"],"2005487":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005487"],"2005489":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005489"],"2005490":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005490"],"2005491":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005491"],"2005492":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0372","http://www.securityfocus.com/bid/22116","http://doc.emergingthreats.net/2005492"],"2005493":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005493"],"2005494":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005494"],"2005495":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005495"],"2005496":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005496"],"2005497":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005497"],"2005498":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005498"],"2005499":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005499"],"2005500":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005500"],"2005501":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005501"],"2005502":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005502"],"2005503":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005503"],"2005504":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005504"],"2005505":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005505"],"2005506":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005506"],"2005507":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005507"],"2005508":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005508"],"2005509":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005509"],"2005510":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6945","http://www.securityfocus.com/bid/22123","http://doc.emergingthreats.net/2005510"],"2005511":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0354","http://www.milw0rm.com/exploits/3141","http://doc.emergingthreats.net/2005511"],"2005512":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0354","http://www.milw0rm.com/exploits/3141","http://doc.emergingthreats.net/2005512"],"2005514":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0354","http://www.milw0rm.com/exploits/3141","http://doc.emergingthreats.net/2005514"],"2005515":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0354","http://www.milw0rm.com/exploits/3141","http://doc.emergingthreats.net/2005515"],"2005516":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0354","http://www.milw0rm.com/exploits/3141","http://doc.emergingthreats.net/2005516"],"2005517":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0354","http://www.milw0rm.com/exploits/3141","http://doc.emergingthreats.net/2005517"],"2005542":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005542"],"2005543":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005543"],"2005544":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005544"],"2005545":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005545"],"2005546":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005546"],"2005547":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005547"],"2005548":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005548"],"2005549":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005549"],"2005550":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005550"],"2005551":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005551"],"2005552":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005552"],"2005553":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005553"],"2005554":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005554"],"2005555":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005555"],"2005556":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005556"],"2005557":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005557"],"2005558":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005558"],"2005559":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005559"],"2005560":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005560"],"2005561":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005561"],"2005562":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005562"],"2005563":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005563"],"2005564":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005564"],"2005566":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0350","http://www.frsirt.com/english/advisories/2007/0221","http://doc.emergingthreats.net/2005566"],"2005570":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0340","http://www.milw0rm.com/exploits/3124","http://doc.emergingthreats.net/2005570"],"2005573":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005573"],"2005574":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005574"],"2005575":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005575"],"2005576":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005576"],"2005577":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005577"],"2005578":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005578"],"2005579":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005579"],"2005580":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005580"],"2005581":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005581"],"2005582":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005582"],"2005583":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005583"],"2005584":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0316","http://www.securityfocus.com/bid/22032","http://doc.emergingthreats.net/2005584"],"2005585":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0309","http://www.securityfocus.com/bid/22037","http://doc.emergingthreats.net/2005585"],"2005586":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0309","http://www.securityfocus.com/bid/22037","http://doc.emergingthreats.net/2005586"],"2005587":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0309","http://www.securityfocus.com/bid/22037","http://doc.emergingthreats.net/2005587"],"2005588":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0309","http://www.securityfocus.com/bid/22037","http://doc.emergingthreats.net/2005588"],"2005589":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0309","http://www.securityfocus.com/bid/22037","http://doc.emergingthreats.net/2005589"],"2005590":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0309","http://www.securityfocus.com/bid/22037","http://doc.emergingthreats.net/2005590"],"2005591":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0306","http://www.milw0rm.com/exploits/3122","http://doc.emergingthreats.net/2005591"],"2005592":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0306","http://www.milw0rm.com/exploits/3122","http://doc.emergingthreats.net/2005592"],"2005593":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0306","http://www.milw0rm.com/exploits/3122","http://doc.emergingthreats.net/2005593"],"2005594":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0306","http://www.milw0rm.com/exploits/3122","http://doc.emergingthreats.net/2005594"],"2005595":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0306","http://www.milw0rm.com/exploits/3122","http://doc.emergingthreats.net/2005595"],"2005596":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0306","http://www.milw0rm.com/exploits/3122","http://doc.emergingthreats.net/2005596"],"2005597":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0305","http://www.milw0rm.com/exploits/3135","http://doc.emergingthreats.net/2005597"],"2005598":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0305","http://www.milw0rm.com/exploits/3135","http://doc.emergingthreats.net/2005598"],"2005599":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0305","http://www.milw0rm.com/exploits/3135","http://doc.emergingthreats.net/2005599"],"2005600":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0305","http://www.milw0rm.com/exploits/3135","http://doc.emergingthreats.net/2005600"],"2005601":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0305","http://www.milw0rm.com/exploits/3135","http://doc.emergingthreats.net/2005601"],"2005602":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0305","http://www.milw0rm.com/exploits/3135","http://doc.emergingthreats.net/2005602"],"2005603":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0304","http://www.milw0rm.com/exploits/3120","http://doc.emergingthreats.net/2005603"],"2005604":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0304","http://www.milw0rm.com/exploits/3120","http://doc.emergingthreats.net/2005604"],"2005605":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0304","http://www.milw0rm.com/exploits/3120","http://doc.emergingthreats.net/2005605"],"2005606":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0304","http://www.milw0rm.com/exploits/3120","http://doc.emergingthreats.net/2005606"],"2005607":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0304","http://www.milw0rm.com/exploits/3120","http://doc.emergingthreats.net/2005607"],"2005608":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0304","http://www.milw0rm.com/exploits/3120","http://doc.emergingthreats.net/2005608"],"2005609":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6937","http://www.securityfocus.com/bid/21138","http://doc.emergingthreats.net/2005609"],"2005610":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6937","http://www.securityfocus.com/bid/21138","http://doc.emergingthreats.net/2005610"],"2005611":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6937","http://www.securityfocus.com/bid/21138","http://doc.emergingthreats.net/2005611"],"2005612":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6937","http://www.securityfocus.com/bid/21138","http://doc.emergingthreats.net/2005612"],"2005613":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6937","http://www.securityfocus.com/bid/21138","http://doc.emergingthreats.net/2005613"],"2005614":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6937","http://www.securityfocus.com/bid/21138","http://doc.emergingthreats.net/2005614"],"2005615":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0266","http://www.securityfocus.com/archive/1/archive/1/456699/100/0/threaded","http://doc.emergingthreats.net/2005615"],"2005616":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0266","http://www.securityfocus.com/archive/1/archive/1/456699/100/0/threaded","http://doc.emergingthreats.net/2005616"],"2005617":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0266","http://www.securityfocus.com/archive/1/archive/1/456699/100/0/threaded","http://doc.emergingthreats.net/2005617"],"2005618":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0266","http://www.securityfocus.com/archive/1/archive/1/456699/100/0/threaded","http://doc.emergingthreats.net/2005618"],"2005619":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0266","http://www.securityfocus.com/archive/1/archive/1/456699/100/0/threaded","http://doc.emergingthreats.net/2005619"],"2005620":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0266","http://www.securityfocus.com/archive/1/archive/1/456699/100/0/threaded","http://doc.emergingthreats.net/2005620"],"2005621":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005621"],"2005622":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005622"],"2005623":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005623"],"2005624":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005624"],"2005625":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005625"],"2005626":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005626"],"2005627":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005627"],"2005628":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005628"],"2005629":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005629"],"2005630":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005630"],"2005631":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005631"],"2005632":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005632"],"2005633":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005633"],"2005634":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005634"],"2005635":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005635"],"2005636":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005636"],"2005637":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005637"],"2005638":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6935","http://www.securityfocus.com/bid/20974/exploit","http://doc.emergingthreats.net/2005638"],"2005639":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005639"],"2005640":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005640"],"2005641":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005641"],"2005642":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005642"],"2005643":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005643"],"2005644":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005644"],"2005645":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005645"],"2005646":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005646"],"2005647":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005647"],"2005648":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005648"],"2005649":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005649"],"2005650":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005650"],"2005651":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005651"],"2005652":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005652"],"2005653":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005653"],"2005654":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005654"],"2005655":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005655"],"2005656":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6932","http://www.securityfocus.com/bid/21131","http://doc.emergingthreats.net/2005656"],"2005657":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0233","http://www.milw0rm.com/exploits/3109","http://doc.emergingthreats.net/2005657"],"2005658":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0233","http://www.milw0rm.com/exploits/3109","http://doc.emergingthreats.net/2005658"],"2005659":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0233","http://www.milw0rm.com/exploits/3109","http://doc.emergingthreats.net/2005659"],"2005660":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0233","http://www.milw0rm.com/exploits/3109","http://doc.emergingthreats.net/2005660"],"2005661":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0233","http://www.milw0rm.com/exploits/3109","http://doc.emergingthreats.net/2005661"],"2005662":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0233","http://www.milw0rm.com/exploits/3109","http://doc.emergingthreats.net/2005662"],"2005663":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0226","http://www.milw0rm.com/exploits/3106","http://doc.emergingthreats.net/2005663"],"2005664":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0226","http://www.milw0rm.com/exploits/3106","http://doc.emergingthreats.net/2005664"],"2005665":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0226","http://www.milw0rm.com/exploits/3106","http://doc.emergingthreats.net/2005665"],"2005666":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0226","http://www.milw0rm.com/exploits/3106","http://doc.emergingthreats.net/2005666"],"2005667":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0226","http://www.milw0rm.com/exploits/3106","http://doc.emergingthreats.net/2005667"],"2005668":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0226","http://www.milw0rm.com/exploits/3106","http://doc.emergingthreats.net/2005668"],"2005669":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0224","http://www.milw0rm.com/exploits/3115","http://doc.emergingthreats.net/2005669"],"2005670":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0224","http://www.milw0rm.com/exploits/3115","http://doc.emergingthreats.net/2005670"],"2005671":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0224","http://www.milw0rm.com/exploits/3115","http://doc.emergingthreats.net/2005671"],"2005672":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0224","http://www.milw0rm.com/exploits/3115","http://doc.emergingthreats.net/2005672"],"2005673":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0224","http://www.milw0rm.com/exploits/3115","http://doc.emergingthreats.net/2005673"],"2005674":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0224","http://www.milw0rm.com/exploits/3115","http://doc.emergingthreats.net/2005674"],"2005675":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0223","http://www.secunia.com/advisories/23726","http://doc.emergingthreats.net/2005675"],"2005676":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0223","http://www.secunia.com/advisories/23726","http://doc.emergingthreats.net/2005676"],"2005677":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0223","http://www.secunia.com/advisories/23726","http://doc.emergingthreats.net/2005677"],"2005678":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0223","http://www.secunia.com/advisories/23726","http://doc.emergingthreats.net/2005678"],"2005679":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0223","http://www.secunia.com/advisories/23726","http://doc.emergingthreats.net/2005679"],"2005680":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0223","http://www.secunia.com/advisories/23726","http://doc.emergingthreats.net/2005680"],"2005681":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6930","http://www.securityfocus.com/bid/21197","http://doc.emergingthreats.net/2005681"],"2005682":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6930","http://www.securityfocus.com/bid/21197","http://doc.emergingthreats.net/2005682"],"2005683":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6930","http://www.securityfocus.com/bid/21197","http://doc.emergingthreats.net/2005683"],"2005684":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6930","http://www.securityfocus.com/bid/21197","http://doc.emergingthreats.net/2005684"],"2005685":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6930","http://www.securityfocus.com/bid/21197","http://doc.emergingthreats.net/2005685"],"2005686":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6930","http://www.securityfocus.com/bid/21197","http://doc.emergingthreats.net/2005686"],"2005687":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005687"],"2005688":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005688"],"2005689":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005689"],"2005690":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005690"],"2005691":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005691"],"2005692":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005692"],"2005693":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005693"],"2005694":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005694"],"2005695":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005695"],"2005696":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005696"],"2005697":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005697"],"2005698":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005698"],"2005699":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005699"],"2005700":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005700"],"2005701":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005701"],"2005702":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005702"],"2005703":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005703"],"2005704":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005704"],"2005705":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005705"],"2005706":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005706"],"2005707":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005707"],"2005708":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005708"],"2005709":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005709"],"2005710":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005710"],"2005711":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005711"],"2005712":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005712"],"2005713":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005713"],"2005714":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005714"],"2005715":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005715"],"2005716":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005716"],"2005717":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005717"],"2005718":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005718"],"2005719":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005719"],"2005720":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005720"],"2005721":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005721"],"2005722":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005722"],"2005723":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005723"],"2005724":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005724"],"2005725":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005725"],"2005726":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005726"],"2005727":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005727"],"2005728":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005728"],"2005729":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005729"],"2005730":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005730"],"2005731":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005731"],"2005732":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005732"],"2005733":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005733"],"2005734":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005734"],"2005735":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005735"],"2005736":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005736"],"2005738":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005738"],"2005739":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005739"],"2005740":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005740"],"2005741":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005741"],"2005742":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005742"],"2005743":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005743"],"2005744":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005744"],"2005745":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005745"],"2005746":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005746"],"2005747":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005747"],"2005748":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005748"],"2005749":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005749"],"2005750":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005750"],"2005751":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005751"],"2005752":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005752"],"2005753":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005753"],"2005754":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005754"],"2005755":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005755"],"2005756":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005756"],"2005757":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005757"],"2005758":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005758"],"2005759":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005759"],"2005760":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005760"],"2005761":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005761"],"2005762":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005762"],"2005763":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005763"],"2005764":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005764"],"2005765":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6927","http://www.securityfocus.com/bid/21191","http://doc.emergingthreats.net/2005765"],"2005766":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6923","http://www.securityfocus.com/bid/20996","http://doc.emergingthreats.net/2005766"],"2005767":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6923","http://www.securityfocus.com/bid/20996","http://doc.emergingthreats.net/2005767"],"2005768":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6923","http://www.securityfocus.com/bid/20996","http://doc.emergingthreats.net/2005768"],"2005769":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6923","http://www.securityfocus.com/bid/20996","http://doc.emergingthreats.net/2005769"],"2005770":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6923","http://www.securityfocus.com/bid/20996","http://doc.emergingthreats.net/2005770"],"2005771":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6923","http://www.securityfocus.com/bid/20996","http://doc.emergingthreats.net/2005771"],"2005778":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0196","http://www.milw0rm.com/exploits/3105","http://doc.emergingthreats.net/2005778"],"2005779":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0196","http://www.milw0rm.com/exploits/3105","http://doc.emergingthreats.net/2005779"],"2005780":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0196","http://www.milw0rm.com/exploits/3105","http://doc.emergingthreats.net/2005780"],"2005781":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0196","http://www.milw0rm.com/exploits/3105","http://doc.emergingthreats.net/2005781"],"2005782":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0196","http://www.milw0rm.com/exploits/3105","http://doc.emergingthreats.net/2005782"],"2005783":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0196","http://www.milw0rm.com/exploits/3105","http://doc.emergingthreats.net/2005783"],"2005784":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0179","http://www.securityfocus.com/bid/21962","http://doc.emergingthreats.net/2005784"],"2005785":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0179","http://www.securityfocus.com/bid/21962","http://doc.emergingthreats.net/2005785"],"2005786":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0179","http://www.securityfocus.com/bid/21962","http://doc.emergingthreats.net/2005786"],"2005787":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0179","http://www.securityfocus.com/bid/21962","http://doc.emergingthreats.net/2005787"],"2005788":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0179","http://www.securityfocus.com/bid/21962","http://doc.emergingthreats.net/2005788"],"2005789":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0179","http://www.securityfocus.com/bid/21962","http://doc.emergingthreats.net/2005789"],"2005790":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0142","http://www.securityfocus.com/bid/21905","http://doc.emergingthreats.net/2005790"],"2005791":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0142","http://www.securityfocus.com/bid/21905","http://doc.emergingthreats.net/2005791"],"2005792":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0142","http://www.securityfocus.com/bid/21905","http://doc.emergingthreats.net/2005792"],"2005793":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0142","http://www.securityfocus.com/bid/21905","http://doc.emergingthreats.net/2005793"],"2005794":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0142","http://www.securityfocus.com/bid/21905","http://doc.emergingthreats.net/2005794"],"2005795":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0142","http://www.securityfocus.com/bid/21905","http://doc.emergingthreats.net/2005795"],"2005796":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0140","http://www.securityfocus.com/bid/21889","http://doc.emergingthreats.net/2005796"],"2005797":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0140","http://www.securityfocus.com/bid/21889","http://doc.emergingthreats.net/2005797"],"2005798":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0140","http://www.securityfocus.com/bid/21889","http://doc.emergingthreats.net/2005798"],"2005799":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0140","http://www.securityfocus.com/bid/21889","http://doc.emergingthreats.net/2005799"],"2005800":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0140","http://www.securityfocus.com/bid/21889","http://doc.emergingthreats.net/2005800"],"2005801":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0140","http://www.securityfocus.com/bid/21889","http://doc.emergingthreats.net/2005801"],"2005802":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0375","http://www.securityfocus.com/archive/1/archive/1/459203/100/0/threaded","http://doc.emergingthreats.net/2005802"],"2005804":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005804"],"2005806":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005806"],"2005807":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005807"],"2005808":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005808"],"2005809":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005809"],"2005810":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005810"],"2005811":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005811"],"2005812":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005812"],"2005813":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005813"],"2005814":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005814"],"2005815":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005815"],"2005816":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0133","http://www.frsirt.com/english/advisories/2007/0056","http://doc.emergingthreats.net/2005816"],"2005817":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0132","http://www.milw0rm.com/exploits/3083","http://doc.emergingthreats.net/2005817"],"2005818":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0132","http://www.milw0rm.com/exploits/3083","http://doc.emergingthreats.net/2005818"],"2005819":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0132","http://www.milw0rm.com/exploits/3083","http://doc.emergingthreats.net/2005819"],"2005820":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0132","http://www.milw0rm.com/exploits/3083","http://doc.emergingthreats.net/2005820"],"2005821":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0132","http://www.milw0rm.com/exploits/3083","http://doc.emergingthreats.net/2005821"],"2005822":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0132","http://www.milw0rm.com/exploits/3083","http://doc.emergingthreats.net/2005822"],"2005823":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0130","http://www.milw0rm.com/exploits/3082","http://doc.emergingthreats.net/2005823"],"2005824":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0130","http://www.milw0rm.com/exploits/3082","http://doc.emergingthreats.net/2005824"],"2005825":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0130","http://www.milw0rm.com/exploits/3082","http://doc.emergingthreats.net/2005825"],"2005826":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0130","http://www.milw0rm.com/exploits/3082","http://doc.emergingthreats.net/2005826"],"2005827":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0130","http://www.milw0rm.com/exploits/3082","http://doc.emergingthreats.net/2005827"],"2005828":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0130","http://www.milw0rm.com/exploits/3082","http://doc.emergingthreats.net/2005828"],"2005829":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0129","http://www.exploit-db.com/exploits/3073/","http://doc.emergingthreats.net/2005829"],"2005830":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0129","http://www.exploit-db.com/exploits/3073/","http://doc.emergingthreats.net/2005830"],"2005831":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0129","http://www.exploit-db.com/exploits/3073/","http://doc.emergingthreats.net/2005831"],"2005832":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0129","http://www.exploit-db.com/exploits/3073/","http://doc.emergingthreats.net/2005832"],"2005833":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0129","http://www.exploit-db.com/exploits/3073/","http://doc.emergingthreats.net/2005833"],"2005834":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0129","http://www.exploit-db.com/exploits/3073/","http://doc.emergingthreats.net/2005834"],"2005835":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0128","http://www.milw0rm.com/exploits/3081","http://doc.emergingthreats.net/2005835"],"2005836":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0128","http://www.milw0rm.com/exploits/3081","http://doc.emergingthreats.net/2005836"],"2005837":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0128","http://www.milw0rm.com/exploits/3081","http://doc.emergingthreats.net/2005837"],"2005838":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0128","http://www.milw0rm.com/exploits/3081","http://doc.emergingthreats.net/2005838"],"2005839":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0128","http://www.milw0rm.com/exploits/3081","http://doc.emergingthreats.net/2005839"],"2005840":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0128","http://www.milw0rm.com/exploits/3081","http://doc.emergingthreats.net/2005840"],"2005841":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005841"],"2005842":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005842"],"2005843":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005843"],"2005844":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005844"],"2005845":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005845"],"2005846":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005846"],"2005847":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005847"],"2005848":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005848"],"2005849":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005849"],"2005850":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005850"],"2005851":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005851"],"2005852":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005852"],"2005853":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005853"],"2005854":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005854"],"2005855":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005855"],"2005856":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005856"],"2005857":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005857"],"2005858":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0122","http://www.securityfocus.com/bid/21894","http://doc.emergingthreats.net/2005858"],"2005859":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0112","http://www.securityfocus.com/bid/21929","http://doc.emergingthreats.net/2005859"],"2005860":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0112","http://www.securityfocus.com/bid/21929","http://doc.emergingthreats.net/2005860"],"2005861":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0112","http://www.securityfocus.com/bid/21929","http://doc.emergingthreats.net/2005861"],"2005862":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0112","http://www.securityfocus.com/bid/21929","http://doc.emergingthreats.net/2005862"],"2005863":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0112","http://www.securityfocus.com/bid/21929","http://doc.emergingthreats.net/2005863"],"2005864":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0112","http://www.securityfocus.com/bid/21929","http://doc.emergingthreats.net/2005864"],"2005871":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0093","http://www.milw0rm.com/exploits/3076","http://doc.emergingthreats.net/2005871"],"2005872":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0093","http://www.milw0rm.com/exploits/3076","http://doc.emergingthreats.net/2005872"],"2005873":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0093","http://www.milw0rm.com/exploits/3076","http://doc.emergingthreats.net/2005873"],"2005874":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0093","http://www.milw0rm.com/exploits/3076","http://doc.emergingthreats.net/2005874"],"2005875":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0093","http://www.milw0rm.com/exploits/3076","http://doc.emergingthreats.net/2005875"],"2005876":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0093","http://www.milw0rm.com/exploits/3076","http://doc.emergingthreats.net/2005876"],"2005877":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0092","http://www.milw0rm.com/exploits/3074","http://doc.emergingthreats.net/2005877"],"2005878":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0092","http://www.milw0rm.com/exploits/3074","http://doc.emergingthreats.net/2005878"],"2005879":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0092","http://www.milw0rm.com/exploits/3074","http://doc.emergingthreats.net/2005879"],"2005880":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0092","http://www.milw0rm.com/exploits/3074","http://doc.emergingthreats.net/2005880"],"2005881":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0092","http://www.milw0rm.com/exploits/3074","http://doc.emergingthreats.net/2005881"],"2005882":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0092","http://www.milw0rm.com/exploits/3074","http://doc.emergingthreats.net/2005882"],"2005883":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0053","http://www.milw0rm.com/exploits/3062","http://doc.emergingthreats.net/2005883"],"2005884":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0053","http://www.milw0rm.com/exploits/3062","http://doc.emergingthreats.net/2005884"],"2005885":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0053","http://www.milw0rm.com/exploits/3062","http://doc.emergingthreats.net/2005885"],"2005886":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0053","http://www.milw0rm.com/exploits/3062","http://doc.emergingthreats.net/2005886"],"2005887":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0053","http://www.milw0rm.com/exploits/3062","http://doc.emergingthreats.net/2005887"],"2005888":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0053","http://www.milw0rm.com/exploits/3062","http://doc.emergingthreats.net/2005888"],"2005889":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0052","http://www.milw0rm.com/exploits/3061","http://doc.emergingthreats.net/2005889"],"2005890":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0052","http://www.milw0rm.com/exploits/3061","http://doc.emergingthreats.net/2005890"],"2005891":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0052","http://www.milw0rm.com/exploits/3061","http://doc.emergingthreats.net/2005891"],"2005892":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0052","http://www.milw0rm.com/exploits/3061","http://doc.emergingthreats.net/2005892"],"2005893":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0052","http://www.milw0rm.com/exploits/3061","http://doc.emergingthreats.net/2005893"],"2005894":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0052","http://www.milw0rm.com/exploits/3061","http://doc.emergingthreats.net/2005894"],"2005895":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6911","http://www.milw0rm.com/exploits/3089","http://doc.emergingthreats.net/2005895"],"2005896":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6911","http://www.milw0rm.com/exploits/3089","http://doc.emergingthreats.net/2005896"],"2005897":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6911","http://www.milw0rm.com/exploits/3089","http://doc.emergingthreats.net/2005897"],"2005898":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6911","http://www.milw0rm.com/exploits/3089","http://doc.emergingthreats.net/2005898"],"2005899":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6911","http://www.milw0rm.com/exploits/3089","http://doc.emergingthreats.net/2005899"],"2005900":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6911","http://www.milw0rm.com/exploits/3089","http://doc.emergingthreats.net/2005900"],"2005901":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005901"],"2005902":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005902"],"2005903":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005903"],"2005904":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005904"],"2005905":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005905"],"2005906":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005906"],"2005907":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005907"],"2005908":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005908"],"2005909":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005909"],"2005910":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005910"],"2005911":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005911"],"2005912":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005912"],"2005913":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005913"],"2005914":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005914"],"2005915":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005915"],"2005916":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005916"],"2005917":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005917"],"2005918":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005918"],"2005919":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005919"],"2005920":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005920"],"2005921":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005921"],"2005922":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005922"],"2005923":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005923"],"2005924":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6880","http://www.milw0rm.com/exploits/3017","http://doc.emergingthreats.net/2005924"],"2005925":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005925"],"2005926":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005926"],"2005927":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005927"],"2005928":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005928"],"2005929":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005929"],"2005930":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005930"],"2005931":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005931"],"2005932":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005932"],"2005933":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005933"],"2005934":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005934"],"2005935":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005935"],"2005936":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6873","http://www.milw0rm.com/exploits/3004","http://doc.emergingthreats.net/2005936"],"2005937":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005937"],"2005938":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005938"],"2005939":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005939"],"2005940":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005940"],"2005941":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005941"],"2005942":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005942"],"2005943":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005943"],"2005944":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005944"],"2005945":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005945"],"2005946":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005946"],"2005947":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005947"],"2005948":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6861","http://www.securityfocus.com/bid/21822","http://doc.emergingthreats.net/2005948"],"2005949":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6859","http://www.securityfocus.com/bid/21824","http://doc.emergingthreats.net/2005949"],"2005950":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6859","http://www.securityfocus.com/bid/21824","http://doc.emergingthreats.net/2005950"],"2005951":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6859","http://www.securityfocus.com/bid/21824","http://doc.emergingthreats.net/2005951"],"2005952":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6859","http://www.securityfocus.com/bid/21824","http://doc.emergingthreats.net/2005952"],"2005953":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6859","http://www.securityfocus.com/bid/21824","http://doc.emergingthreats.net/2005953"],"2005954":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6859","http://www.securityfocus.com/bid/21824","http://doc.emergingthreats.net/2005954"],"2005955":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005955"],"2005956":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005956"],"2005957":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005957"],"2005958":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005958"],"2005959":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005959"],"2005960":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005960"],"2005961":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005961"],"2005962":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005962"],"2005963":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005963"],"2005964":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005964"],"2005965":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005965"],"2005966":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6846","http://www.milw0rm.com/exploits/3032","http://doc.emergingthreats.net/2005966"],"2005967":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6842","http://www.milw0rm.com/exploits/3033","http://doc.emergingthreats.net/2005967"],"2005968":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6842","http://www.milw0rm.com/exploits/3033","http://doc.emergingthreats.net/2005968"],"2005969":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6842","http://www.milw0rm.com/exploits/3033","http://doc.emergingthreats.net/2005969"],"2005970":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6842","http://www.milw0rm.com/exploits/3033","http://doc.emergingthreats.net/2005970"],"2005971":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6842","http://www.milw0rm.com/exploits/3033","http://doc.emergingthreats.net/2005971"],"2005972":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6842","http://www.milw0rm.com/exploits/3033","http://doc.emergingthreats.net/2005972"],"2005973":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6835","http://www.securityfocus.com/archive/1/archive/1/455495/100/0/threaded","http://doc.emergingthreats.net/2005973"],"2005974":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6835","http://www.securityfocus.com/archive/1/archive/1/455495/100/0/threaded","http://doc.emergingthreats.net/2005974"],"2005975":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6835","http://www.securityfocus.com/archive/1/archive/1/455495/100/0/threaded","http://doc.emergingthreats.net/2005975"],"2005976":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6835","http://www.securityfocus.com/archive/1/archive/1/455495/100/0/threaded","http://doc.emergingthreats.net/2005976"],"2005977":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6835","http://www.securityfocus.com/archive/1/archive/1/455495/100/0/threaded","http://doc.emergingthreats.net/2005977"],"2005978":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6835","http://www.securityfocus.com/archive/1/archive/1/455495/100/0/threaded","http://doc.emergingthreats.net/2005978"],"2005979":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6831","http://www.milw0rm.com/exploits/3031","http://doc.emergingthreats.net/2005979"],"2005980":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6831","http://www.milw0rm.com/exploits/3031","http://doc.emergingthreats.net/2005980"],"2005981":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6831","http://www.milw0rm.com/exploits/3031","http://doc.emergingthreats.net/2005981"],"2005982":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6831","http://www.milw0rm.com/exploits/3031","http://doc.emergingthreats.net/2005982"],"2005983":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6831","http://www.milw0rm.com/exploits/3031","http://doc.emergingthreats.net/2005983"],"2005984":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6831","http://www.milw0rm.com/exploits/3031","http://doc.emergingthreats.net/2005984"],"2005985":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005985"],"2005986":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005986"],"2005987":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005987"],"2005988":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005988"],"2005989":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005989"],"2005990":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005990"],"2005991":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005991"],"2005992":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005992"],"2005993":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005993"],"2005994":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005994"],"2005995":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005995"],"2005996":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005996"],"2005997":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005997"],"2005998":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005998"],"2005999":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2005999"],"2006000":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2006000"],"2006001":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2006001"],"2006002":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6828","http://www.frsirt.com/english/advisories/2006/5150","http://doc.emergingthreats.net/2006002"],"2006003":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006003"],"2006004":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006004"],"2006005":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006005"],"2006006":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006006"],"2006007":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006007"],"2006008":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006008"],"2006009":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006009"],"2006010":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006010"],"2006011":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006011"],"2006012":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006012"],"2006013":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006013"],"2006014":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006014"],"2006015":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006015"],"2006016":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006016"],"2006017":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006017"],"2006018":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006018"],"2006019":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006019"],"2006020":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006020"],"2006021":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006021"],"2006022":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006022"],"2006023":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006023"],"2006024":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006024"],"2006025":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006025"],"2006026":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006026"],"2006027":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006027"],"2006028":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006028"],"2006029":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006029"],"2006030":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006030"],"2006031":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006031"],"2006032":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006032"],"2006033":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006033"],"2006034":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006034"],"2006035":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006035"],"2006036":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006036"],"2006037":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006037"],"2006038":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006038"],"2006039":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006039"],"2006040":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006040"],"2006041":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006041"],"2006042":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006042"],"2006043":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006043"],"2006044":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006044"],"2006045":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006045"],"2006046":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006046"],"2006047":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006047"],"2006048":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006048"],"2006049":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006049"],"2006050":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006050"],"2006051":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006051"],"2006052":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006052"],"2006053":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006053"],"2006054":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006054"],"2006055":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006055"],"2006056":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006056"],"2006057":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006057"],"2006058":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006058"],"2006059":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006059"],"2006060":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006060"],"2006061":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006061"],"2006062":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006062"],"2006063":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006063"],"2006064":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006064"],"2006065":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006065"],"2006066":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006066"],"2006067":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006067"],"2006068":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006068"],"2006069":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006069"],"2006070":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006070"],"2006071":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006071"],"2006072":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006072"],"2006073":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006073"],"2006074":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006074"],"2006075":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006075"],"2006076":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006076"],"2006077":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006077"],"2006078":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006078"],"2006079":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006079"],"2006080":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4575","http://www.securityfocus.com/bid/21870","http://doc.emergingthreats.net/2006080"],"2006081":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006081"],"2006082":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006082"],"2006083":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006083"],"2006084":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006084"],"2006085":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006085"],"2006086":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006086"],"2006087":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006087"],"2006088":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006088"],"2006089":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006089"],"2006090":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006090"],"2006091":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006091"],"2006092":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006092"],"2006093":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006093"],"2006094":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006094"],"2006095":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006095"],"2006096":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006096"],"2006097":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006097"],"2006098":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006098"],"2006099":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006099"],"2006100":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006100"],"2006101":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006101"],"2006102":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006102"],"2006103":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006103"],"2006104":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006104"],"2006105":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006105"],"2006106":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006106"],"2006107":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006107"],"2006108":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006108"],"2006109":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006109"],"2006110":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006110"],"2006111":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006111"],"2006112":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006112"],"2006113":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006113"],"2006114":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006114"],"2006115":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006115"],"2006116":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006116"],"2006117":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006117"],"2006118":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006118"],"2006119":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006119"],"2006120":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006120"],"2006121":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006121"],"2006122":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6816","http://www.securityfocus.com/bid/21788","http://doc.emergingthreats.net/2006122"],"2006123":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6813","http://www.milw0rm.com/exploits/2997","http://doc.emergingthreats.net/2006123"],"2006124":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6813","http://www.milw0rm.com/exploits/2997","http://doc.emergingthreats.net/2006124"],"2006125":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6813","http://www.milw0rm.com/exploits/2997","http://doc.emergingthreats.net/2006125"],"2006126":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6813","http://www.milw0rm.com/exploits/2997","http://doc.emergingthreats.net/2006126"],"2006127":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6813","http://www.milw0rm.com/exploits/2997","http://doc.emergingthreats.net/2006127"],"2006128":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6813","http://www.milw0rm.com/exploits/2997","http://doc.emergingthreats.net/2006128"],"2006129":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6807","http://www.milw0rm.com/exploits/3001","http://doc.emergingthreats.net/2006129"],"2006130":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6807","http://www.milw0rm.com/exploits/3001","http://doc.emergingthreats.net/2006130"],"2006131":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6807","http://www.milw0rm.com/exploits/3001","http://doc.emergingthreats.net/2006131"],"2006132":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6807","http://www.milw0rm.com/exploits/3001","http://doc.emergingthreats.net/2006132"],"2006133":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6807","http://www.milw0rm.com/exploits/3001","http://doc.emergingthreats.net/2006133"],"2006134":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6807","http://www.milw0rm.com/exploits/3001","http://doc.emergingthreats.net/2006134"],"2006135":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6806","http://www.milw0rm.com/exploits/2990","http://doc.emergingthreats.net/2006135"],"2006136":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6806","http://www.milw0rm.com/exploits/2990","http://doc.emergingthreats.net/2006136"],"2006137":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6806","http://www.milw0rm.com/exploits/2990","http://doc.emergingthreats.net/2006137"],"2006138":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6806","http://www.milw0rm.com/exploits/2990","http://doc.emergingthreats.net/2006138"],"2006139":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6806","http://www.milw0rm.com/exploits/2990","http://doc.emergingthreats.net/2006139"],"2006140":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6806","http://www.milw0rm.com/exploits/2990","http://doc.emergingthreats.net/2006140"],"2006141":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6804","http://www.milw0rm.com/exploits/2992","http://doc.emergingthreats.net/2006141"],"2006142":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6804","http://www.milw0rm.com/exploits/2992","http://doc.emergingthreats.net/2006142"],"2006143":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6804","http://www.milw0rm.com/exploits/2992","http://doc.emergingthreats.net/2006143"],"2006144":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6804","http://www.milw0rm.com/exploits/2992","http://doc.emergingthreats.net/2006144"],"2006145":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6804","http://www.milw0rm.com/exploits/2992","http://doc.emergingthreats.net/2006145"],"2006146":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6804","http://www.milw0rm.com/exploits/2992","http://doc.emergingthreats.net/2006146"],"2006147":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6803","http://www.milw0rm.com/exploits/2989","http://doc.emergingthreats.net/2006147"],"2006148":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6803","http://www.milw0rm.com/exploits/2989","http://doc.emergingthreats.net/2006148"],"2006149":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6803","http://www.milw0rm.com/exploits/2989","http://doc.emergingthreats.net/2006149"],"2006150":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6803","http://www.milw0rm.com/exploits/2989","http://doc.emergingthreats.net/2006150"],"2006151":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6803","http://www.milw0rm.com/exploits/2989","http://doc.emergingthreats.net/2006151"],"2006152":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6803","http://www.milw0rm.com/exploits/2989","http://doc.emergingthreats.net/2006152"],"2006153":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6802","http://www.milw0rm.com/exploits/2991","http://doc.emergingthreats.net/2006153"],"2006154":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6802","http://www.milw0rm.com/exploits/2991","http://doc.emergingthreats.net/2006154"],"2006155":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6802","http://www.milw0rm.com/exploits/2991","http://doc.emergingthreats.net/2006155"],"2006156":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6802","http://www.milw0rm.com/exploits/2991","http://doc.emergingthreats.net/2006156"],"2006157":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6802","http://www.milw0rm.com/exploits/2991","http://doc.emergingthreats.net/2006157"],"2006158":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6802","http://www.milw0rm.com/exploits/2991","http://doc.emergingthreats.net/2006158"],"2006159":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6794","http://www.securityfocus.com/bid/21726","http://doc.emergingthreats.net/2006159"],"2006160":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6794","http://www.securityfocus.com/bid/21726","http://doc.emergingthreats.net/2006160"],"2006161":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6794","http://www.securityfocus.com/bid/21726","http://doc.emergingthreats.net/2006161"],"2006162":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6794","http://www.securityfocus.com/bid/21726","http://doc.emergingthreats.net/2006162"],"2006163":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6794","http://www.securityfocus.com/bid/21726","http://doc.emergingthreats.net/2006163"],"2006164":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6794","http://www.securityfocus.com/bid/21726","http://doc.emergingthreats.net/2006164"],"2006165":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6792","http://www.milw0rm.com/exploits/2993","http://doc.emergingthreats.net/2006165"],"2006166":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6792","http://www.milw0rm.com/exploits/2993","http://doc.emergingthreats.net/2006166"],"2006167":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6792","http://www.milw0rm.com/exploits/2993","http://doc.emergingthreats.net/2006167"],"2006168":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6792","http://www.milw0rm.com/exploits/2993","http://doc.emergingthreats.net/2006168"],"2006169":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6792","http://www.milw0rm.com/exploits/2993","http://doc.emergingthreats.net/2006169"],"2006170":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6792","http://www.milw0rm.com/exploits/2993","http://doc.emergingthreats.net/2006170"],"2006171":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006171"],"2006172":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006172"],"2006173":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006173"],"2006174":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006174"],"2006175":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006175"],"2006176":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006176"],"2006177":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006177"],"2006178":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006178"],"2006179":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006179"],"2006180":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006180"],"2006181":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006181"],"2006182":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6791","http://www.securityfocus.com/bid/21732","http://doc.emergingthreats.net/2006182"],"2006183":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6787","http://www.milw0rm.com/exploits/2998","http://doc.emergingthreats.net/2006183"],"2006184":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6787","http://www.milw0rm.com/exploits/2998","http://doc.emergingthreats.net/2006184"],"2006185":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6787","http://www.milw0rm.com/exploits/2998","http://doc.emergingthreats.net/2006185"],"2006186":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6787","http://www.milw0rm.com/exploits/2998","http://doc.emergingthreats.net/2006186"],"2006187":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6787","http://www.milw0rm.com/exploits/2998","http://doc.emergingthreats.net/2006187"],"2006188":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6787","http://www.milw0rm.com/exploits/2998","http://doc.emergingthreats.net/2006188"],"2006189":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006189"],"2006190":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006190"],"2006191":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006191"],"2006192":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006192"],"2006193":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006193"],"2006194":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006194"],"2006195":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006195"],"2006196":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006196"],"2006197":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006197"],"2006198":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006198"],"2006199":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006199"],"2006200":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006200"],"2006201":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006201"],"2006202":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006202"],"2006203":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006203"],"2006204":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006204"],"2006205":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006205"],"2006206":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6776","http://www.securityfocus.com/bid/21727","http://doc.emergingthreats.net/2006206"],"2006207":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6754","http://www.securityfocus.com/bid/21710","http://doc.emergingthreats.net/2006207"],"2006208":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6754","http://www.securityfocus.com/bid/21710","http://doc.emergingthreats.net/2006208"],"2006209":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6754","http://www.securityfocus.com/bid/21710","http://doc.emergingthreats.net/2006209"],"2006210":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6754","http://www.securityfocus.com/bid/21710","http://doc.emergingthreats.net/2006210"],"2006211":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6754","http://www.securityfocus.com/bid/21710","http://doc.emergingthreats.net/2006211"],"2006212":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6754","http://www.securityfocus.com/bid/21710","http://doc.emergingthreats.net/2006212"],"2006213":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6747","http://www.securityfocus.com/bid/21719","http://doc.emergingthreats.net/2006213"],"2006214":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6747","http://www.securityfocus.com/bid/21719","http://doc.emergingthreats.net/2006214"],"2006215":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6747","http://www.securityfocus.com/bid/21719","http://doc.emergingthreats.net/2006215"],"2006216":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6747","http://www.securityfocus.com/bid/21719","http://doc.emergingthreats.net/2006216"],"2006217":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6747","http://www.securityfocus.com/bid/21719","http://doc.emergingthreats.net/2006217"],"2006218":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6747","http://www.securityfocus.com/bid/21719","http://doc.emergingthreats.net/2006218"],"2006219":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6716","http://www.milw0rm.com/exploits/2945","http://doc.emergingthreats.net/2006219"],"2006220":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6716","http://www.milw0rm.com/exploits/2945","http://doc.emergingthreats.net/2006220"],"2006221":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6716","http://www.milw0rm.com/exploits/2945","http://doc.emergingthreats.net/2006221"],"2006222":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6716","http://www.milw0rm.com/exploits/2945","http://doc.emergingthreats.net/2006222"],"2006223":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6716","http://www.milw0rm.com/exploits/2945","http://doc.emergingthreats.net/2006223"],"2006224":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6716","http://www.milw0rm.com/exploits/2945","http://doc.emergingthreats.net/2006224"],"2006225":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006225"],"2006226":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006226"],"2006227":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006227"],"2006228":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006228"],"2006229":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006229"],"2006230":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006230"],"2006231":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006231"],"2006232":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006232"],"2006233":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006233"],"2006234":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006234"],"2006235":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006235"],"2006236":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006236"],"2006237":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006237"],"2006238":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006238"],"2006239":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006239"],"2006240":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006240"],"2006241":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006241"],"2006242":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006242"],"2006243":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006243"],"2006244":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006244"],"2006245":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006245"],"2006246":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006246"],"2006247":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006247"],"2006248":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6709","http://www.securityfocus.com/bid/21073","http://doc.emergingthreats.net/2006248"],"2006249":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006249"],"2006250":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006250"],"2006251":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006251"],"2006252":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006252"],"2006253":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006253"],"2006254":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006254"],"2006255":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006255"],"2006256":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006256"],"2006257":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006257"],"2006258":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006258"],"2006259":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006259"],"2006260":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006260"],"2006261":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006261"],"2006262":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006262"],"2006263":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006263"],"2006264":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006264"],"2006265":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006265"],"2006266":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006266"],"2006267":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006267"],"2006268":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006268"],"2006269":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006269"],"2006270":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006270"],"2006271":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006271"],"2006272":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6672","http://www.frsirt.com/english/advisories/2006/5085","http://doc.emergingthreats.net/2006272"],"2006273":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6671","http://www.securityfocus.com/bid/21676","http://doc.emergingthreats.net/2006273"],"2006274":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6671","http://www.securityfocus.com/bid/21676","http://doc.emergingthreats.net/2006274"],"2006275":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6671","http://www.securityfocus.com/bid/21676","http://doc.emergingthreats.net/2006275"],"2006276":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6671","http://www.securityfocus.com/bid/21676","http://doc.emergingthreats.net/2006276"],"2006277":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6671","http://www.securityfocus.com/bid/21676","http://doc.emergingthreats.net/2006277"],"2006278":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6671","http://www.securityfocus.com/bid/21676","http://doc.emergingthreats.net/2006278"],"2006279":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006279"],"2006280":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006280"],"2006281":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006281"],"2006282":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006282"],"2006283":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006283"],"2006284":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006284"],"2006285":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006285"],"2006286":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006286"],"2006287":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006287"],"2006288":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006288"],"2006289":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006289"],"2006290":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006290"],"2006291":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006291"],"2006292":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006292"],"2006293":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006293"],"2006294":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006294"],"2006295":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006295"],"2006296":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006296"],"2006297":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006297"],"2006298":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006298"],"2006299":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006299"],"2006300":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006300"],"2006301":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006301"],"2006302":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6667","http://www.frsirt.com/english/advisories/2006/5059","http://doc.emergingthreats.net/2006302"],"2006303":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6642","http://www.securityfocus.com/bid/21626","http://doc.emergingthreats.net/2006303"],"2006304":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6642","http://www.securityfocus.com/bid/21626","http://doc.emergingthreats.net/2006304"],"2006305":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6642","http://www.securityfocus.com/bid/21626","http://doc.emergingthreats.net/2006305"],"2006306":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6642","http://www.securityfocus.com/bid/21626","http://doc.emergingthreats.net/2006306"],"2006307":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6642","http://www.securityfocus.com/bid/21626","http://doc.emergingthreats.net/2006307"],"2006308":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6642","http://www.securityfocus.com/bid/21626","http://doc.emergingthreats.net/2006308"],"2006309":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6594","http://www.secunia.com/advisories/23372","http://doc.emergingthreats.net/2006309"],"2006310":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6594","http://www.secunia.com/advisories/23372","http://doc.emergingthreats.net/2006310"],"2006311":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6594","http://www.secunia.com/advisories/23372","http://doc.emergingthreats.net/2006311"],"2006312":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6594","http://www.secunia.com/advisories/23372","http://doc.emergingthreats.net/2006312"],"2006313":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6594","http://www.secunia.com/advisories/23372","http://doc.emergingthreats.net/2006313"],"2006314":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6594","http://www.secunia.com/advisories/23372","http://doc.emergingthreats.net/2006314"],"2006315":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6577","http://www.securityfocus.com/bid/21366","http://doc.emergingthreats.net/2006315"],"2006316":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6577","http://www.securityfocus.com/bid/21366","http://doc.emergingthreats.net/2006316"],"2006317":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6577","http://www.securityfocus.com/bid/21366","http://doc.emergingthreats.net/2006317"],"2006318":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6577","http://www.securityfocus.com/bid/21366","http://doc.emergingthreats.net/2006318"],"2006319":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6577","http://www.securityfocus.com/bid/21366","http://doc.emergingthreats.net/2006319"],"2006320":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6577","http://www.securityfocus.com/bid/21366","http://doc.emergingthreats.net/2006320"],"2006321":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6559","http://www.exploit-db.com/exploits/2908/","http://doc.emergingthreats.net/2006321"],"2006322":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6559","http://www.exploit-db.com/exploits/2908/","http://doc.emergingthreats.net/2006322"],"2006323":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6559","http://www.exploit-db.com/exploits/2908/","http://doc.emergingthreats.net/2006323"],"2006324":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6559","http://www.exploit-db.com/exploits/2908/","http://doc.emergingthreats.net/2006324"],"2006325":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6559","http://www.exploit-db.com/exploits/2908/","http://doc.emergingthreats.net/2006325"],"2006326":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6559","http://www.exploit-db.com/exploits/2908/","http://doc.emergingthreats.net/2006326"],"2006327":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6542","http://www.milw0rm.com/exploits/2906","http://doc.emergingthreats.net/2006327"],"2006328":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6542","http://www.milw0rm.com/exploits/2906","http://doc.emergingthreats.net/2006328"],"2006329":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6542","http://www.milw0rm.com/exploits/2906","http://doc.emergingthreats.net/2006329"],"2006330":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6542","http://www.milw0rm.com/exploits/2906","http://doc.emergingthreats.net/2006330"],"2006331":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6542","http://www.milw0rm.com/exploits/2906","http://doc.emergingthreats.net/2006331"],"2006332":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6542","http://www.milw0rm.com/exploits/2906","http://doc.emergingthreats.net/2006332"],"2006333":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6540","http://www.secunia.com/advisories/23316","http://doc.emergingthreats.net/2006333"],"2006334":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6540","http://www.secunia.com/advisories/23316","http://doc.emergingthreats.net/2006334"],"2006335":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6540","http://www.secunia.com/advisories/23316","http://doc.emergingthreats.net/2006335"],"2006336":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6540","http://www.secunia.com/advisories/23316","http://doc.emergingthreats.net/2006336"],"2006337":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6540","http://www.secunia.com/advisories/23316","http://doc.emergingthreats.net/2006337"],"2006338":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6540","http://www.secunia.com/advisories/23316","http://doc.emergingthreats.net/2006338"],"2006339":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6525","http://www.secunia.com/advisories/23304","http://doc.emergingthreats.net/2006339"],"2006340":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6525","http://www.secunia.com/advisories/23304","http://doc.emergingthreats.net/2006340"],"2006341":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6525","http://www.secunia.com/advisories/23304","http://doc.emergingthreats.net/2006341"],"2006342":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6525","http://www.secunia.com/advisories/23304","http://doc.emergingthreats.net/2006342"],"2006343":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6525","http://www.secunia.com/advisories/23304","http://doc.emergingthreats.net/2006343"],"2006344":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6525","http://www.secunia.com/advisories/23304","http://doc.emergingthreats.net/2006344"],"2006345":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6521","http://www.securityfocus.com/bid/21513","http://doc.emergingthreats.net/2006345"],"2006346":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6521","http://www.securityfocus.com/bid/21513","http://doc.emergingthreats.net/2006346"],"2006347":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6521","http://www.securityfocus.com/bid/21513","http://doc.emergingthreats.net/2006347"],"2006348":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6521","http://www.securityfocus.com/bid/21513","http://doc.emergingthreats.net/2006348"],"2006349":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6521","http://www.securityfocus.com/bid/21513","http://doc.emergingthreats.net/2006349"],"2006350":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6521","http://www.securityfocus.com/bid/21513","http://doc.emergingthreats.net/2006350"],"2006351":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6519","http://www.securityfocus.com/bid/21516","http://doc.emergingthreats.net/2006351"],"2006352":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6519","http://www.securityfocus.com/bid/21516","http://doc.emergingthreats.net/2006352"],"2006353":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6519","http://www.securityfocus.com/bid/21516","http://doc.emergingthreats.net/2006353"],"2006354":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6519","http://www.securityfocus.com/bid/21516","http://doc.emergingthreats.net/2006354"],"2006355":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6519","http://www.securityfocus.com/bid/21516","http://doc.emergingthreats.net/2006355"],"2006356":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6519","http://www.securityfocus.com/bid/21516","http://doc.emergingthreats.net/2006356"],"2006357":["http://doc.emergingthreats.net/bin/view/Main/2006357"],"2006361":["http://www.threatexpert.com/report.aspx?md5=ee600bdcc45989750dee846b5049f935","http://www.threatexpert.com/report.aspx?md5=91b9aa25563ae524d3ca4582630eb8eb","http://www.threatexpert.com/report.aspx?md5=1051f7176fe0a50414649d369e752e98"],"2006362":["http://doc.emergingthreats.net/2006362"],"2006364":["http://doc.emergingthreats.net/2006364"],"2006365":["http://doc.emergingthreats.net/bin/view/Main/2006365"],"2006366":["http://doc.emergingthreats.net/2006366"],"2006370":["http://doc.emergingthreats.net/2006370"],"2006371":["http://doc.emergingthreats.net/bin/view/Main/2006371"],"2006372":["http://doc.emergingthreats.net/bin/view/Main/2006372"],"2006375":["http://doc.emergingthreats.net/bin/view/Main/2006375"],"2006379":["http://doc.emergingthreats.net/bin/view/Main/2006379"],"2006380":["http://doc.emergingthreats.net/bin/view/Main/2006380"],"2006381":["http://doc.emergingthreats.net/2006381"],"2006382":["http://doc.emergingthreats.net/2006382"],"2006387":["http://doc.emergingthreats.net/2006387"],"2006388":["http://doc.emergingthreats.net/bin/view/Main/2006388"],"2006391":["http://doc.emergingthreats.net/2006391"],"2006392":["http://doc.emergingthreats.net/2006392"],"2006393":["http://doc.emergingthreats.net/2006393"],"2006394":["http://doc.emergingthreats.net/2006394"],"2006395":["http://doc.emergingthreats.net/2006396"],"2006396":["http://doc.emergingthreats.net/2006396"],"2006397":["http://doc.emergingthreats.net/2006396"],"2006398":["http://doc.emergingthreats.net/2006396"],"2006402":["http://doc.emergingthreats.net/bin/view/Main/2006402"],"2006413":["http://doc.emergingthreats.net/2006413"],"2006417":["http://doc.emergingthreats.net/bin/view/Main/2006417"],"2006418":["http://doc.emergingthreats.net/2006418"],"2006419":["http://doc.emergingthreats.net/2006419"],"2006420":["http://doc.emergingthreats.net/2006420"],"2006421":["http://doc.emergingthreats.net/2006421"],"2006422":["http://doc.emergingthreats.net/2006422"],"2006423":["http://doc.emergingthreats.net/2006423"],"2006430":["http://doc.emergingthreats.net/2006430"],"2006441":["http://doc.emergingthreats.net/2006441"],"2006443":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2006443"],"2006444":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2006444"],"2006445":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2006445"],"2006446":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2006446"],"2006447":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2006447"],"2006449":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3250","http://www.securityfocus.com/bid/24478","http://doc.emergingthreats.net/2006449"],"2006450":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3250","http://www.securityfocus.com/bid/24478","http://doc.emergingthreats.net/2006450"],"2006451":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3250","http://www.securityfocus.com/bid/24478","http://doc.emergingthreats.net/2006451"],"2006452":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3250","http://www.securityfocus.com/bid/24478","http://doc.emergingthreats.net/2006452"],"2006453":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3250","http://www.securityfocus.com/bid/24478","http://doc.emergingthreats.net/2006453"],"2006454":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3250","http://www.securityfocus.com/bid/24478","http://doc.emergingthreats.net/2006454"],"2006455":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3128","http://www.osvdb.org/34164","http://doc.emergingthreats.net/2006455"],"2006456":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3128","http://www.osvdb.org/34164","http://doc.emergingthreats.net/2006456"],"2006457":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3128","http://www.osvdb.org/34164","http://doc.emergingthreats.net/2006457"],"2006458":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3128","http://www.osvdb.org/34164","http://doc.emergingthreats.net/2006458"],"2006459":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3128","http://www.osvdb.org/34164","http://doc.emergingthreats.net/2006459"],"2006460":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3128","http://www.osvdb.org/34164","http://doc.emergingthreats.net/2006460"],"2006461":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3273","http://www.securityfocus.com/bid/24498","http://doc.emergingthreats.net/2006461"],"2006462":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3273","http://www.securityfocus.com/bid/24498","http://doc.emergingthreats.net/2006462"],"2006463":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3273","http://www.securityfocus.com/bid/24498","http://doc.emergingthreats.net/2006463"],"2006464":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3273","http://www.securityfocus.com/bid/24498","http://doc.emergingthreats.net/2006464"],"2006465":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3273","http://www.securityfocus.com/bid/24498","http://doc.emergingthreats.net/2006465"],"2006466":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3273","http://www.securityfocus.com/bid/24498","http://doc.emergingthreats.net/2006466"],"2006467":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3301","http://www.securityfocus.com/bid/24528","http://doc.emergingthreats.net/2006467"],"2006468":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3301","http://www.securityfocus.com/bid/24528","http://doc.emergingthreats.net/2006468"],"2006469":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3301","http://www.securityfocus.com/bid/24528","http://doc.emergingthreats.net/2006469"],"2006470":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3301","http://www.securityfocus.com/bid/24528","http://doc.emergingthreats.net/2006470"],"2006471":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3301","http://www.securityfocus.com/bid/24528","http://doc.emergingthreats.net/2006471"],"2006472":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3301","http://www.securityfocus.com/bid/24528","http://doc.emergingthreats.net/2006472"],"2006473":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3293","http://www.exploit-db.com/exploits/4082/","http://doc.emergingthreats.net/2006473"],"2006474":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3293","http://www.exploit-db.com/exploits/4082/","http://doc.emergingthreats.net/2006474"],"2006475":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3293","http://www.exploit-db.com/exploits/4082/","http://doc.emergingthreats.net/2006475"],"2006476":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3293","http://www.exploit-db.com/exploits/4082/","http://doc.emergingthreats.net/2006476"],"2006477":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3293","http://www.exploit-db.com/exploits/4082/","http://doc.emergingthreats.net/2006477"],"2006478":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3293","http://www.exploit-db.com/exploits/4082/","http://doc.emergingthreats.net/2006478"],"2006479":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3307","http://www.milw0rm.com/exploits/4078","http://doc.emergingthreats.net/2006479"],"2006480":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3307","http://www.milw0rm.com/exploits/4078","http://doc.emergingthreats.net/2006480"],"2006481":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3307","http://www.milw0rm.com/exploits/4078","http://doc.emergingthreats.net/2006481"],"2006482":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3307","http://www.milw0rm.com/exploits/4078","http://doc.emergingthreats.net/2006482"],"2006484":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3307","http://www.milw0rm.com/exploits/4078","http://doc.emergingthreats.net/2006484"],"2006485":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3307","http://www.milw0rm.com/exploits/4078","http://doc.emergingthreats.net/2006485"],"2006486":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3311","http://www.milw0rm.com/exploits/3588","http://doc.emergingthreats.net/2006486"],"2006487":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3311","http://www.milw0rm.com/exploits/3588","http://doc.emergingthreats.net/2006487"],"2006488":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3311","http://www.milw0rm.com/exploits/3588","http://doc.emergingthreats.net/2006488"],"2006489":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3311","http://www.milw0rm.com/exploits/3588","http://doc.emergingthreats.net/2006489"],"2006490":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3311","http://www.milw0rm.com/exploits/3588","http://doc.emergingthreats.net/2006490"],"2006491":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3311","http://www.milw0rm.com/exploits/3588","http://doc.emergingthreats.net/2006491"],"2006492":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006492"],"2006493":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006493"],"2006494":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006494"],"2006495":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006495"],"2006496":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006496"],"2006497":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006497"],"2006498":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006498"],"2006499":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006499"],"2006500":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006500"],"2006501":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006501"],"2006502":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006502"],"2006503":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3313","http://www.milw0rm.com/exploits/4081","http://doc.emergingthreats.net/2006503"],"2006504":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3323","http://www.securityfocus.com/bid/24562","http://doc.emergingthreats.net/2006504"],"2006505":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3323","http://www.securityfocus.com/bid/24562","http://doc.emergingthreats.net/2006505"],"2006506":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3323","http://www.securityfocus.com/bid/24562","http://doc.emergingthreats.net/2006506"],"2006507":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3323","http://www.securityfocus.com/bid/24562","http://doc.emergingthreats.net/2006507"],"2006508":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3323","http://www.securityfocus.com/bid/24562","http://doc.emergingthreats.net/2006508"],"2006509":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3323","http://www.securityfocus.com/bid/24562","http://doc.emergingthreats.net/2006509"],"2006510":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006510"],"2006511":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006511"],"2006512":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006512"],"2006513":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006513"],"2006514":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006514"],"2006515":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006515"],"2006516":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006516"],"2006517":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006517"],"2006518":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006518"],"2006519":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006519"],"2006520":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006520"],"2006521":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006521"],"2006522":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006522"],"2006523":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006523"],"2006524":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006524"],"2006525":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006525"],"2006526":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006526"],"2006527":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3345","http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html","http://doc.emergingthreats.net/2006527"],"2006546":["http://doc.emergingthreats.net/2006546"],"2006547":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3354","http://www.securityfocus.com/bid/24584","http://doc.emergingthreats.net/2006547"],"2006548":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3354","http://www.securityfocus.com/bid/24584","http://doc.emergingthreats.net/2006548"],"2006549":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3354","http://www.securityfocus.com/bid/24584","http://doc.emergingthreats.net/2006549"],"2006550":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3354","http://www.securityfocus.com/bid/24584","http://doc.emergingthreats.net/2006550"],"2006551":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3354","http://www.securityfocus.com/bid/24584","http://doc.emergingthreats.net/2006551"],"2006552":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3354","http://www.securityfocus.com/bid/24584","http://doc.emergingthreats.net/2006552"],"2006553":["http://doc.emergingthreats.net/2006553"],"2006554":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6486","http://www.securityfocus.com/archive/1/archive/1/453586/100/100/threaded","http://doc.emergingthreats.net/2006554"],"2006555":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6486","http://www.securityfocus.com/archive/1/archive/1/453586/100/100/threaded","http://doc.emergingthreats.net/2006555"],"2006556":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6486","http://www.securityfocus.com/archive/1/archive/1/453586/100/100/threaded","http://doc.emergingthreats.net/2006556"],"2006557":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6486","http://www.securityfocus.com/archive/1/archive/1/453586/100/100/threaded","http://doc.emergingthreats.net/2006557"],"2006558":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6486","http://www.securityfocus.com/archive/1/archive/1/453586/100/100/threaded","http://doc.emergingthreats.net/2006558"],"2006559":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6486","http://www.securityfocus.com/archive/1/archive/1/453586/100/100/threaded","http://doc.emergingthreats.net/2006559"],"2006560":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006560"],"2006561":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006561"],"2006562":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006562"],"2006564":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006564"],"2006565":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006565"],"2006566":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006566"],"2006567":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006567"],"2006568":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006568"],"2006569":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006569"],"2006570":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006570"],"2006571":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006571"],"2006572":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006572"],"2006573":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006573"],"2006574":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006574"],"2006575":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006575"],"2006576":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006576"],"2006577":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006577"],"2006578":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006578"],"2006579":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006579"],"2006580":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006580"],"2006581":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006581"],"2006582":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006582"],"2006583":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006583"],"2006584":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006584"],"2006585":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006585"],"2006586":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006586"],"2006587":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006587"],"2006588":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006588"],"2006589":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006589"],"2006590":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6478","http://www.securityfocus.com/bid/21514/exploit","http://doc.emergingthreats.net/2006590"],"2006591":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006591"],"2006592":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006592"],"2006593":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006593"],"2006594":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006594"],"2006595":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006595"],"2006596":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006596"],"2006597":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006597"],"2006598":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006598"],"2006599":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006599"],"2006600":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006600"],"2006601":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006601"],"2006602":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6450","http://www.securityfocus.com/bid/21473","http://doc.emergingthreats.net/2006602"],"2006603":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6448","http://www.frsirt.com/english/advisories/2006/4850","http://doc.emergingthreats.net/2006603"],"2006604":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6448","http://www.frsirt.com/english/advisories/2006/4850","http://doc.emergingthreats.net/2006604"],"2006605":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6448","http://www.frsirt.com/english/advisories/2006/4850","http://doc.emergingthreats.net/2006605"],"2006606":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6448","http://www.frsirt.com/english/advisories/2006/4850","http://doc.emergingthreats.net/2006606"],"2006607":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6448","http://www.frsirt.com/english/advisories/2006/4850","http://doc.emergingthreats.net/2006607"],"2006608":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6448","http://www.frsirt.com/english/advisories/2006/4850","http://doc.emergingthreats.net/2006608"],"2006615":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006615"],"2006616":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006616"],"2006617":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006617"],"2006618":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006618"],"2006619":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006619"],"2006620":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006620"],"2006621":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006621"],"2006622":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006622"],"2006623":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006623"],"2006624":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006624"],"2006625":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006625"],"2006626":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6414","http://www.securityfocus.com/bid/21463","http://doc.emergingthreats.net/2006626"],"2006627":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6403","http://marc.theaimsgroup.com/?l=bugtraq&m=116344068502988&w=2","http://doc.emergingthreats.net/2006627"],"2006628":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6403","http://marc.theaimsgroup.com/?l=bugtraq&m=116344068502988&w=2","http://doc.emergingthreats.net/2006628"],"2006629":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6403","http://marc.theaimsgroup.com/?l=bugtraq&m=116344068502988&w=2","http://doc.emergingthreats.net/2006629"],"2006630":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6403","http://marc.theaimsgroup.com/?l=bugtraq&m=116344068502988&w=2","http://doc.emergingthreats.net/2006630"],"2006631":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6403","http://marc.theaimsgroup.com/?l=bugtraq&m=116344068502988&w=2","http://doc.emergingthreats.net/2006631"],"2006632":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6403","http://marc.theaimsgroup.com/?l=bugtraq&m=116344068502988&w=2","http://doc.emergingthreats.net/2006632"],"2006633":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006633"],"2006634":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006634"],"2006635":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006635"],"2006636":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006636"],"2006637":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006637"],"2006638":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006638"],"2006639":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006639"],"2006640":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006640"],"2006641":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006641"],"2006642":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006642"],"2006643":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006643"],"2006644":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006644"],"2006645":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006645"],"2006646":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006646"],"2006647":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006647"],"2006648":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006648"],"2006649":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006649"],"2006650":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006650"],"2006651":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006651"],"2006652":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006652"],"2006653":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006653"],"2006654":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006654"],"2006655":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006655"],"2006656":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6398","http://www.securityfocus.com/archive/1/archive/1/453462/100/0/threaded","http://doc.emergingthreats.net/2006656"],"2006657":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006657"],"2006658":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006658"],"2006659":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006659"],"2006660":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006660"],"2006661":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006661"],"2006662":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006662"],"2006663":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006663"],"2006664":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006664"],"2006665":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006665"],"2006666":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006666"],"2006667":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006667"],"2006668":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6387","http://www.securityfocus.com/bid/21464","http://doc.emergingthreats.net/2006668"],"2006669":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6370","http://www.securityfocus.com/archive/1/archive/1/453468/100/0/threaded","http://doc.emergingthreats.net/2006669"],"2006670":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6370","http://www.securityfocus.com/archive/1/archive/1/453468/100/0/threaded","http://doc.emergingthreats.net/2006670"],"2006671":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6370","http://www.securityfocus.com/archive/1/archive/1/453468/100/0/threaded","http://doc.emergingthreats.net/2006671"],"2006672":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6370","http://www.securityfocus.com/archive/1/archive/1/453468/100/0/threaded","http://doc.emergingthreats.net/2006672"],"2006673":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6370","http://www.securityfocus.com/archive/1/archive/1/453468/100/0/threaded","http://doc.emergingthreats.net/2006673"],"2006674":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6370","http://www.securityfocus.com/archive/1/archive/1/453468/100/0/threaded","http://doc.emergingthreats.net/2006674"],"2006681":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6369","http://www.securityfocus.com/archive/1/archive/1/453159/100/100/threaded","http://doc.emergingthreats.net/2006681"],"2006682":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6369","http://www.securityfocus.com/archive/1/archive/1/453159/100/100/threaded","http://doc.emergingthreats.net/2006682"],"2006683":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6369","http://www.securityfocus.com/archive/1/archive/1/453159/100/100/threaded","http://doc.emergingthreats.net/2006683"],"2006684":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6369","http://www.securityfocus.com/archive/1/archive/1/453159/100/100/threaded","http://doc.emergingthreats.net/2006684"],"2006685":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6369","http://www.securityfocus.com/archive/1/archive/1/453159/100/100/threaded","http://doc.emergingthreats.net/2006685"],"2006686":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6369","http://www.securityfocus.com/archive/1/archive/1/453159/100/100/threaded","http://doc.emergingthreats.net/2006686"],"2006687":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006687"],"2006688":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006688"],"2006689":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006689"],"2006690":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006690"],"2006691":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006691"],"2006692":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006692"],"2006694":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006694"],"2006695":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006695"],"2006696":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006696"],"2006697":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006697"],"2006698":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006698"],"2006699":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6367","http://www.securityfocus.com/bid/21405","http://doc.emergingthreats.net/2006699"],"2006700":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6365","http://www.securityfocus.com/bid/14034","http://doc.emergingthreats.net/2006700"],"2006701":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6365","http://www.securityfocus.com/bid/14034","http://doc.emergingthreats.net/2006701"],"2006702":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6365","http://www.securityfocus.com/bid/14034","http://doc.emergingthreats.net/2006702"],"2006703":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6365","http://www.securityfocus.com/bid/14034","http://doc.emergingthreats.net/2006703"],"2006704":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6365","http://www.securityfocus.com/bid/14034","http://doc.emergingthreats.net/2006704"],"2006705":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6365","http://www.securityfocus.com/bid/14034","http://doc.emergingthreats.net/2006705"],"2006706":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6355","http://www.securityfocus.com/archive/1/archive/1/453318/100/0/threaded","http://doc.emergingthreats.net/2006706"],"2006707":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6355","http://www.securityfocus.com/archive/1/archive/1/453318/100/0/threaded","http://doc.emergingthreats.net/2006707"],"2006708":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6355","http://www.securityfocus.com/archive/1/archive/1/453318/100/0/threaded","http://doc.emergingthreats.net/2006708"],"2006709":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6355","http://www.securityfocus.com/archive/1/archive/1/453318/100/0/threaded","http://doc.emergingthreats.net/2006709"],"2006710":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6355","http://www.securityfocus.com/archive/1/archive/1/453318/100/0/threaded","http://doc.emergingthreats.net/2006710"],"2006711":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6355","http://www.securityfocus.com/archive/1/archive/1/453318/100/0/threaded","http://doc.emergingthreats.net/2006711"],"2006712":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6354","http://www.securityfocus.com/bid/15681","http://doc.emergingthreats.net/2006712"],"2006713":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6354","http://www.securityfocus.com/bid/15681","http://doc.emergingthreats.net/2006713"],"2006714":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6354","http://www.securityfocus.com/bid/15681","http://doc.emergingthreats.net/2006714"],"2006715":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6354","http://www.securityfocus.com/bid/15681","http://doc.emergingthreats.net/2006715"],"2006716":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6354","http://www.securityfocus.com/bid/15681","http://doc.emergingthreats.net/2006716"],"2006717":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6354","http://www.securityfocus.com/bid/15681","http://doc.emergingthreats.net/2006717"],"2006730":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6349","http://downloads.securityfocus.com/vulnerabilities/exploits/21758.pl","http://doc.emergingthreats.net/2006730"],"2006731":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6349","http://downloads.securityfocus.com/vulnerabilities/exploits/21758.pl","http://doc.emergingthreats.net/2006731"],"2006732":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6349","http://downloads.securityfocus.com/vulnerabilities/exploits/21758.pl","http://doc.emergingthreats.net/2006732"],"2006733":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6349","http://downloads.securityfocus.com/vulnerabilities/exploits/21758.pl","http://doc.emergingthreats.net/2006733"],"2006734":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6349","http://downloads.securityfocus.com/vulnerabilities/exploits/21758.pl","http://doc.emergingthreats.net/2006734"],"2006735":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6349","http://downloads.securityfocus.com/vulnerabilities/exploits/21758.pl","http://doc.emergingthreats.net/2006735"],"2006736":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006736"],"2006737":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006737"],"2006738":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006738"],"2006739":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006739"],"2006740":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006740"],"2006741":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006741"],"2006742":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006742"],"2006743":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006743"],"2006744":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006744"],"2006745":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006745"],"2006746":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006746"],"2006747":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006747"],"2006748":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006748"],"2006749":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006749"],"2006750":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006750"],"2006751":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006751"],"2006752":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006752"],"2006753":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006753"],"2006754":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006754"],"2006755":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006755"],"2006756":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006756"],"2006757":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006757"],"2006758":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006758"],"2006759":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6344","http://www.secunia.com/advisories/23180","http://doc.emergingthreats.net/2006759"],"2006760":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006760"],"2006761":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006761"],"2006762":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006762"],"2006763":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006763"],"2006764":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006764"],"2006765":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006765"],"2006766":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006766"],"2006767":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006767"],"2006768":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006768"],"2006769":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006769"],"2006770":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006770"],"2006771":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006771"],"2006772":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006772"],"2006773":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006773"],"2006774":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006774"],"2006775":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006775"],"2006776":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006776"],"2006777":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6342","http://www.securityfocus.com/bid/21199","http://doc.emergingthreats.net/2006777"],"2006778":["http://doc.emergingthreats.net/2006778"],"2006780":["http://doc.emergingthreats.net/2006780"],"2006781":["http://doc.emergingthreats.net/2006781"],"2006782":["http://doc.emergingthreats.net/2006782"],"2006783":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006783"],"2006784":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006784"],"2006785":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006785"],"2006786":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006786"],"2006787":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006787"],"2006788":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006788"],"2006789":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006789"],"2006790":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006790"],"2006791":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006791"],"2006792":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006792"],"2006793":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006793"],"2006794":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6337","http://www.securityfocus.com/bid/21398","http://doc.emergingthreats.net/2006794"],"2006795":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006795"],"2006796":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006796"],"2006797":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006797"],"2006798":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006798"],"2006799":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006799"],"2006800":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006800"],"2006801":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006801"],"2006802":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006802"],"2006803":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006803"],"2006804":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006804"],"2006805":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006805"],"2006806":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6298","http://www.securityfocus.com/bid/21418","http://doc.emergingthreats.net/2006806"],"2006807":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6280","http://www.securityfocus.com/bid/21172","http://doc.emergingthreats.net/2006807"],"2006808":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6280","http://www.securityfocus.com/bid/21172","http://doc.emergingthreats.net/2006808"],"2006809":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6280","http://www.securityfocus.com/bid/21172","http://doc.emergingthreats.net/2006809"],"2006810":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6280","http://www.securityfocus.com/bid/21172","http://doc.emergingthreats.net/2006810"],"2006811":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6280","http://www.securityfocus.com/bid/21172","http://doc.emergingthreats.net/2006811"],"2006812":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6280","http://www.securityfocus.com/bid/21172","http://doc.emergingthreats.net/2006812"],"2006813":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6274","http://www.securityfocus.com/bid/21296","http://doc.emergingthreats.net/2006813"],"2006814":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6274","http://www.securityfocus.com/bid/21296","http://doc.emergingthreats.net/2006814"],"2006815":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6274","http://www.securityfocus.com/bid/21296","http://doc.emergingthreats.net/2006815"],"2006816":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6274","http://www.securityfocus.com/bid/21296","http://doc.emergingthreats.net/2006816"],"2006817":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6274","http://www.securityfocus.com/bid/21296","http://doc.emergingthreats.net/2006817"],"2006818":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6274","http://www.securityfocus.com/bid/21296","http://doc.emergingthreats.net/2006818"],"2006819":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006819"],"2006820":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006820"],"2006821":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006821"],"2006822":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006822"],"2006823":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006823"],"2006824":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006824"],"2006825":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006825"],"2006826":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006826"],"2006827":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006827"],"2006828":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006828"],"2006829":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006829"],"2006830":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006830"],"2006831":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006831"],"2006832":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006832"],"2006833":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006833"],"2006834":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006834"],"2006835":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006835"],"2006836":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006836"],"2006837":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006837"],"2006838":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006838"],"2006839":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006839"],"2006840":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006840"],"2006841":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006841"],"2006842":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006842"],"2006843":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006843"],"2006844":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006844"],"2006845":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006845"],"2006846":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006846"],"2006847":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006847"],"2006848":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006848"],"2006849":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006849"],"2006850":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006850"],"2006851":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006851"],"2006852":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006852"],"2006853":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006853"],"2006854":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006854"],"2006855":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006855"],"2006856":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006856"],"2006857":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006857"],"2006858":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006858"],"2006859":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006859"],"2006860":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6270","http://www.securityfocus.com/archive/1/archive/1/451958/100/200/threaded","http://doc.emergingthreats.net/2006860"],"2006862":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006862"],"2006863":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006863"],"2006864":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006864"],"2006865":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006865"],"2006866":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006866"],"2006867":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006867"],"2006868":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006868"],"2006869":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006869"],"2006870":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006870"],"2006871":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006871"],"2006872":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006872"],"2006873":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006873"],"2006874":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006874"],"2006875":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006875"],"2006876":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006876"],"2006877":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006877"],"2006878":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006878"],"2006879":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6269","http://www.securityfocus.com/archive/1/archive/1/451970/100/200/threaded","http://doc.emergingthreats.net/2006879"],"2006880":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6268","http://www.securityfocus.com/bid/21227","http://doc.emergingthreats.net/2006880"],"2006881":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6268","http://www.securityfocus.com/bid/21227","http://doc.emergingthreats.net/2006881"],"2006882":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6268","http://www.securityfocus.com/bid/21227","http://doc.emergingthreats.net/2006882"],"2006883":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6268","http://www.securityfocus.com/bid/21227","http://doc.emergingthreats.net/2006883"],"2006884":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6268","http://www.securityfocus.com/bid/21227","http://doc.emergingthreats.net/2006884"],"2006885":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6268","http://www.securityfocus.com/bid/21227","http://doc.emergingthreats.net/2006885"],"2006886":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006886"],"2006887":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006887"],"2006888":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006888"],"2006889":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006889"],"2006890":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006890"],"2006891":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006891"],"2006892":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006892"],"2006893":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006893"],"2006894":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006894"],"2006895":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006895"],"2006896":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006896"],"2006897":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6247","http://www.securityfocus.com/bid/21319","http://doc.emergingthreats.net/2006897"],"2006898":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006898"],"2006899":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006899"],"2006900":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006900"],"2006901":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006901"],"2006902":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006902"],"2006903":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006903"],"2006904":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006904"],"2006905":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006905"],"2006906":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006906"],"2006907":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006907"],"2006908":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006908"],"2006909":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6243","http://www.securityfocus.com/bid/21289","http://doc.emergingthreats.net/2006909"],"2006911":["http://doc.emergingthreats.net/2006911"],"2006921":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6237","http://www.milw0rm.com/exploits/2841","http://doc.emergingthreats.net/2006921"],"2006922":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6237","http://www.milw0rm.com/exploits/2841","http://doc.emergingthreats.net/2006922"],"2006923":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6237","http://www.milw0rm.com/exploits/2841","http://doc.emergingthreats.net/2006923"],"2006924":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6237","http://www.milw0rm.com/exploits/2841","http://doc.emergingthreats.net/2006924"],"2006925":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6237","http://www.milw0rm.com/exploits/2841","http://doc.emergingthreats.net/2006925"],"2006926":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6237","http://www.milw0rm.com/exploits/2841","http://doc.emergingthreats.net/2006926"],"2006927":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006927"],"2006928":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006928"],"2006929":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006929"],"2006930":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006930"],"2006931":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006931"],"2006932":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006932"],"2006933":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006933"],"2006934":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006934"],"2006935":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006935"],"2006936":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006936"],"2006937":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006937"],"2006938":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6234","http://www.securityfocus.com/archive/1/archive/1/437835/100/200/threaded","http://doc.emergingthreats.net/2006938"],"2006939":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006939"],"2006940":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006940"],"2006941":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006941"],"2006942":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006942"],"2006943":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006943"],"2006944":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006944"],"2006945":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006945"],"2006946":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006946"],"2006947":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006947"],"2006948":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006948"],"2006949":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006949"],"2006950":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6220","http://www.milw0rm.com/exploits/2834","http://doc.emergingthreats.net/2006950"],"2006959":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6218","http://www.securityfocus.com/bid/21170","http://doc.emergingthreats.net/2006959"],"2006969":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6216","http://www.milw0rm.com/exploits/2851","http://doc.emergingthreats.net/2006969"],"2006970":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6216","http://www.milw0rm.com/exploits/2851","http://doc.emergingthreats.net/2006970"],"2006971":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6216","http://www.milw0rm.com/exploits/2851","http://doc.emergingthreats.net/2006971"],"2006972":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6216","http://www.milw0rm.com/exploits/2851","http://doc.emergingthreats.net/2006972"],"2006973":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6216","http://www.milw0rm.com/exploits/2851","http://doc.emergingthreats.net/2006973"],"2006974":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6216","http://www.milw0rm.com/exploits/2851","http://doc.emergingthreats.net/2006974"],"2006975":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006975"],"2006976":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006976"],"2006977":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006977"],"2006978":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006978"],"2006979":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006979"],"2006980":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006980"],"2006981":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006981"],"2006982":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006982"],"2006983":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006983"],"2006984":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006984"],"2006985":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006985"],"2006986":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006986"],"2006987":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006987"],"2006988":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006988"],"2006989":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006989"],"2006990":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006990"],"2006991":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006991"],"2006992":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6215","http://www.frsirt.com/english/advisories/2006/4687","http://doc.emergingthreats.net/2006992"],"2006993":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6214","http://www.milw0rm.com/exploits/2835","http://doc.emergingthreats.net/2006993"],"2006994":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6214","http://www.milw0rm.com/exploits/2835","http://doc.emergingthreats.net/2006994"],"2006995":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6214","http://www.milw0rm.com/exploits/2835","http://doc.emergingthreats.net/2006995"],"2006996":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6214","http://www.milw0rm.com/exploits/2835","http://doc.emergingthreats.net/2006996"],"2006997":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6214","http://www.milw0rm.com/exploits/2835","http://doc.emergingthreats.net/2006997"],"2006998":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6214","http://www.milw0rm.com/exploits/2835","http://doc.emergingthreats.net/2006998"],"2006999":["http://doc.emergingthreats.net/2006999"],"2007000":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6210","http://www.securityfocus.com/bid/21279","http://doc.emergingthreats.net/2007000"],"2007001":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6210","http://www.securityfocus.com/bid/21279","http://doc.emergingthreats.net/2007001"],"2007002":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6210","http://www.securityfocus.com/bid/21279","http://doc.emergingthreats.net/2007002"],"2007003":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6210","http://www.securityfocus.com/bid/21279","http://doc.emergingthreats.net/2007003"],"2007004":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6210","http://www.securityfocus.com/bid/21279","http://doc.emergingthreats.net/2007004"],"2007005":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6210","http://www.securityfocus.com/bid/21279","http://doc.emergingthreats.net/2007005"],"2007006":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007006"],"2007007":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007007"],"2007008":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007008"],"2007009":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007009"],"2007010":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007010"],"2007011":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007011"],"2007012":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007012"],"2007013":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007013"],"2007014":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007014"],"2007015":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007015"],"2007016":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007016"],"2007017":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007017"],"2007018":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007018"],"2007019":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007019"],"2007020":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007020"],"2007021":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007021"],"2007022":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007022"],"2007023":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6209","http://www.securityfocus.com/bid/21273","http://doc.emergingthreats.net/2007023"],"2007030":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007030"],"2007031":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007031"],"2007032":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007032"],"2007033":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007033"],"2007034":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007034"],"2007035":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007035"],"2007036":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007036"],"2007037":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007037"],"2007038":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007038"],"2007039":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007039"],"2007040":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007040"],"2007041":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007041"],"2007042":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007042"],"2007043":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007043"],"2007044":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007044"],"2007045":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007045"],"2007046":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007046"],"2007047":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007047"],"2007048":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007048"],"2007049":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007049"],"2007050":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007050"],"2007051":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007051"],"2007052":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007052"],"2007053":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007053"],"2007054":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007054"],"2007055":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007055"],"2007056":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007056"],"2007057":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007057"],"2007058":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007058"],"2007059":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6208","http://www.securityfocus.com/bid/21192","http://doc.emergingthreats.net/2007059"],"2007060":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6207","http://www.securityfocus.com/bid/21323","http://doc.emergingthreats.net/2007060"],"2007061":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6207","http://www.securityfocus.com/bid/21323","http://doc.emergingthreats.net/2007061"],"2007062":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6207","http://www.securityfocus.com/bid/21323","http://doc.emergingthreats.net/2007062"],"2007063":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6207","http://www.securityfocus.com/bid/21323","http://doc.emergingthreats.net/2007063"],"2007064":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6207","http://www.securityfocus.com/bid/21323","http://doc.emergingthreats.net/2007064"],"2007065":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6207","http://www.securityfocus.com/bid/21323","http://doc.emergingthreats.net/2007065"],"2007070":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6206","http://www.securityfocus.com/bid/21324","http://doc.emergingthreats.net/2007070"],"2007071":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6206","http://www.securityfocus.com/bid/21324","http://doc.emergingthreats.net/2007071"],"2007072":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6206","http://www.securityfocus.com/bid/21324","http://doc.emergingthreats.net/2007072"],"2007073":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6206","http://www.securityfocus.com/bid/21324","http://doc.emergingthreats.net/2007073"],"2007074":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6206","http://www.securityfocus.com/bid/21324","http://doc.emergingthreats.net/2007074"],"2007075":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6206","http://www.securityfocus.com/bid/21324","http://doc.emergingthreats.net/2007075"],"2007076":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007076"],"2007077":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007077"],"2007078":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007078"],"2007079":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007079"],"2007080":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007080"],"2007081":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007081"],"2007082":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007082"],"2007083":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007083"],"2007084":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007084"],"2007085":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007085"],"2007086":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007086"],"2007087":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007087"],"2007088":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007088"],"2007089":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007089"],"2007090":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007090"],"2007091":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007091"],"2007092":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007092"],"2007093":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007093"],"2007094":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007094"],"2007095":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007095"],"2007096":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007096"],"2007097":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007097"],"2007098":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007098"],"2007099":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007099"],"2007100":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007100"],"2007101":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007101"],"2007102":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007102"],"2007103":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007103"],"2007104":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007104"],"2007105":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007105"],"2007106":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007106"],"2007107":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007107"],"2007108":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007108"],"2007109":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007109"],"2007110":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007110"],"2007111":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007111"],"2007112":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007112"],"2007113":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007113"],"2007114":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007114"],"2007115":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007115"],"2007116":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007116"],"2007117":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007117"],"2007118":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007118"],"2007119":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007119"],"2007120":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007120"],"2007121":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007121"],"2007122":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007122"],"2007123":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007123"],"2007124":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007124"],"2007125":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007125"],"2007126":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007126"],"2007127":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007127"],"2007128":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007128"],"2007129":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007129"],"2007130":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007130"],"2007131":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007131"],"2007132":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007132"],"2007133":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007133"],"2007134":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007134"],"2007135":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007135"],"2007136":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007136"],"2007137":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007137"],"2007138":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007138"],"2007139":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007139"],"2007140":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007140"],"2007141":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6204","http://www.securityfocus.com/bid/21193","http://doc.emergingthreats.net/2007141"],"2007176":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6200","http://www.securityfocus.com/archive/1/archive/1/452553/100/0/threaded","http://doc.emergingthreats.net/2007176"],"2007177":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6200","http://www.securityfocus.com/archive/1/archive/1/452553/100/0/threaded","http://doc.emergingthreats.net/2007177"],"2007178":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6200","http://www.securityfocus.com/archive/1/archive/1/452553/100/0/threaded","http://doc.emergingthreats.net/2007178"],"2007179":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6200","http://www.securityfocus.com/archive/1/archive/1/452553/100/0/threaded","http://doc.emergingthreats.net/2007179"],"2007180":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6200","http://www.securityfocus.com/archive/1/archive/1/452553/100/0/threaded","http://doc.emergingthreats.net/2007180"],"2007181":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6200","http://www.securityfocus.com/archive/1/archive/1/452553/100/0/threaded","http://doc.emergingthreats.net/2007181"],"2007182":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007182"],"2007183":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007183"],"2007184":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007184"],"2007185":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007185"],"2007186":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007186"],"2007187":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007187"],"2007188":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007188"],"2007189":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007189"],"2007190":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007190"],"2007191":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007191"],"2007192":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007192"],"2007193":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007193"],"2007194":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007194"],"2007195":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007195"],"2007196":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007196"],"2007197":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007197"],"2007198":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007198"],"2007199":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6195","http://www.securityfocus.com/bid/21282","http://doc.emergingthreats.net/2007199"],"2007200":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007200"],"2007201":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007201"],"2007202":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007202"],"2007203":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007203"],"2007204":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007204"],"2007205":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007205"],"2007206":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007206"],"2007207":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007207"],"2007208":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007208"],"2007209":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007209"],"2007210":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007210"],"2007211":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6193","http://www.milw0rm.com/exploits/2848","http://doc.emergingthreats.net/2007211"],"2007212":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6193","http://www.milw0rm.com/exploits/2848","http://doc.emergingthreats.net/2007212"],"2007213":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6193","http://www.milw0rm.com/exploits/2848","http://doc.emergingthreats.net/2007213"],"2007214":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6193","http://www.milw0rm.com/exploits/2848","http://doc.emergingthreats.net/2007214"],"2007215":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6193","http://www.milw0rm.com/exploits/2848","http://doc.emergingthreats.net/2007215"],"2007216":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6193","http://www.milw0rm.com/exploits/2848","http://doc.emergingthreats.net/2007216"],"2007217":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6191","http://www.milw0rm.com/exploits/2853","http://doc.emergingthreats.net/2007217"],"2007218":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6191","http://www.milw0rm.com/exploits/2853","http://doc.emergingthreats.net/2007218"],"2007219":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6191","http://www.milw0rm.com/exploits/2853","http://doc.emergingthreats.net/2007219"],"2007220":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6191","http://www.milw0rm.com/exploits/2853","http://doc.emergingthreats.net/2007220"],"2007221":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6191","http://www.milw0rm.com/exploits/2853","http://doc.emergingthreats.net/2007221"],"2007222":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6191","http://www.milw0rm.com/exploits/2853","http://doc.emergingthreats.net/2007222"],"2007223":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6189","http://www.securityfocus.com/bid/21310","http://doc.emergingthreats.net/2007223"],"2007224":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6189","http://www.securityfocus.com/bid/21310","http://doc.emergingthreats.net/2007224"],"2007225":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6189","http://www.securityfocus.com/bid/21310","http://doc.emergingthreats.net/2007225"],"2007226":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6189","http://www.securityfocus.com/bid/21310","http://doc.emergingthreats.net/2007226"],"2007227":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6189","http://www.securityfocus.com/bid/21310","http://doc.emergingthreats.net/2007227"],"2007228":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6189","http://www.securityfocus.com/bid/21310","http://doc.emergingthreats.net/2007228"],"2007229":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007229"],"2007230":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007230"],"2007231":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007231"],"2007232":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007232"],"2007233":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007233"],"2007234":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007234"],"2007235":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007235"],"2007236":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007236"],"2007237":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007237"],"2007238":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007238"],"2007239":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007239"],"2007240":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007240"],"2007241":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007241"],"2007242":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007242"],"2007243":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007243"],"2007244":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007244"],"2007245":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007245"],"2007246":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007246"],"2007247":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007247"],"2007248":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007248"],"2007249":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007249"],"2007250":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007250"],"2007251":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007251"],"2007252":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007252"],"2007253":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007253"],"2007254":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007254"],"2007255":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007255"],"2007256":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007256"],"2007257":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007257"],"2007258":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007258"],"2007259":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007259"],"2007260":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007260"],"2007261":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007261"],"2007262":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007262"],"2007263":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007263"],"2007264":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6187","http://www.securityfocus.com/archive/1/archive/1/452733/100/0/threaded","http://doc.emergingthreats.net/2007264"],"2007265":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007265"],"2007266":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007266"],"2007267":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007267"],"2007268":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007268"],"2007269":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007269"],"2007270":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007270"],"2007271":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007271"],"2007272":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007272"],"2007273":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007273"],"2007274":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007274"],"2007275":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007275"],"2007276":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007276"],"2007277":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007277"],"2007278":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007278"],"2007279":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007279"],"2007280":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007280"],"2007281":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007281"],"2007282":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6181","http://www.securityfocus.com/bid/21302","http://doc.emergingthreats.net/2007282"],"2007283":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6194","http://www.securityfocus.com/archive/1/archive/1/452554/100/0/threaded","http://doc.emergingthreats.net/2007283"],"2007288":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6177","http://www.securityfocus.com/archive/1/archive/1/452269/100/100/threaded","http://doc.emergingthreats.net/2007288"],"2007289":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6177","http://www.securityfocus.com/archive/1/archive/1/452269/100/100/threaded","http://doc.emergingthreats.net/2007289"],"2007290":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6177","http://www.securityfocus.com/archive/1/archive/1/452269/100/100/threaded","http://doc.emergingthreats.net/2007290"],"2007291":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6177","http://www.securityfocus.com/archive/1/archive/1/452269/100/100/threaded","http://doc.emergingthreats.net/2007291"],"2007292":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6177","http://www.securityfocus.com/archive/1/archive/1/452269/100/100/threaded","http://doc.emergingthreats.net/2007292"],"2007293":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6177","http://www.securityfocus.com/archive/1/archive/1/452269/100/100/threaded","http://doc.emergingthreats.net/2007293"],"2007294":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007294"],"2007295":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007295"],"2007296":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007296"],"2007297":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007297"],"2007298":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007298"],"2007299":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007299"],"2007300":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007300"],"2007301":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007301"],"2007302":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007302"],"2007303":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007303"],"2007304":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007304"],"2007305":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007305"],"2007306":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007306"],"2007307":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007307"],"2007308":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007308"],"2007309":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007309"],"2007310":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007310"],"2007311":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007311"],"2007312":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007312"],"2007313":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007313"],"2007314":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007314"],"2007315":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007315"],"2007316":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007316"],"2007317":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007317"],"2007318":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007318"],"2007319":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007319"],"2007320":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007320"],"2007321":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007321"],"2007322":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007322"],"2007323":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007323"],"2007324":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007324"],"2007325":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007325"],"2007326":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007326"],"2007327":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007327"],"2007328":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007328"],"2007329":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6161","http://www.frsirt.com/english/advisories/2006/4704","http://doc.emergingthreats.net/2007329"],"2007330":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6160","http://www.milw0rm.com/exploits/2846","http://doc.emergingthreats.net/2007330"],"2007331":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6160","http://www.milw0rm.com/exploits/2846","http://doc.emergingthreats.net/2007331"],"2007332":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6160","http://www.milw0rm.com/exploits/2846","http://doc.emergingthreats.net/2007332"],"2007333":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6160","http://www.milw0rm.com/exploits/2846","http://doc.emergingthreats.net/2007333"],"2007334":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6160","http://www.milw0rm.com/exploits/2846","http://doc.emergingthreats.net/2007334"],"2007335":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6160","http://www.milw0rm.com/exploits/2846","http://doc.emergingthreats.net/2007335"],"2007336":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6157","http://www.milw0rm.com/exploits/2822","http://doc.emergingthreats.net/2007336"],"2007337":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6157","http://www.milw0rm.com/exploits/2822","http://doc.emergingthreats.net/2007337"],"2007338":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6157","http://www.milw0rm.com/exploits/2822","http://doc.emergingthreats.net/2007338"],"2007339":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6157","http://www.milw0rm.com/exploits/2822","http://doc.emergingthreats.net/2007339"],"2007340":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6157","http://www.milw0rm.com/exploits/2822","http://doc.emergingthreats.net/2007340"],"2007341":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6157","http://www.milw0rm.com/exploits/2822","http://doc.emergingthreats.net/2007341"],"2007344":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6149","http://www.milw0rm.com/exploits/2836","http://doc.emergingthreats.net/2007344"],"2007345":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6149","http://www.milw0rm.com/exploits/2836","http://doc.emergingthreats.net/2007345"],"2007346":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6149","http://www.milw0rm.com/exploits/2836","http://doc.emergingthreats.net/2007346"],"2007347":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6149","http://www.milw0rm.com/exploits/2836","http://doc.emergingthreats.net/2007347"],"2007348":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6149","http://www.milw0rm.com/exploits/2836","http://doc.emergingthreats.net/2007348"],"2007349":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6149","http://www.milw0rm.com/exploits/2836","http://doc.emergingthreats.net/2007349"],"2007350":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007350"],"2007351":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007351"],"2007352":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007352"],"2007353":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007353"],"2007354":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007354"],"2007355":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007355"],"2007356":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007356"],"2007357":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007357"],"2007358":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007358"],"2007359":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007359"],"2007360":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007360"],"2007361":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6147","http://www.securityfocus.com/bid/21226","http://doc.emergingthreats.net/2007361"],"2007362":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007362"],"2007363":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007363"],"2007364":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007364"],"2007365":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007365"],"2007366":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007366"],"2007367":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007367"],"2007368":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007368"],"2007369":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007369"],"2007370":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007370"],"2007371":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007371"],"2007372":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007372"],"2007373":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6132","http://www.securityfocus.com/archive/1/archive/1/452256/100/0/threaded","http://doc.emergingthreats.net/2007373"],"2007374":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6117","http://www.milw0rm.com/exploits/2829","http://doc.emergingthreats.net/2007374"],"2007375":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6117","http://www.milw0rm.com/exploits/2829","http://doc.emergingthreats.net/2007375"],"2007376":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6117","http://www.milw0rm.com/exploits/2829","http://doc.emergingthreats.net/2007376"],"2007377":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6117","http://www.milw0rm.com/exploits/2829","http://doc.emergingthreats.net/2007377"],"2007378":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6117","http://www.milw0rm.com/exploits/2829","http://doc.emergingthreats.net/2007378"],"2007379":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6117","http://www.milw0rm.com/exploits/2829","http://doc.emergingthreats.net/2007379"],"2007380":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6116","http://www.milw0rm.com/exploits/2830","http://doc.emergingthreats.net/2007380"],"2007381":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6116","http://www.milw0rm.com/exploits/2830","http://doc.emergingthreats.net/2007381"],"2007382":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6116","http://www.milw0rm.com/exploits/2830","http://doc.emergingthreats.net/2007382"],"2007383":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6116","http://www.milw0rm.com/exploits/2830","http://doc.emergingthreats.net/2007383"],"2007384":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6116","http://www.milw0rm.com/exploits/2830","http://doc.emergingthreats.net/2007384"],"2007385":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6116","http://www.milw0rm.com/exploits/2830","http://doc.emergingthreats.net/2007385"],"2007386":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6115","http://www.milw0rm.com/exploits/2828","http://doc.emergingthreats.net/2007386"],"2007387":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6115","http://www.milw0rm.com/exploits/2828","http://doc.emergingthreats.net/2007387"],"2007388":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6115","http://www.milw0rm.com/exploits/2828","http://doc.emergingthreats.net/2007388"],"2007389":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6115","http://www.milw0rm.com/exploits/2828","http://doc.emergingthreats.net/2007389"],"2007390":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6115","http://www.milw0rm.com/exploits/2828","http://doc.emergingthreats.net/2007390"],"2007391":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6115","http://www.milw0rm.com/exploits/2828","http://doc.emergingthreats.net/2007391"],"2007392":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007392"],"2007393":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007393"],"2007394":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007394"],"2007395":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007395"],"2007396":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007396"],"2007397":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007397"],"2007398":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007398"],"2007399":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007399"],"2007400":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007400"],"2007401":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007401"],"2007402":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007402"],"2007403":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6111","http://www.securityfocus.com/bid/21166","http://doc.emergingthreats.net/2007403"],"2007404":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007404"],"2007405":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007405"],"2007406":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007406"],"2007407":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007407"],"2007408":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007408"],"2007409":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007409"],"2007410":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007410"],"2007411":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007411"],"2007412":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007412"],"2007413":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007413"],"2007414":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007414"],"2007415":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6155","http://www.frsirt.com/english/advisories/2006/4689","http://doc.emergingthreats.net/2007415"],"2007416":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007416"],"2007417":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007417"],"2007418":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007418"],"2007419":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007419"],"2007420":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007420"],"2007421":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007421"],"2007422":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007422"],"2007423":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007423"],"2007424":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007424"],"2007425":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007425"],"2007426":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007426"],"2007427":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007427"],"2007428":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007428"],"2007429":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007429"],"2007430":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007430"],"2007431":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007431"],"2007432":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007432"],"2007433":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007433"],"2007434":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007434"],"2007435":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007435"],"2007436":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007436"],"2007437":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007437"],"2007438":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007438"],"2007439":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007439"],"2007440":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007440"],"2007441":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007441"],"2007442":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007442"],"2007443":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007443"],"2007444":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007444"],"2007445":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007445"],"2007446":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007446"],"2007447":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007447"],"2007448":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007448"],"2007449":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007449"],"2007450":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007450"],"2007451":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6152","http://www.securityfocus.com/bid/21190","http://doc.emergingthreats.net/2007451"],"2007452":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007452"],"2007453":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007453"],"2007454":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007454"],"2007455":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007455"],"2007456":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007456"],"2007457":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007457"],"2007458":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007458"],"2007459":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007459"],"2007460":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007460"],"2007461":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007461"],"2007462":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007462"],"2007463":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6110","http://www.securityfocus.com/archive/1/archive/1/451537/100/100/threaded","http://doc.emergingthreats.net/2007463"],"2007464":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007464"],"2007465":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007465"],"2007466":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007466"],"2007467":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007467"],"2007468":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007468"],"2007469":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007469"],"2007470":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007470"],"2007471":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007471"],"2007472":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007472"],"2007473":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007473"],"2007474":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007474"],"2007475":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6109","http://www.securityfocus.com/bid/21090/info","http://doc.emergingthreats.net/2007475"],"2007476":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007476"],"2007477":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007477"],"2007478":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007478"],"2007479":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007479"],"2007480":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007480"],"2007481":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007481"],"2007482":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007482"],"2007483":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007483"],"2007484":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007484"],"2007485":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007485"],"2007486":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007486"],"2007487":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007487"],"2007488":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007488"],"2007489":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007489"],"2007490":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007490"],"2007491":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007491"],"2007492":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007492"],"2007493":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007493"],"2007494":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007494"],"2007495":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007495"],"2007496":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007496"],"2007497":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007497"],"2007498":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007498"],"2007499":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007499"],"2007500":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007500"],"2007501":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007501"],"2007502":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007502"],"2007503":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007503"],"2007510":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007510"],"2007511":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007511"],"2007512":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007512"],"2007513":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007513"],"2007514":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007514"],"2007515":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007515"],"2007516":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007516"],"2007517":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007517"],"2007518":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007518"],"2007519":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007519"],"2007520":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007520"],"2007521":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007521"],"2007522":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007522"],"2007523":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007523"],"2007524":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007524"],"2007525":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007525"],"2007526":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007526"],"2007527":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007527"],"2007528":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007528"],"2007529":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007529"],"2007530":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007530"],"2007531":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007531"],"2007532":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007532"],"2007533":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007533"],"2007534":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007534"],"2007535":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007535"],"2007536":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007536"],"2007537":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007537"],"2007538":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007538"],"2007539":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007539"],"2007540":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007540"],"2007541":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007541"],"2007542":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007542"],"2007543":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007543"],"2007544":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007544"],"2007545":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007545"],"2007546":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007546"],"2007547":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007547"],"2007548":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007548"],"2007549":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007549"],"2007550":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007550"],"2007551":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007551"],"2007552":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007552"],"2007553":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007553"],"2007554":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007554"],"2007555":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007555"],"2007556":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007556"],"2007557":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007557"],"2007558":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007558"],"2007559":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007559"],"2007560":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007560"],"2007561":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007561"],"2007562":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007562"],"2007563":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6092","http://www.securityfocus.com/bid/21154","http://doc.emergingthreats.net/2007563"],"2007564":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6095","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007564"],"2007565":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6094","http://www.securityfocus.com/bid/21167","http://doc.emergingthreats.net/2007565"],"2007568":["http://doc.emergingthreats.net/2007568"],"2007576":["http://www.youngzsoft.net","http://doc.emergingthreats.net/bin/view/Main/2007576"],"2007577":["http://doc.emergingthreats.net/2007577"],"2007582":["http://doc.emergingthreats.net/2007582"],"2007583":["http://doc.emergingthreats.net/2007583"],"2007592":["http://doc.emergingthreats.net/2007592"],"2007594":["http://www.avira.com/en/threats/section/details/id_vir/1836/tr_banker.delf.df735649.html","http://doc.emergingthreats.net/2007594"],"2007597":["http://doc.emergingthreats.net/2007597"],"2007598":["http://doc.emergingthreats.net/2007598"],"2007599":["http://doc.emergingthreats.net/2007599"],"2007600":["http://doc.emergingthreats.net/2007600"],"2007609":["http://doc.emergingthreats.net/2007609"],"2007611":["http://doc.emergingthreats.net/2007611"],"2007612":["http://doc.emergingthreats.net/2007612"],"2007616":["http://doc.emergingthreats.net/2007616"],"2007617":["http://doc.emergingthreats.net/2007617"],"2007628":["http://doc.emergingthreats.net/2007628"],"2007629":["http://doc.emergingthreats.net/2007629"],"2007630":["http://doc.emergingthreats.net/2007630"],"2007631":["http://doc.emergingthreats.net/2007631"],"2007633":["http://doc.emergingthreats.net/2007633"],"2007638":["http://doc.emergingthreats.net/2007638"],"2007643":["http://doc.emergingthreats.net/2007643"],"2007645":["http://doc.emergingthreats.net/2007645"],"2007648":["http://doc.emergingthreats.net/bin/view/Main/2007648"],"2007650":["http://doc.emergingthreats.net/2007650"],"2007651":["http://www.rfxn.com/vdb.php","http://doc.emergingthreats.net/bin/view/Main/2007651"],"2007659":["http://doc.emergingthreats.net/bin/view/Main/2007659"],"2007660":["http://doc.emergingthreats.net/2007660"],"2007661":["http://doc.emergingthreats.net/2007661"],"2007663":["http://doc.emergingthreats.net/2007663"],"2007666":["http://doc.emergingthreats.net/bin/view/Main/2007666"],"2007667":["http://doc.emergingthreats.net/bin/view/Main/2007667"],"2007668":["http://asert.arbornetworks.com/2007/10/blackenergy-ddos-bot-analysis-available","http://doc.emergingthreats.net/2007668"],"2007689":["http://doc.emergingthreats.net/2007689"],"2007693":["http://doc.emergingthreats.net/2007693"],"2007694":["http://doc.emergingthreats.net/2007694"],"2007695":["http://doc.emergingthreats.net/bin/view/Main/Windows98UA"],"2007697":["http://doc.emergingthreats.net/2007697"],"2007699":["http://doc.emergingthreats.net/2007699"],"2007704":["http://www.kb.cert.org/vuls/id/659761","http://www.milw0rm.com/exploits/4657","http://doc.emergingthreats.net/2007704"],"2007725":["http://doc.emergingthreats.net/bin/view/Main/2007725"],"2007726":["http://doc.emergingthreats.net/bin/view/Main/2007726"],"2007727":["http://doc.emergingthreats.net/bin/view/Main/2007727"],"2007728":["http://trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ%5FPROXY%2EAFV&VSect=T","http://doc.emergingthreats.net/2007728"],"2007742":["http://doc.emergingthreats.net/2007742"],"2007743":["http://www.symantec.com/security_response/writeup.jsp?docid=2006-051916-2518-99&tabid=2","http://www.microsoft.com/security/portal/Entry.aspx?Name=Trojan%3aWin32%2fNebuler.gen!D","http://www.threatexpert.com/report.aspx?md5=e9f1f226ff86e72c558e9a9da32c796d","http://doc.emergingthreats.net/2007743"],"2007746":["http://doc.emergingthreats.net/2007746"],"2007750":["http://doc.emergingthreats.net/bin/view/Main/2007750"],"2007751":["http://doc.emergingthreats.net/2007751"],"2007754":["http://doc.emergingthreats.net/2007754"],"2007757":["http://w3af.sourceforge.net","http://doc.emergingthreats.net/2007757"],"2007758":["http://doc.emergingthreats.net/2007758"],"2007763":["http://doc.emergingthreats.net/2007763"],"2007764":["http://doc.emergingthreats.net/2007764"],"2007765":["http://doc.emergingthreats.net/2007765"],"2007766":["http://doc.emergingthreats.net/2007766"],"2007767":["http://doc.emergingthreats.net/2007767"],"2007768":["http://doc.emergingthreats.net/2007768"],"2007770":["http://doc.emergingthreats.net/2007770"],"2007771":["http://doc.emergingthreats.net/2007771"],"2007774":["http://doc.emergingthreats.net/2007774"],"2007778":["http://doc.emergingthreats.net/2007778"],"2007779":["http://doc.emergingthreats.net/2007779"],"2007787":["http://doc.emergingthreats.net/2007787"],"2007788":["http://www.theinstalls.com","http://doc.emergingthreats.net/bin/view/Main/2007788"],"2007799":["http://doc.emergingthreats.net/bin/view/Main/2007799"],"2007800":["http://www.limewire.com","http://doc.emergingthreats.net/bin/view/Main/2007800"],"2007801":["http://doc.emergingthreats.net/bin/view/Main/2007801"],"2007802":["http://archives.neohapsis.com/archives/snort/2002-04/0448.html","http://grimsping.cjb.net","http://doc.emergingthreats.net/2007802"],"2007821":["http://doc.emergingthreats.net/bin/view/Main/2007821"],"2007822":["http://doc.emergingthreats.net/2007822"],"2007824":["http://doc.emergingthreats.net/2007824"],"2007825":["http://doc.emergingthreats.net/2007825"],"2007826":["http://doc.emergingthreats.net/2007826"],"2007827":["http://doc.emergingthreats.net/2007827"],"2007829":["http://doc.emergingthreats.net/2007829"],"2007831":["http://doc.emergingthreats.net/2007831"],"2007832":["http://doc.emergingthreats.net/2007832"],"2007833":["http://doc.emergingthreats.net/2007833"],"2007836":["http://doc.emergingthreats.net/2007836"],"2007837":["http://doc.emergingthreats.net/2007837"],"2007839":["http://doc.emergingthreats.net/2007839"],"2007840":["http://doc.emergingthreats.net/2007840","http://www.securelist.com/en/blog/434/The_Chinese_bootkit"],"2007843":["http://doc.emergingthreats.net/2007843"],"2007845":["http://doc.emergingthreats.net/2007845"],"2007849":["http://doc.emergingthreats.net/2007849"],"2007854":["http://doc.emergingthreats.net/bin/view/Main/2007854"],"2007856":["http://www.system-defender.com","http://doc.emergingthreats.net/bin/view/Main/2007856"],"2007859":["http://doc.emergingthreats.net/bin/view/Main/2007859"],"2007860":["http://doc.emergingthreats.net/bin/view/Main/2007860"],"2007862":["http://doc.emergingthreats.net/2007862"],"2007863":["http://doc.emergingthreats.net/2007863"],"2007866":["http://doc.emergingthreats.net/2007866"],"2007868":["http://doc.emergingthreats.net/bin/view/Main/2007868"],"2007869":["http://doc.emergingthreats.net/2007869"],"2007880":["http://doc.emergingthreats.net/bin/view/Main/2007880"],"2007881":["http://doc.emergingthreats.net/2007881"],"2007882":["http://doc.emergingthreats.net/2007882"],"2007883":["http://doc.emergingthreats.net/2007883"],"2007884":["http://doc.emergingthreats.net/bin/view/Main/2007884"],"2007885":["http://doc.emergingthreats.net/bin/view/Main/2007885"],"2007893":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785","http://www.securityfocus.com/bid/27749","http://doc.emergingthreats.net/2007893"],"2007894":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785","http://www.securityfocus.com/bid/27749","http://doc.emergingthreats.net/2007894"],"2007895":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785","http://www.securityfocus.com/bid/27749","http://doc.emergingthreats.net/2007895"],"2007896":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785","http://www.securityfocus.com/bid/27749","http://doc.emergingthreats.net/2007896"],"2007897":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785","http://www.securityfocus.com/bid/27749","http://doc.emergingthreats.net/2007897"],"2007900":["http://doc.emergingthreats.net/2007900"],"2007903":["http://www.securityfocus.com/bid/28010","http://www.milw0rm.com/exploits/5193","http://doc.emergingthreats.net/2007903"],"2007908":["http://doc.emergingthreats.net/2007908"],"2007909":["http://doc.emergingthreats.net/2007909"],"2007910":["http://doc.emergingthreats.net/2007910"],"2007912":["http://doc.emergingthreats.net/2007912"],"2007913":["http://doc.emergingthreats.net/2007913"],"2007917":["http://doc.emergingthreats.net/bin/view/Main/TrojanDropper497"],"2007921":["http://doc.emergingthreats.net/bin/view/Main/2007921"],"2007922":["http://doc.emergingthreats.net/2007922"],"2007923":["http://doc.emergingthreats.net/2007923"],"2007924":["http://doc.emergingthreats.net/2007924"],"2007925":["http://doc.emergingthreats.net/2007925"],"2007927":["http://doc.emergingthreats.net/2007927"],"2007928":["http://doc.emergingthreats.net/2007928"],"2007929":["http://doc.emergingthreats.net/bin/view/Main/2007929"],"2007942":["http://doc.emergingthreats.net/bin/view/Main/2007942"],"2007943":["http://doc.emergingthreats.net/bin/view/Main/2007943"],"2007948":["http://doc.emergingthreats.net/bin/view/Main/2007948"],"2007950":["http://doc.emergingthreats.net/2007950"],"2007951":["http://doc.emergingthreats.net/bin/view/Main/2007951"],"2007956":["http://doc.emergingthreats.net/bin/view/Main/2007956"],"2007961":["http://doc.emergingthreats.net/2007961"],"2007973":["http://doc.emergingthreats.net/2007973"],"2007991":["http://doc.emergingthreats.net/bin/view/Main/2007991"],"2007992":["http://doc.emergingthreats.net/2007992"],"2007994":["http://doc.emergingthreats.net/bin/view/Main/2007994"],"2007999":["http://doc.emergingthreats.net/2007999"],"2008003":["http://doc.emergingthreats.net/2008003"],"2008005":["http://doc.emergingthreats.net/2008005"],"2008012":["http://doc.emergingthreats.net/bin/view/Main/2008012"],"2008013":["http://doc.emergingthreats.net/bin/view/Main/2008013"],"2008015":["http://doc.emergingthreats.net/bin/view/Main/2008015"],"2008017":["http://vil.nai.com/vil/content/v_141203.htm","http://doc.emergingthreats.net/2008017"],"2008019":["http://doc.emergingthreats.net/2008019"],"2008020":["http://doc.emergingthreats.net/2008020"],"2008021":["http://doc.emergingthreats.net/2008021"],"2008022":["http://doc.emergingthreats.net/2008022"],"2008023":["http://doc.emergingthreats.net/2008023"],"2008024":["http://doc.emergingthreats.net/2008024"],"2008026":["http://doc.emergingthreats.net/2008026"],"2008027":["http://doc.emergingthreats.net/2008027"],"2008029":["http://doc.emergingthreats.net/2008029"],"2008034":["http://doc.emergingthreats.net/2008034"],"2008038":["http://doc.emergingthreats.net/bin/view/Main/2008038"],"2008039":["http://research.sunbelt-software.com/threatdisplay.aspx?name=EgySpy&threatid=48410","http://doc.emergingthreats.net/2008039"],"2008040":["http://doc.emergingthreats.net/2008040"],"2008043":["http://doc.emergingthreats.net/bin/view/Main/2008043"],"2008044":["http://doc.emergingthreats.net/2008044"],"2008048":["http://doc.emergingthreats.net/bin/view/Main/2008048"],"2008049":["http://doc.emergingthreats.net/2008049"],"2008051":["http://doc.emergingthreats.net/2008051"],"2008052":["http://doc.emergingthreats.net/bin/view/Main/2008052"],"2008070":["http://doc.emergingthreats.net/bin/view/Main/Windows98UA"],"2008073":["http://doc.emergingthreats.net/bin/view/Main/2008073"],"2008084":["http://doc.emergingthreats.net/bin/view/Main/2008084"],"2008085":["http://doc.emergingthreats.net/2008085"],"2008086":["http://doc.emergingthreats.net/2008086"],"2008092":["http://www.upnp-hacks.org/upnp.html","http://doc.emergingthreats.net/2008092"],"2008093":["http://www.upnp-hacks.org/upnp.html","http://doc.emergingthreats.net/2008093"],"2008094":["http://www.upnp-hacks.org/upnp.html","http://doc.emergingthreats.net/2008094"],"2008096":["http://doc.emergingthreats.net/bin/view/Main/2008096"],"2008097":["http://doc.emergingthreats.net/bin/view/Main/2008097"],"2008098":["http://doc.emergingthreats.net/bin/view/Main/2008098"],"2008099":["http://www.securityfocus.com/bid/28546","http://www.milw0rm.com/exploits/5338","http://doc.emergingthreats.net/2008099"],"2008100":["http://doc.emergingthreats.net/2008100"],"2008113":["http://tor.eff.org","http://doc.emergingthreats.net/2008113"],"2008115":["http://tor.eff.org","http://doc.emergingthreats.net/2008115"],"2008116":["http://doc.emergingthreats.net/2008116"],"2008117":["http://doc.emergingthreats.net/2008117"],"2008118":["http://doc.emergingthreats.net/2008118"],"2008119":["http://doc.emergingthreats.net/2008119"],"2008120":["http://doc.emergingthreats.net/2008120"],"2008123":["http://doc.emergingthreats.net/2008123"],"2008124":["http://doc.emergingthreats.net/2008124"],"2008132":["http://doc.emergingthreats.net/2008132"],"2008133":["http://doc.emergingthreats.net/2008133"],"2008134":["http://doc.emergingthreats.net/2008134","http://www.threatexpert.com/report.aspx?md5=ea70e0971cc490a15e53d24ad6564403"],"2008141":["http://doc.emergingthreats.net/2008141"],"2008147":["http://doc.emergingthreats.net/bin/view/Main/2008147"],"2008152":["http://doc.emergingthreats.net/2008152"],"2008156":["http://doc.emergingthreats.net/2008156"],"2008159":["http://doc.emergingthreats.net/2008159"],"2008171":["http://www.securityfocus.com/bid/28745","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0068","http://aluigi.altervista.org/adv/closedviewx-adv.txt","http://doc.emergingthreats.net/2008171"],"2008175":["http://doc.emergingthreats.net/2008175"],"2008176":["http://doc.emergingthreats.net/2008176"],"2008179":["http://sourceforge.net/project/showfiles.php?group_id=149797","http://doc.emergingthreats.net/2008179"],"2008181":["http://doc.emergingthreats.net/bin/view/Main/2008181"],"2008182":["http://doc.emergingthreats.net/2008182"],"2008183":["http://doc.emergingthreats.net/2008183"],"2008184":["http://doc.emergingthreats.net/bin/view/Main/2008184"],"2008185":["http://doc.emergingthreats.net/2008185"],"2008186":["http://owasp.org","http://doc.emergingthreats.net/2008186"],"2008187":["http://www.parosproxy.org","http://doc.emergingthreats.net/2008187"],"2008189":["http://doc.emergingthreats.net/2008189","http://www.secureworks.com/research/threats/botnets2009/","http://securitylabs.websense.com/content/Blogs/2721.aspx"],"2008194":["http://doc.emergingthreats.net/2008194"],"2008199":["http://doc.emergingthreats.net/bin/view/Main/2008199"],"2008200":["http://doc.emergingthreats.net/2008200"],"2008201":["http://doc.emergingthreats.net/2008201"],"2008208":["http://doc.emergingthreats.net/bin/view/Main/2008208"],"2008209":["http://doc.emergingthreats.net/bin/view/Main/2008209"],"2008210":["http://doc.emergingthreats.net/bin/view/Main/2008210"],"2008211":["http://doc.emergingthreats.net/bin/view/Main/2008211"],"2008212":["http://en.wikipedia.org/wiki/Optix_Pro"],"2008214":["http://doc.emergingthreats.net/bin/view/Main/2008214"],"2008215":["http://doc.emergingthreats.net/bin/view/Main/2008215"],"2008216":["http://doc.emergingthreats.net/bin/view/Main/2008216"],"2008218":["http://en.wikipedia.org/wiki/Optix_Pro","http://doc.emergingthreats.net/2008218"],"2008228":["http://doc.emergingthreats.net/bin/view/Main/2008228"],"2008231":["http://doc.emergingthreats.net/bin/view/Main/2008231"],"2008232":["http://doc.emergingthreats.net/2008232"],"2008233":["http://doc.emergingthreats.net/2008233"],"2008238":["http://doc.emergingthreats.net/2008238"],"2008239":["http://doc.emergingthreats.net/2008239"],"2008240":["http://doc.emergingthreats.net/2008240"],"2008242":["http://doc.emergingthreats.net/2008242"],"2008243":["http://doc.emergingthreats.net/2008243"],"2008244":["http://doc.emergingthreats.net/2008244"],"2008248":["http://doc.emergingthreats.net/2008248"],"2008249":["http://doc.emergingthreats.net/2008249"],"2008253":["http://doc.emergingthreats.net/bin/view/Main/2008253"],"2008255":["http://doc.emergingthreats.net/bin/view/Main/2008255"],"2008256":["http://doc.emergingthreats.net/2008256"],"2008257":["http://doc.emergingthreats.net/bin/view/Main/2008257"],"2008259":["http://doc.emergingthreats.net/bin/view/Main/2008259"],"2008262":["http://doc.emergingthreats.net/bin/view/Main/2008262"],"2008264":["http://doc.emergingthreats.net/bin/view/Main/2008264"],"2008266":["http://doc.emergingthreats.net/bin/view/Main/2008266"],"2008271":["http://doc.emergingthreats.net/2008271"],"2008274":["http://doc.emergingthreats.net/2008274"],"2008276":["http://doc.emergingthreats.net/bin/view/Main/2008276"],"2008279":["http://doc.emergingthreats.net/2008279"],"2008282":["http://doc.emergingthreats.net/2008282"],"2008294":["http://doc.emergingthreats.net/2008294"],"2008295":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008295"],"2008297":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008297"],"2008298":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008298"],"2008299":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008299"],"2008300":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008300"],"2008301":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008301"],"2008302":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008302"],"2008303":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008303"],"2008304":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008304"],"2008305":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008305"],"2008306":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008306"],"2008307":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008307"],"2008308":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008308"],"2008309":["http://piotr.trzcionkowski.pl/default.asp?load=/programy/pppgg_protokol.html","http://doc.emergingthreats.net/2008309"],"2008310":["http://doc.emergingthreats.net/2008310"],"2008311":["http://www.watchfire.com/products/appscan/default.aspx","http://doc.emergingthreats.net/2008311"],"2008312":["http://doc.emergingthreats.net/2008312"],"2008317":["http://doc.emergingthreats.net/2008317"],"2008318":["http://www.symantec.com/security_response/writeup.jsp?docid=2007-021714-2431-99&tabid=2","http://doc.emergingthreats.net/bin/view/Main/2008318"],"2008321":["http://doc.emergingthreats.net/2008321"],"2008322":["http://doc.emergingthreats.net/2008322"],"2008327":["http://doc.emergingthreats.net/2008327"],"2008329":["http://www.symantec.com/security_response/writeup.jsp?docid=2008-051910-0118-99&tabid=1","http://doc.emergingthreats.net/2008329"],"2008331":["http://doc.emergingthreats.net/2008331"],"2008333":["http://doc.emergingthreats.net/2008333"],"2008338":["http://doc.emergingthreats.net/2008338"],"2008339":["http://doc.emergingthreats.net/2008339"],"2008340":["http://doc.emergingthreats.net/2008340"],"2008343":["http://doc.emergingthreats.net/bin/view/Main/2008343"],"2008345":["http://doc.emergingthreats.net/2008345"],"2008348":["http://www.soft-central.net/keylog.php","http://doc.emergingthreats.net/2008348"],"2008350":["http://doc.emergingthreats.net/bin/view/Main/2008350"],"2008351":["http://doc.emergingthreats.net/2008351"],"2008355":["http://doc.emergingthreats.net/bin/view/Main/2008355"],"2008360":["http://doc.emergingthreats.net/2008360"],"2008361":["http://doc.emergingthreats.net/bin/view/Main/2008361"],"2008362":["http://code.google.com/p/bsqlbf-v2/","http://doc.emergingthreats.net/2008362"],"2008363":["http://doc.emergingthreats.net/bin/view/Main/2008363"],"2008364":["http://doc.emergingthreats.net/2008364"],"2008365":["http://www.threatexpert.com/report.aspx?md5=00740d7d15862efb30629ab1fd7b8242"],"2008372":["http://doc.emergingthreats.net/2008372"],"2008376":["http://doc.emergingthreats.net/2008376"],"2008377":["http://doc.emergingthreats.net/2008377"],"2008378":["http://doc.emergingthreats.net/bin/view/Main/2008378"],"2008379":["http://doc.emergingthreats.net/2008379"],"2008382":["http://doc.emergingthreats.net/2008382"],"2008383":["http://doc.emergingthreats.net/2008383"],"2008391":["http://doc.emergingthreats.net/bin/view/Main/2008391"],"2008398":["http://doc.emergingthreats.net/2008398"],"2008399":["http://doc.emergingthreats.net/2008399"],"2008400":["http://doc.emergingthreats.net/bin/view/Main/2008400"],"2008402":["http://doc.emergingthreats.net/bin/view/Main/2008402"],"2008406":["http://doc.emergingthreats.net/2008406"],"2008407":["http://www.securityfocus.com/bid/30114","http://downloads.securityfocus.com/vulnerabilities/exploits/30114.html","http://pstgroup.blogspot.com/2008/07/exploitmicrosoft-office-snapshot-viewer.html","http://doc.emergingthreats.net/bin/view/Main/2008407"],"2008408":["http://www.securityfocus.com/bid/30114","http://downloads.securityfocus.com/vulnerabilities/exploits/30114.html","http://pstgroup.blogspot.com/2008/07/exploitmicrosoft-office-snapshot-viewer.html","http://doc.emergingthreats.net/bin/view/Main/2008408"],"2008409":["http://www.securityfocus.com/bid/30114","http://downloads.securityfocus.com/vulnerabilities/exploits/30114.html","http://pstgroup.blogspot.com/2008/07/exploitmicrosoft-office-snapshot-viewer.html","http://doc.emergingthreats.net/bin/view/Main/2008409"],"2008411":["http://doc.emergingthreats.net/2008411"],"2008413":["http://doc.emergingthreats.net/bin/view/Main/2008413"],"2008414":["http://www.hackingexposedcisco.com/?link=tools","http://www.securiteam.com/tools/5EP0F1FEUA.html","http://doc.emergingthreats.net/2008414"],"2008415":["http://www.hackingexposedcisco.com/?link=tools","http://www.securiteam.com/tools/5EP0F1FEUA.html","http://doc.emergingthreats.net/2008415"],"2008416":["http://www.net-square.com/httprint/","http://www.net-square.com/httprint/httprint_paper.html","http://doc.emergingthreats.net/2008416"],"2008417":["http://wapiti.sourceforge.net/","http://doc.emergingthreats.net/2008417"],"2008420":["http://doc.emergingthreats.net/2008420"],"2008422":["http://doc.emergingthreats.net/bin/view/Main/2008422"],"2008423":["http://doc.emergingthreats.net/bin/view/Main/2008423"],"2008424":["http://doc.emergingthreats.net/bin/view/Main/2008424"],"2008427":["http://doc.emergingthreats.net/bin/view/Main/2008427"],"2008428":["http://doc.emergingthreats.net/bin/view/Main/2008428"],"2008429":["http://doc.emergingthreats.net/bin/view/Main/2008429"],"2008433":["http://doc.emergingthreats.net/2008433"],"2008438":["http://doc.emergingthreats.net/bin/view/Main/2008438"],"2008440":["http://doc.emergingthreats.net/bin/view/Main/2008440"],"2008441":["http://doc.emergingthreats.net/2008441"],"2008444":["http://xinn.org/Snort-pwdump4.html","http://doc.emergingthreats.net/bin/view/Main/2008444"],"2008445":["http://xinn.org/Snort-pwdump6.html","http://doc.emergingthreats.net/bin/view/Main/2008445"],"2008453":["http://doc.emergingthreats.net/2008453"],"2008454":["http://doc.emergingthreats.net/2008454"],"2008455":["http://doc.emergingthreats.net/2008455"],"2008457":["http://research.sunbelt-software.com/threatdisplay.aspx?name=Deepdo%20Toolbar&threatid=129378","http://doc.emergingthreats.net/2008457"],"2008458":["http://doc.emergingthreats.net/2008458"],"2008460":["http://doc.emergingthreats.net/bin/view/Main/2008460"],"2008461":["http://research.sunbelt-software.com/threatdisplay.aspx?name=Trojan.Win32.BHO.egw&threatid=313636","http://doc.emergingthreats.net/2008461"],"2008463":["http://doc.emergingthreats.net/bin/view/Main/2008463"],"2008464":["http://doc.emergingthreats.net/bin/view/Main/2008464"],"2008467":["http://doc.emergingthreats.net/2008467"],"2008472":["http://doc.emergingthreats.net/2008472"],"2008477":["http://doc.emergingthreats.net/2008477"],"2008483":["http://doc.emergingthreats.net/2008483"],"2008488":["http://doc.emergingthreats.net/bin/view/Main/2008488"],"2008494":["http://doc.emergingthreats.net/bin/view/Main/2008494"],"2008495":["http://doc.emergingthreats.net/bin/view/Main/2008495"],"2008504":["http://doc.emergingthreats.net/bin/view/Main/2008504"],"2008510":["http://doc.emergingthreats.net/bin/view/Main/2008510"],"2008513":["http://doc.emergingthreats.net/bin/view/Main/2008513"],"2008514":["http://doc.emergingthreats.net/bin/view/Main/2008514"],"2008517":["http://msdn.microsoft.com/en-us/library/ms190693.aspx","http://doc.emergingthreats.net/bin/view/Main/2008517"],"2008518":["http://msdn.microsoft.com/en-us/library/ms190693.aspx","http://doc.emergingthreats.net/bin/view/Main/2008518"],"2008526":["http://www.go2linux.org/smap-find-voip-enabled-devices","http://doc.emergingthreats.net/2008526"],"2008527":["http://doc.emergingthreats.net/2008527"],"2008537":["http://www.ujeni.murkyroc.com/hmap/","http://doc.emergingthreats.net/2008537"],"2008538":["http://sqlmap.sourceforge.net","http://doc.emergingthreats.net/2008538"],"2008541":["http://doc.emergingthreats.net/2008541"],"2008542":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-2639","http://www.digitalbond.com/index.php/2008/09/08/ids-signature-for-citect-vuln/","http://digitalbond.com/tools/quickdraw/vulnerability-rules"],"2008544":["http://doc.emergingthreats.net/bin/view/Main/2008544"],"2008545":["http://doc.emergingthreats.net/2008545"],"2008550":["http://doc.emergingthreats.net/2008550"],"2008551":["http://doc.emergingthreats.net/2008551"],"2008556":["http://doc.emergingthreats.net/bin/view/Main/2008556"],"2008558":["http://doc.emergingthreats.net/2008558"],"2008559":["http://doc.emergingthreats.net/bin/view/Main/2008559"],"2008560":["http://packetstormsecurity.nl/filedesc/nng-4.13r-public.rar.html","http://doc.emergingthreats.net/2008560"],"2008561":["http://www.aanval.com","http://doc.emergingthreats.net/bin/view/Main/2008561"],"2008564":["http://doc.emergingthreats.net/bin/view/Main/2008564"],"2008567":["http://doc.emergingthreats.net/2008567"],"2008568":["http://sourceforge.net/projects/voiper","http://doc.emergingthreats.net/2008568"],"2008569":["http://www.ossec.net","http://doc.emergingthreats.net/2008569"],"2008570":["http://base.secureideas.net","http://doc.emergingthreats.net/bin/view/Main/2008570"],"2008571":["http://www.acunetix.com/","http://doc.emergingthreats.net/2008571"],"2008577":["http://sourceforge.net/projects/voiper","http://doc.emergingthreats.net/2008577"],"2008578":["http://blog.sipvicious.org","http://doc.emergingthreats.net/2008578"],"2008579":["http://sourceforge.net/projects/sipp/","http://doc.emergingthreats.net/2008579"],"2008581":["http://wiki.theory.org/BitTorrentDraftDHTProtocol","http://doc.emergingthreats.net/bin/view/Main/2008581"],"2008582":["http://wiki.theory.org/BitTorrentDraftDHTProtocol","http://doc.emergingthreats.net/bin/view/Main/2008582"],"2008583":["http://wiki.theory.org/BitTorrentDraftDHTProtocol","http://doc.emergingthreats.net/bin/view/Main/2008583"],"2008584":["http://wiki.theory.org/BitTorrentDraftDHTProtocol","http://doc.emergingthreats.net/bin/view/Main/2008584"],"2008585":["http://wiki.theory.org/BitTorrentDraftDHTProtocol","http://doc.emergingthreats.net/bin/view/Main/2008585"],"2008586":["http://doc.emergingthreats.net/2008586"],"2008591":["http://aresgalaxy.sourceforge.net","http://doc.emergingthreats.net/bin/view/Main/2008591"],"2008592":["http://doc.emergingthreats.net/2008592"],"2008594":["http://doc.emergingthreats.net/2008594"],"2008598":["http://sipsak.org/","http://doc.emergingthreats.net/2008598"],"2008603":["http://doc.emergingthreats.net/bin/view/Main/2008603"],"2008605":["http://www.darknet.org.uk/2007/03/stompy-the-web-application-session-analyzer-tool/","http://doc.emergingthreats.net/2008605"],"2008606":["http://sourceforge.net/projects/enumiax/","http://doc.emergingthreats.net/2008606"],"2008609":["http://www.security-database.com/toolswatch/SiVus-VoIP-Security-Scanner-1-09.html","http://www.vopsecurity.org/","http://doc.emergingthreats.net/2008609"],"2008610":["http://www.security-database.com/toolswatch/SiVus-VoIP-Security-Scanner-1-09.html","http://www.vopsecurity.org/","http://doc.emergingthreats.net/2008610"],"2008611":["http://www.slsknet.org","http://doc.emergingthreats.net/2008611"],"2008614":["http://secunia.com/Advisories/32027/","http://www.milw0rm.com/exploits/6605","http://doc.emergingthreats.net/2008614"],"2008615":["http://secunia.com/Advisories/32049/","http://www.milw0rm.com/exploits/6599","http://doc.emergingthreats.net/2008615"],"2008616":["http://secunia.com/Advisories/31969/","http://www.milw0rm.com/exploits/6613","http://doc.emergingthreats.net/2008616"],"2008617":["http://www.sensepost.com/research/wikto/WiktoDoc1-51.htm","http://doc.emergingthreats.net/2008617"],"2008625":["http://doc.emergingthreats.net/bin/view/Main/2008625"],"2008626":["http://doc.emergingthreats.net/2008626"],"2008627":["http://www.computec.ch/projekte/httprecon/","http://doc.emergingthreats.net/2008627"],"2008628":["http://www.owasp.org/index.php/Category%3aOWASP_WSFuzzer_Project","http://doc.emergingthreats.net/2008628"],"2008629":["http://www.sensepost.com/research/wikto/WiktoDoc1-51.htm","http://doc.emergingthreats.net/2008629"],"2008639":["http://doc.emergingthreats.net/2008639"],"2008640":["http://www.hackingvoip.com/sec_tools.html","http://doc.emergingthreats.net/2008640"],"2008641":["http://www.hackingvoip.com/sec_tools.html","http://doc.emergingthreats.net/2008641"],"2008643":["http://doc.emergingthreats.net/bin/view/Main/2008643"],"2008644":["http://doc.emergingthreats.net/2008644"],"2008649":["http://www.milw0rm.com/exploits/6694","http://secunia.com/advisories/32149/","http://doc.emergingthreats.net/2008649"],"2008650":["http://www.milw0rm.com/exploits/6696","http://secunia.com/advisories/32139/","http://doc.emergingthreats.net/2008650"],"2008653":["http://www.milw0rm.com/exploits/6697","http://secunia.com/Advisories/32129/","http://doc.emergingthreats.net/2008653"],"2008654":["http://www.owasp.org/index.php/Category%3aOWASP_SQLiX_Project","http://doc.emergingthreats.net/2008654"],"2008657":["http://doc.emergingthreats.net/bin/view/Main/2008657"],"2008658":["http://doc.emergingthreats.net/bin/view/Main/2008658"],"2008663":["http://doc.emergingthreats.net/bin/view/Main/2008663"],"2008665":["http://doc.emergingthreats.net/2008665"],"2008668":["http://www.securityfocus.com/bid/31773","http://www.milw0rm.com/exploits/6760","http://doc.emergingthreats.net/2008668"],"2008669":["http://www.securityfocus.com/bid/31771","http://www.milw0rm.com/exploits/6758","http://doc.emergingthreats.net/2008669"],"2008672":["http://secunia.com/advisories/32268","http://www.exploit-db.com/exploits/6754/","http://doc.emergingthreats.net/2008672"],"2008679":["http://secunia.com/advisories/32308/","http://milw0rm.com/exploits/6762","http://doc.emergingthreats.net/2008679"],"2008680":["http://secunia.com/advisories/32308/","http://milw0rm.com/exploits/6762","http://doc.emergingthreats.net/2008680"],"2008683":["http://www.securityfocus.com/bid/31814","http://www.milw0rm.com/exploits/6793","http://doc.emergingthreats.net/2008683"],"2008684":["http://www.securityfocus.com/bid/30692","http://doc.emergingthreats.net/2008684"],"2008685":["http://www.secunia.com/advisories/32321","http://www.exploit-db.com/exploits/6792/","http://doc.emergingthreats.net/2008685"],"2008686":["http://secunia.com/Advisories/32333/","http://milw0rm.com/exploits/6780","http://doc.emergingthreats.net/2008686"],"2008688":["http://secunia.com/advisories/32347/","http://www.milw0rm.com/exploits/6795","http://doc.emergingthreats.net/2008688"],"2008690":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008690"],"2008691":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008691"],"2008692":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008692"],"2008693":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008693"],"2008694":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008694"],"2008696":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008696"],"2008697":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008697"],"2008698":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008698"],"2008699":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008699"],"2008700":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008700"],"2008701":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008701"],"2008702":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008702"],"2008703":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008703"],"2008704":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008704"],"2008705":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008705"],"2008706":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008706"],"2008707":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008707"],"2008708":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008708"],"2008709":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008709"],"2008710":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008710"],"2008712":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008712"],"2008713":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008713"],"2008714":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008714"],"2008715":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008715"],"2008717":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008717"],"2008718":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008718"],"2008719":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008719"],"2008720":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008720"],"2008721":["http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4250","http://www.kb.cert.org/vuls/id/827267","http://doc.emergingthreats.net/bin/view/Main/2008721"],"2008722":["http://www.securityfocus.com/bid/28852","http://doc.emergingthreats.net/2008722"],"2008723":["http://www.milw0rm.com/exploits/6799","http://www.securityfocus.com/bid/31854","http://doc.emergingthreats.net/2008723"],"2008724":["http://www.securityfocus.com/bid/31852","http://doc.emergingthreats.net/2008724"],"2008725":["http://milw0rm.com/exploits/6777","http://secunia.com/advisories/32336","http://doc.emergingthreats.net/2008725"],"2008726":["http://doc.emergingthreats.net/2008726"],"2008727":["http://doc.emergingthreats.net/2008727"],"2008729":["http://www.scrt.ch/pages_en/minimysqlator.html","http://doc.emergingthreats.net/2008729"],"2008732":["http://doc.emergingthreats.net/2008732","http://www.threatexpert.com/report.aspx?md5=4d1df7240837832853c8b87606f3dfc2"],"2008734":["http://doc.emergingthreats.net/bin/view/Main/2008734"],"2008735":["http://doc.emergingthreats.net/bin/view/Main/2008735"],"2008737":["http://doc.emergingthreats.net/bin/view/Main/2008737"],"2008738":["http://doc.emergingthreats.net/bin/view/Main/2008738"],"2008739":["http://doc.emergingthreats.net/bin/view/Main/2008739"],"2008749":["http://doc.emergingthreats.net/bin/view/Main/2008749"],"2008752":["http://doc.emergingthreats.net/2008752"],"2008754":["http://doc.emergingthreats.net/bin/view/Main/2008754"],"2008756":["http://doc.emergingthreats.net/bin/view/Main/2008756"],"2008759":["http://doc.emergingthreats.net/bin/view/Main/2008759"],"2008765":["http://doc.emergingthreats.net/2008765"],"2008767":["http://doc.emergingthreats.net/2008767"],"2008782":["http://www.win-rar.com/index.php?id=24&kb=1&kb_article_id=162","http://doc.emergingthreats.net/2008782"],"2008785":["http://secunia.com/advisories/32413/","http://milw0rm.com/exploits/6856","http://doc.emergingthreats.net/2008785"],"2008786":["http://milw0rm.com/exploits/6839","http://secunia.com/advisories/32373","http://doc.emergingthreats.net/2008786"],"2008787":["http://milw0rm.com/exploits/6854","http://secunia.com/advisories/32431","http://doc.emergingthreats.net/2008787"],"2008788":["http://www.securityfocus.com/bid/29344","http://milw0rm.com/exploits/6856","http://doc.emergingthreats.net/2008788"],"2008789":["http://www.securityfocus.com/bid/31907","http://milw0rm.com/exploits/6828","http://doc.emergingthreats.net/2008789"],"2008790":["http://www.securityfocus.com/bid/31987","http://milw0rm.com/exploits/6878","http://doc.emergingthreats.net/2008790"],"2008791":["http://www.securityfocus.com/bid/31984","http://milw0rm.com/exploits/6875","http://doc.emergingthreats.net/2008791"],"2008793":["http://secunia.com/advisories/32552/","http://milw0rm.com/exploits/6910","http://doc.emergingthreats.net/2008793"],"2008794":["http://www.teamviewer.com","http://en.wikipedia.org/wiki/TeamViewer","http://doc.emergingthreats.net/2008794"],"2008795":["http://www.teamviewer.com","http://en.wikipedia.org/wiki/TeamViewer","http://doc.emergingthreats.net/2008795"],"2008797":["http://doc.emergingthreats.net/bin/view/Main/2008797"],"2008798":["http://doc.emergingthreats.net/bin/view/Main/2008798"],"2008813":["http://secunia.com/advisories/32477/","http://milw0rm.com/exploits/6885","http://doc.emergingthreats.net/2008813"],"2008815":["http://secunia.com/advisories/32536/","http://milw0rm.com/exploits/6903","http://doc.emergingthreats.net/2008815"],"2008816":["http://secunia.com/advisories/32536/","http://milw0rm.com/exploits/6915","http://doc.emergingthreats.net/2008816"],"2008817":["http://secunia.com/advisories/32504/","http://milw0rm.com/exploits/6938","http://doc.emergingthreats.net/2008817"],"2008818":["http://secunia.com/advisories/32504/","http://milw0rm.com/exploits/6943","http://doc.emergingthreats.net/2008818"],"2008819":["http://secunia.com/advisories/32504/","http://milw0rm.com/exploits/6944","http://doc.emergingthreats.net/2008819"],"2008821":["http://secunia.com/advisories/32503/","http://milw0rm.com/exploits/6988","http://doc.emergingthreats.net/2008821"],"2008822":["http://secunia.com/advisories/32523/","http://www.exploit-db.com/exploits/6980/","http://doc.emergingthreats.net/2008822"],"2008823":["http://secunia.com/advisories/32563/","http://milw0rm.com/exploits/6997","http://doc.emergingthreats.net/2008823"],"2008827":["http://secunia.com/advisories/32561/","http://milw0rm.com/exploits/7029","http://doc.emergingthreats.net/2008827"],"2008828":["http://secunia.com/advisories/32568/","http://milw0rm.com/exploits/7027","http://doc.emergingthreats.net/2008828"],"2008829":["http://secunia.com/advisories/32591/","http://milw0rm.com/exploits/7035","http://doc.emergingthreats.net/2008829"],"2008830":["http://secunia.com/advisories/32593/","http://milw0rm.com/exploits/7016","http://doc.emergingthreats.net/2008830"],"2008831":["http://secunia.com/advisories/32593/","http://milw0rm.com/exploits/7016","http://doc.emergingthreats.net/2008831"],"2008832":["http://secunia.com/advisories/32628/","http://bugreport.ir/index_57.htm","http://doc.emergingthreats.net/2008832"],"2008833":["http://secunia.com/advisories/32628/","http://bugreport.ir/index_57.htm","http://doc.emergingthreats.net/2008833"],"2008834":["http://milw0rm.com/exploits/7014","http://secunia.com/Advisories/32595/","http://doc.emergingthreats.net/2008834"],"2008835":["http://secunia.com/advisories/32636/","http://www.exploit-db.com/exploits/7053/","http://doc.emergingthreats.net/2008835"],"2008837":["http://www.securityfocus.com/bid/32043","http://frsirt.com/english/advisories/2008/2976","http://doc.emergingthreats.net/2008837"],"2008838":["http://frsirt.com/english/advisories/2008/3079","http://www.securityfocus.com/bid/32191","http://doc.emergingthreats.net/2008838"],"2008847":["http://doc.emergingthreats.net/bin/view/Main/2008847"],"2008849":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008849"],"2008850":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008850"],"2008851":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008851"],"2008852":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008852"],"2008853":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008853"],"2008854":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008854"],"2008855":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008855"],"2008856":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008856"],"2008857":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008857"],"2008858":["http://www.securityfocus.com/bid/32180","http://milw0rm.com/exploits/7031","http://doc.emergingthreats.net/2008858"],"2008859":["http://www.threatexpert.com/report.aspx?md5=e491d25d82f4928138a0d8b3a6365c39","http://www.threatexpert.com/reports.aspx?find=%2Fjutr%2F","http://doc.emergingthreats.net/2008859"],"2008860":["http://doc.emergingthreats.net/bin/view/Main/2008860"],"2008863":["http://www.threatexpert.com/reports.aspx?find=apstpldr.dll.html","http://doc.emergingthreats.net/2008863"],"2008864":["http://doc.emergingthreats.net/2008864"],"2008865":["http://frsirt.com/english/advisories/2008/3118","http://milw0rm.com/exploits/7098","http://doc.emergingthreats.net/2008865"],"2008866":["http://www.securityfocus.com/bid/32311","http://milw0rm.com/exploits/7128","http://doc.emergingthreats.net/2008866"],"2008867":["http://www.securityfocus.com/bid/32300","http://doc.emergingthreats.net/2008867"],"2008873":["http://secunia.com/advisories/32741/","http://packetstorm.linuxsecurity.com/0811-exploits/wholesale-sql.txt","http://doc.emergingthreats.net/2008873"],"2008875":["http://secunia.com/advisories/32784/","http://www.milw0rm.com/exploits/7186","http://doc.emergingthreats.net/2008875"],"2008878":["http://secunia.com/advisories/32745/","http://milw0rm.com/exploits/7155","http://doc.emergingthreats.net/2008878"],"2008880":["http://www.securityfocus.com/bid/32360","http://milw0rm.com/exploits/7159","http://doc.emergingthreats.net/2008880"],"2008881":["http://www.securityfocus.com/bid/32360","http://milw0rm.com/exploits/7159","http://doc.emergingthreats.net/2008881"],"2008882":["http://www.securityfocus.com/bid/32360","http://milw0rm.com/exploits/7159","http://doc.emergingthreats.net/2008882"],"2008883":["http://secunia.com/advisories/32822/","http://packetstormsecurity.org/0811-exploits/easyeditcms-sql.txt","http://doc.emergingthreats.net/2008883"],"2008884":["http://secunia.com/advisories/32822/","http://packetstormsecurity.org/0811-exploits/easyeditcms-sql.txt","http://doc.emergingthreats.net/2008884"],"2008885":["http://secunia.com/advisories/32822/","http://packetstormsecurity.org/0811-exploits/easyeditcms-sql.txt","http://doc.emergingthreats.net/2008885"],"2008892":["http://doc.emergingthreats.net/2008892"],"2008893":["http://doc.emergingthreats.net/2008893"],"2008896":["http://www.milw0rm.com/exploits/7215","http://www.securityfocus.com/bid/32454","http://doc.emergingthreats.net/2008896"],"2008897":["http://www.exploit-db.com/exploits/7204/","http://secunia.com/advisories/32824/","http://doc.emergingthreats.net/2008897"],"2008898":["http://www.exploit-db.com/exploits/7204/","http://secunia.com/advisories/32824/","http://doc.emergingthreats.net/2008898"],"2008908":["http://doc.emergingthreats.net/2008908","http://www.threatexpert.com/report.aspx?md5=3a7f11fbaf815cd2338d633de175e252"],"2008912":["http://doc.emergingthreats.net/bin/view/Main/2008912"],"2008913":["http://doc.emergingthreats.net/bin/view/Main/2008913"],"2008914":["http://doc.emergingthreats.net/bin/view/Main/2008914"],"2008916":["http://doc.emergingthreats.net/bin/view/Main/2008916"],"2008919":["http://doc.emergingthreats.net/bin/view/Main/2008919"],"2008921":["http://www.securityfocus.com/bid/32458","http://doc.emergingthreats.net/2008921"],"2008924":["http://www.securityfocus.com/bid/32504","http://milw0rm.com/exploits/7250","http://doc.emergingthreats.net/2008924"],"2008926":["http://www.milw0rm.com/exploits/7253","http://www.securityfocus.com/bid/32512","http://doc.emergingthreats.net/2008926"],"2008927":["http://www.exploit-db.com/exploits/7294/","http://secunia.com/advisories/32910/","http://doc.emergingthreats.net/2008927"],"2008928":["http://www.securityfocus.com/bid/32556","http://milw0rm.com/exploits/7311","http://doc.emergingthreats.net/2008928"],"2008929":["http://secunia.com/Advisories/32870/","http://milw0rm.com/exploits/7317","http://doc.emergingthreats.net/2008929"],"2008930":["http://milw0rm.com/exploits/7239","http://www.securityfocus.com/bid/32488","http://doc.emergingthreats.net/2008930"],"2008931":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5267","http://milw0rm.com/exploits/5776","http://www.securityfocus.com/bid/29642","http://doc.emergingthreats.net/2008931"],"2008932":["http://www.milw0rm.com/exploits/7323","http://www.securityfocus.com/bid/32589","http://doc.emergingthreats.net/2008932"],"2008933":["http://www.milw0rm.com/exploits/7328","http://www.securityfocus.com/bid/32590","http://doc.emergingthreats.net/2008933"],"2008936":["http://www.milw0rm.com/exploits/7339","http://www.securityfocus.com/bid/32641","http://doc.emergingthreats.net/2008936"],"2008937":["http://www.milw0rm.com/exploits/7344","http://secunia.com/advisories/32982/","http://doc.emergingthreats.net/2008937"],"2008938":["http://secunia.com/advisories/32986/","http://milw0rm.com/exploits/7335","http://doc.emergingthreats.net/2008938"],"2008939":["http://www.milw0rm.com/exploits/7337","http://www.securityfocus.com/bid/32635","http://doc.emergingthreats.net/2008939"],"2008941":["http://doc.emergingthreats.net/bin/view/Main/2008941"],"2008942":["http://doc.emergingthreats.net/2008942"],"2008943":["http://www.threatexpert.com/reports.aspx?find=9kgen_up.int","http://doc.emergingthreats.net/2008943"],"2008944":["http://www.threatexpert.com/reports.aspx?find=%2Fcrcmds%2Fmain","http://doc.emergingthreats.net/2008944"],"2008945":["http://doc.emergingthreats.net/2008945"],"2008953":["http://doc.emergingthreats.net/bin/view/Main/2008953"],"2008955":["http://doc.emergingthreats.net/2008955"],"2008956":["http://doc.emergingthreats.net/bin/view/Main/2008956"],"2008958":["http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20081231","http://doc.emergingthreats.net/2008958"],"2008961":["http://milw0rm.com/exploits/7392","http://www.securityfocus.com/bid/32705","http://doc.emergingthreats.net/2008961"],"2008974":["http://doc.emergingthreats.net/bin/view/Main/2008974"],"2008975":["http://doc.emergingthreats.net/2008975"],"2008983":["http://www.bitdefender.com/VIRUS-1000328-en--Trojan.Pws.Wow.NCY.html","http://doc.emergingthreats.net/bin/view/Main/2008983"],"2008985":["http://doc.emergingthreats.net/2008985"],"2008987":["http://doc.emergingthreats.net/2008987"],"2008988":["http://doc.emergingthreats.net/2008988"],"2008989":["http://doc.emergingthreats.net/2008989"],"2008992":["http://milw0rm.com/exploits/7417","http://www.securityfocus.com/bid/32774","http://doc.emergingthreats.net/2008992"],"2008994":["http://secunia.com/advisories/33019/","http://milw0rm.com/exploits/7346","http://doc.emergingthreats.net/2008994"],"2008995":["http://secunia.com/advisories/33074/","http://milw0rm.com/exploits/7413","http://doc.emergingthreats.net/2008995"],"2008997":["http://milw0rm.com/exploits/7484","http://www.securityfocus.com/bid/32856","http://doc.emergingthreats.net/2008997"],"2008998":["http://secunia.com/advisories/33199/","http://packetstorm.linuxsecurity.com/0812-exploits/evimgibi-sql.txt","http://doc.emergingthreats.net/2008998"],"2009000":["http://www.milw0rm.com/exploits/7541","http://www.securityfocus.com/bid/32962","http://doc.emergingthreats.net/2009000"],"2009005":["http://research.sunbelt-software.com/threatdisplay.aspx?name=AdWare.Win32.Simbar.a&threatid=427805","http://vil.nai.com/vil/content/v_131206.htm","http://doc.emergingthreats.net/bin/view/Main/2009005"],"2009009":["http://secunia.com/advisories/33222","http://www.securityfocus.com/bid/32929","http://doc.emergingthreats.net/2009009"],"2009010":["http://www.milw0rm.com/exploits/7543","http://www.securityfocus.com/bid/32966","http://doc.emergingthreats.net/2009010"],"2009011":["http://secunia.com/advisories/33208/","http://milw0rm.com/exploits/7502","http://doc.emergingthreats.net/2009011"],"2009012":["http://secunia.com/advisories/33208/","http://milw0rm.com/exploits/7502","http://doc.emergingthreats.net/2009012"],"2009013":["http://www.securityfocus.com/bid/32829","http://packetstormsecurity.org/0808-exploits/webphotopro-sql.txt","http://doc.emergingthreats.net/2009013"],"2009014":["http://www.securityfocus.com/bid/32829","http://packetstormsecurity.org/0808-exploits/webphotopro-sql.txt","http://doc.emergingthreats.net/2009014"],"2009015":["http://www.securityfocus.com/bid/32829","http://packetstormsecurity.org/0808-exploits/webphotopro-sql.txt","http://doc.emergingthreats.net/2009015"],"2009016":["http://www.securityfocus.com/bid/32829","http://packetstormsecurity.org/0808-exploits/webphotopro-sql.txt","http://doc.emergingthreats.net/2009016"],"2009017":["http://www.securityfocus.com/bid/32829","http://packetstormsecurity.org/0808-exploits/webphotopro-sql.txt","http://doc.emergingthreats.net/2009017"],"2009020":["http://doc.emergingthreats.net/2009020"],"2009022":["http://www.bitdefender.com/VIRUS-1000328-en--Trojan.Pws.Wow.NCY.html","http://doc.emergingthreats.net/2009022"],"2009024":["http://www.f-secure.com/weblog/archives/00001584.html","http://doc.emergingthreats.net/bin/view/Main/2009024"],"2009027":["http://doc.emergingthreats.net/bin/view/Main/2009027"],"2009028":["http://doc.emergingthreats.net/bin/view/Main/2009028"],"2009029":["http://doc.emergingthreats.net/2009029"],"2009038":["http://sqlninja.sourceforge.net/index.html","http://doc.emergingthreats.net/2009038"],"2009039":["http://sqlninja.sourceforge.net/index.html"],"2009040":["http://sqlninja.sourceforge.net/index.html","http://doc.emergingthreats.net/2009040"],"2009041":["http://sqlninja.sourceforge.net/index.html","http://doc.emergingthreats.net/2009041"],"2009042":["http://sqlninja.sourceforge.net/index.html","http://doc.emergingthreats.net/2009042"],"2009043":["http://sqlninja.sourceforge.net/index.html","http://doc.emergingthreats.net/2009043"],"2009044":["http://sqlninja.sourceforge.net/index.html","http://doc.emergingthreats.net/2009044"],"2009045":["http://www.securityfocus.com/bid/32851","http://milw0rm.com/exploits/7483","http://doc.emergingthreats.net/2009045"],"2009048":["http://milw0rm.com/exploits/7610","http://www.securityfocus.com/bid/33040","http://doc.emergingthreats.net/2009048"],"2009049":["http://secunia.com/advisories/33167/","http://milw0rm.com/exploits/7464","http://doc.emergingthreats.net/2009049"],"2009050":["http://secunia.com/advisories/33167/","http://milw0rm.com/exploits/7464","http://doc.emergingthreats.net/2009050"],"2009051":["http://www.securityfocus.com/bid/25541","http://doc.emergingthreats.net/2009051"],"2009053":["http://securityvulns.com/Odocument913.html","http://doc.emergingthreats.net/2009053"],"2009054":["http://doc.emergingthreats.net/2009054"],"2009055":["http://milw0rm.com/exploits/7544","http://www.securityfocus.com/bid/32970","http://doc.emergingthreats.net/2009055"],"2009056":["http://secunia.com/advisories/33373/","http://milw0rm.com/exploits/7627","http://doc.emergingthreats.net/2009056"],"2009057":["http://secunia.com/advisories/33363/","http://milw0rm.com/exploits/7641","http://doc.emergingthreats.net/2009057"],"2009058":["http://www.securityfocus.com/bid/33097","http://milw0rm.com/exploits/7659","http://doc.emergingthreats.net/2009058"],"2009065":["http://secunia.com/Advisories/32408","http://milw0rm.com/exploits/6833","http://doc.emergingthreats.net/2009065"],"2009066":["http://secunia.com/Advisories/32/32408","http://milw0rm.com/exploits/6833","http://doc.emergingthreats.net/2009066"],"2009067":["http://www.securityfocus.com/bid/33156","http://milw0rm.com/exploits/7697","http://doc.emergingthreats.net/2009067"],"2009068":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5841","http://www.securityfocus.com/bid/31340","http://milw0rm.com/exploits/6540","http://doc.emergingthreats.net/2009068"],"2009069":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5841","http://www.securityfocus.com/bid/31340","http://milw0rm.com/exploits/6540","http://doc.emergingthreats.net/2009069"],"2009070":["http://www.securityfocus.com/bid/33092","http://doc.emergingthreats.net/2009070"],"2009071":["http://www.securityfocus.com/bid/33092","http://doc.emergingthreats.net/2009071"],"2009073":["http://www.securityfocus.com/bid/33103","http://doc.emergingthreats.net/2009073"],"2009074":["http://www.securityfocus.com/bid/33103","http://doc.emergingthreats.net/2009074"],"2009075":["http://www.securityfocus.com/bid/33103","http://doc.emergingthreats.net/2009075"],"2009078":["http://research.sunbelt-software.com/threatdisplay.aspx?name=Backdoor.Win32.LanFiltrator.3b&threatid=51642","http://doc.emergingthreats.net/2009078"],"2009081":["http://doc.emergingthreats.net/2009081"],"2009085":["http://secunia.com/advisories/33386/","http://milw0rm.com/exploits/7687","http://doc.emergingthreats.net/2009085"],"2009087":["http://secunia.com/advisories/33386/","http://milw0rm.com/exploits/7687","http://doc.emergingthreats.net/2009087"],"2009089":["http://secunia.com/advisories/33386/","http://milw0rm.com/exploits/7687","http://doc.emergingthreats.net/2009089"],"2009090":["http://doc.emergingthreats.net/2009090"],"2009097":["http://doc.emergingthreats.net/2009097"],"2009098":["http://doc.emergingthreats.net/2009098"],"2009099":["http://xunlei.com","http://en.wikipedia.org/wiki/Xunlei","http://doc.emergingthreats.net/2009099"],"2009100":["http://secunia.com/advisories/33474/","http://milw0rm.com/exploits/7730","http://doc.emergingthreats.net/2009100"],"2009103":["http://www.securityfocus.com/bid/33301","http://milw0rm.com/exploits/7798","http://doc.emergingthreats.net/2009103"],"2009108":["http://doc.emergingthreats.net/2009108"],"2009117":["http://www.securityfocus.com/bid/31717","http://www.milw0rm.com/exploits/6728","http://doc.emergingthreats.net/2009117"],"2009118":["http://www.securityfocus.com/bid/31352","http://www.milw0rm.com/exploits/6549","http://doc.emergingthreats.net/2009118"],"2009119":["http://www.securityfocus.com/bid/31352","http://www.milw0rm.com/exploits/6549","http://doc.emergingthreats.net/2009119"],"2009122":["http://www.milw0rm.com/exploits/7877","http://secunia.com/Advisories/33654/","http://doc.emergingthreats.net/2009122"],"2009125":["http://doc.emergingthreats.net/2009125","http://www.secureworks.com/cyber-threat-intelligence/threats/secrets-of-the-comfoo-masters/"],"2009127":["http://doc.emergingthreats.net/2009127"],"2009128":["http://doc.emergingthreats.net/2009128"],"2009130":["http://doc.emergingthreats.net/2009130"],"2009131":["http://doc.emergingthreats.net/2009131"],"2009137":["http://secunia.com/advisories/31484/","http://packetstorm.linuxsecurity.com/0808-exploits/phprealty-sql.txt","http://doc.emergingthreats.net/2009137"],"2009138":["http://milw0rm.com/exploits/7928","http://www.securityfocus.com/bid/33535","http://doc.emergingthreats.net/2009138"],"2009139":["http://secunia.com/advisories/31626/","http://milw0rm.com/exploits/6044","http://doc.emergingthreats.net/2009139"],"2009140":["http://milw0rm.com/exploits/7925","http://www.securityfocus.com/bid/33540","http://doc.emergingthreats.net/2009140"],"2009144":["http://doc.emergingthreats.net/2009144"],"2009145":["http://www.milw0rm.com/exploits/7977","http://www.securityfocus.com/bid/33601","http://doc.emergingthreats.net/2009145"],"2009152":["http://doc.emergingthreats.net/2009152"],"2009153":["http://doc.emergingthreats.net/2009153"],"2009154":["http://doc.emergingthreats.net/2009154"],"2009155":["http://doc.emergingthreats.net/2009155"],"2009156":["http://www.virustotal.com/analisis/a4a854e56ecc0a54204fc3b043c63094","http://doc.emergingthreats.net/2009156"],"2009157":["http://doc.emergingthreats.net/2009157"],"2009158":["http://www.scrt.ch/pages_en/outils.html"],"2009159":["http://isc.sans.org/diary.html?storyid=5599","http://doc.emergingthreats.net/2009159"],"2009168":["http://www.securityfocus.com/bid/33718","http://milw0rm.com/exploits/8030","http://doc.emergingthreats.net/2009168"],"2009169":["http://www.securityfocus.com/bid/33731","http://milw0rm.com/exploits/8029","http://doc.emergingthreats.net/2009169"],"2009181":["http://secunia.com/advisories/33865/","http://milw0rm.com/exploits/8017","http://doc.emergingthreats.net/2009181"],"2009182":["http://secunia.com/advisories/33865/","http://milw0rm.com/exploits/8017","http://doc.emergingthreats.net/2009182"],"2009185":["http://www.securityfocus.com/bid/33693","http://milw0rm.com/exploits/8012","http://doc.emergingthreats.net/2009185"],"2009186":["http://www.securityfocus.com/bid/32131","http://milw0rm.com/exploits/7003","http://doc.emergingthreats.net/2009186"],"2009191":["http://milw0rm.com/exploits/8066","http://secunia.com/advisories/33959/","http://doc.emergingthreats.net/2009191"],"2009192":["http://www.securityfocus.com/bid/33775","http://milw0rm.com/exploits/8054","http://doc.emergingthreats.net/2009192"],"2009194":["http://milw0rm.com/exploits/6592","http://www.securityfocus.com/bid/31460","http://doc.emergingthreats.net/2009194"],"2009195":["http://secunia.com/advisories/31947/","http://milw0rm.com/exploits/6533","http://doc.emergingthreats.net/2009195"],"2009198":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5590","http://www.securityfocus.com/bid/32672","http://www.exploit-db.com/exploits/7368/","http://doc.emergingthreats.net/2009198"],"2009199":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0296","http://secunia.com/advisories/33661/","http://milw0rm.com/exploits/7873","http://doc.emergingthreats.net/2009199"],"2009201":["http://www.honeynet.org/node/388","http://doc.emergingthreats.net/2009201"],"2009203":["http://doc.emergingthreats.net/2009203"],"2009210":["http://doc.emergingthreats.net/2009210"],"2009211":["http://doc.emergingthreats.net/2009211"],"2009213":["http://doc.emergingthreats.net/2009213"],"2009215":["http://www.virustotal.com/analisis/3b532a7bf7850483882024652f6c8a8b","http://doc.emergingthreats.net/2009215"],"2009217":["http://tomcat.apache.org","http://doc.emergingthreats.net/2009217"],"2009218":["http://tomcat.apache.org","http://doc.emergingthreats.net/2009218"],"2009220":["http://tomcat.apache.org","http://doc.emergingthreats.net/2009220"],"2009222":["http://doc.emergingthreats.net/2009222"],"2009223":["http://www.threatexpert.com/report.aspx?md5=208e5551efce47ac6c95691715c12e46","http://www.threatexpert.com/report.aspx?md5=735dff747d0c7ce74dde31547b2b5750","http://www.threatexpert.com/report.aspx?md5=a84a144677a786c6855fd4899d024948"],"2009224":["http://secunia.com/advisories/33927/","http://www.securityfocus.com/bid/33774","http://milw0rm.com/exploits/8052","http://doc.emergingthreats.net/2009224"],"2009227":["http://secunia.com/advisories/30606/","http://milw0rm.com/exploits/5785","http://doc.emergingthreats.net/2009227"],"2009228":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3386","http://www.milw0rm.com/exploits/6092","http://secunia.com/advisories/31134/","http://doc.emergingthreats.net/2009228"],"2009229":["http://secunia.com/advisories/33732/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0441","http://milw0rm.com/exploits/7965","http://doc.emergingthreats.net/2009229"],"2009230":["http://secunia.com/advisories/33732/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0441","http://milw0rm.com/exploits/7965","http://doc.emergingthreats.net/2009230"],"2009231":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2898","http://secunia.com/advisories/30778/","http://milw0rm.com/exploits/5904","http://doc.emergingthreats.net/2009231"],"2009232":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2898","http://secunia.com/advisories/30778/","http://milw0rm.com/exploits/8028","http://doc.emergingthreats.net/2009232"],"2009233":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2898","http://secunia.com/advisories/30778/","http://milw0rm.com/exploits/5904","http://doc.emergingthreats.net/2009233"],"2009235":["http://www.symantec.com/security_response/writeup.jsp?docid=2005-050210-0214-99&tabid=2","http://www.packetninjas.net","http://doc.emergingthreats.net/2009235"],"2009236":["http://doc.emergingthreats.net/2009236"],"2009238":["http://doc.emergingthreats.net/2009238"],"2009240":["http://doc.emergingthreats.net/2009240"],"2009241":["http://doc.emergingthreats.net/2009241"],"2009243":["http://packetlife.net/blog/2008/oct/27/hijacking-hsrp/","http://doc.emergingthreats.net/2009243"],"2009245":["http://wwww.irmplc.com/downloads/whitepapers/Creating_Backdoors_in_Cisco_IOS_using_Tcl.pdf","http://doc.emergingthreats.net/2009245"],"2009247":["http://doc.emergingthreats.net/2009247"],"2009285":["http://doc.emergingthreats.net/2009285"],"2009288":["http://www.Whitehatsecurityresponse.blogspot.com","http://doc.emergingthreats.net/2009288"],"2009296":["http://doc.emergingthreats.net/2009296"],"2009298":["http://xprobe.sourceforge.net/","http://doc.emergingthreats.net/2009298"],"2009299":["http://doc.emergingthreats.net/2009299"],"2009306":["http://milw0rm.com/exploits/8195","http://www.securityfocus.com/bid/34074","http://doc.emergingthreats.net/2009306"],"2009308":["http://milw0rm.com/exploits/8195","http://www.securityfocus.com/bid/34074","http://doc.emergingthreats.net/2009308"],"2009310":["http://milw0rm.com/exploits/8195","http://www.securityfocus.com/bid/34074","http://doc.emergingthreats.net/2009310"],"2009312":["http://milw0rm.com/exploits/8195","http://www.securityfocus.com/bid/34074","http://doc.emergingthreats.net/2009312"],"2009316":["http://www.securityfocus.com/bid/30686","http://doc.emergingthreats.net/2009316"],"2009317":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-2649","http://xforce.iss.net/xforce/xfdb/42790","http://milw0rm.com/exploits/5715","http://doc.emergingthreats.net/2009317"],"2009318":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-2649","http://xforce.iss.net/xforce/xfdb/42790","http://milw0rm.com/exploits/5715","http://doc.emergingthreats.net/2009318"],"2009319":["http://www.securityfocus.com/bid/33194","http://milw0rm.com/exploits/7722","http://doc.emergingthreats.net/2009319"],"2009320":["http://www.securityfocus.com/bid/33621","http://milw0rm.com/exploits/7978","http://doc.emergingthreats.net/2009320"],"2009323":["http://www.securityfocus.com/bid/33933","http://milw0rm.com/exploits/8124","http://doc.emergingthreats.net/2009323"],"2009324":["http://www.securityfocus.com/bid/33933","http://milw0rm.com/exploits/8124","http://doc.emergingthreats.net/2009324"],"2009325":["http://www.securityfocus.com/bid/30064","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3022","http://xforce.iss.net/xforce/xfdb/43569","http://doc.emergingthreats.net/2009325"],"2009326":["http://www.securityfocus.com/bid/30064","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3022","http://xforce.iss.net/xforce/xfdb/43569","http://doc.emergingthreats.net/2009326"],"2009327":["http://www.securityfocus.com/bid/30064","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3022","http://xforce.iss.net/xforce/xfdb/43569","http://doc.emergingthreats.net/2009327"],"2009329":["http://secunia.com/advisories/34091/","http://milw0rm.com/exploits/8140","http://www.securityfocus.com/bid/33965","http://doc.emergingthreats.net/2009329"],"2009330":["http://vupen.com/english/advisories/2008/2938","http://www.exploit-db.com/exploits/6846/","http://doc.emergingthreats.net/2009330"],"2009331":["http://milw0rm.com/exploits/6287","http://www.securityfocus.com/bid/30785","http://doc.emergingthreats.net/2009331"],"2009332":["http://secunia.com/advisories/30784/","http://milw0rm.com/exploits/5906","http://doc.emergingthreats.net/2009332"],"2009335":["http://www.securityfocus.com/bid/32112","http://milw0rm.com/exploits/6982","http://xforce.iss.net/xforce/xfdb/46330","http://doc.emergingthreats.net/2009335"],"2009353":["http://www.microsoft.com/security/portal/Entry.aspx?Name=TrojanDownloader%3aWin32/Bredolab.B","http://doc.emergingthreats.net/2009353"],"2009355":["http://doc.emergingthreats.net/2009355"],"2009356":["http://doc.emergingthreats.net/2009356"],"2009358":["http://doc.emergingthreats.net/2009358"],"2009359":["http://doc.emergingthreats.net/2009359"],"2009361":["http://doc.emergingthreats.net/2009361"],"2009362":["http://doc.emergingthreats.net/2009362"],"2009363":["http://doc.emergingthreats.net/2009363"],"2009365":["http://milw0rm.com/exploits/8216","http://www.securityfocus.com/bid/34129","http://doc.emergingthreats.net/2009365"],"2009366":["http://www.securityfocus.com/bid/29966","http://milw0rm.com/exploits/5946","http://doc.emergingthreats.net/2009366"],"2009368":["http://www.securityfocus.com/bid/34174","http://milw0rm.com/exploits/8240","http://doc.emergingthreats.net/2009368"],"2009369":["http://vupen.com/english/advisories/2008/3119","http://www.securityfocus.com/bid/32265","http://www.exploit-db.com/exploits/7096/","http://doc.emergingthreats.net/2009369"],"2009374":["http://www.threatexpert.com/reports.aspx?find=ipk8888.cn&x=0&y=0","http://doc.emergingthreats.net/2009374"],"2009375":["http://www.hypothetic.org/docs/msn/general/http_examples.php","http://doc.emergingthreats.net/2009375"],"2009377":["http://secunia.com/advisories/34485/","http://www.securityfocus.com/bid/34265","http://milw0rm.com/exploits/8291","http://doc.emergingthreats.net/2009377"],"2009380":["http://secunia.com/advisories/34485/","http://www.securityfocus.com/bid/34265","http://milw0rm.com/exploits/8291","http://doc.emergingthreats.net/2009380"],"2009383":["http://secunia.com/advisories/32551","http://www.securityfocus.com/bid/32135","http://www.exploit-db.com/exploits/7002/","http://doc.emergingthreats.net/2009383"],"2009384":["http://secunia.com/advisories/32551","http://www.securityfocus.com/bid/32135","http://www.exploit-db.com/exploits/7002/","http://doc.emergingthreats.net/2009384"],"2009387":["http://tools.ietf.org/html/rfc2637","http://doc.emergingthreats.net/2009387","http://lists.emergingthreats.net/pipermail/emerging-sigs/2009-June/002705.html"],"2009390":["http://milw0rm.com/exploits/8268","http://www.securityfocus.com/bid/34213","http://doc.emergingthreats.net/2009390"],"2009391":["http://www.securityfocus.com/bid/32095","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6347","http://www.exploit-db.com/exploits/6976/","http://doc.emergingthreats.net/2009391"],"2009393":["http://milw0rm.com/exploits/6117","http://www.securityfocus.com/bid/30345","http://secunia.com/advisories/31161","http://doc.emergingthreats.net/2009393"],"2009394":["http://www.securityfocus.com/bid/34144","http://milw0rm.com/exploits/8228","http://doc.emergingthreats.net/2009394"],"2009395":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5063","http://vupen.com/english/advisories/2008/3093","http://secunia.com/advisories/32645","http://doc.emergingthreats.net/2009395"],"2009396":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5063","http://vupen.com/english/advisories/2008/3093","http://secunia.com/advisories/32645","http://doc.emergingthreats.net/2009396"],"2009407":["http://blog.threatexpert.com/2008/12/koobface-leaves-victims-black-spot.html","http://doc.emergingthreats.net/2009407"],"2009410":["http://www.secureworks.com/research/threats/gozi","http://doc.emergingthreats.net/2009410"],"2009417":["http://milw0rm.com/exploits/8290","http://www.securityfocus.com/bid/34261","http://secunia.com/advisories/34480/","http://doc.emergingthreats.net/2009417"],"2009418":["http://milw0rm.com/exploits/8290","http://www.securityfocus.com/bid/34261","http://secunia.com/advisories/34480/","http://doc.emergingthreats.net/2009418"],"2009420":["http://milw0rm.com/exploits/8290","http://www.securityfocus.com/bid/34261","http://secunia.com/advisories/34480/","http://doc.emergingthreats.net/2009420"],"2009421":["http://milw0rm.com/exploits/8290","http://www.securityfocus.com/bid/34261","http://secunia.com/advisories/34480/","http://doc.emergingthreats.net/2009421"],"2009422":["http://milw0rm.com/exploits/8290","http://www.securityfocus.com/bid/34261","http://secunia.com/advisories/34480/","http://doc.emergingthreats.net/2009422"],"2009423":["http://milw0rm.com/exploits/8290","http://www.securityfocus.com/bid/34261","http://secunia.com/advisories/34480/","http://doc.emergingthreats.net/2009423"],"2009424":["http://milw0rm.com/exploits/8341","http://www.securityfocus.com/bid/34338","http://doc.emergingthreats.net/2009424"],"2009428":["http://www.securityfocus.com/bid/28686","http://milw0rm.com/exploits/5405","http://doc.emergingthreats.net/2009428"],"2009429":["http://xforce.iss.net/xforce/xfdb/43536","http://www.securityfocus.com/bid/30042","http://milw0rm.com/exploits/5983","http://doc.emergingthreats.net/2009429"],"2009430":["http://milw0rm.com/exploits/5394","http://secunia.com/advisories/29685","http://www.securityfocus.com/bid/28659","http://doc.emergingthreats.net/2009430"],"2009431":["http://secunia.com/advisories/29797","http://www.securityfocus.com/bid/28748","http://www.exploit-db.com/exploits/5429/","http://doc.emergingthreats.net/2009431"],"2009432":["http://secunia.com/advisories/29797","http://www.securityfocus.com/bid/28748","http://www.exploit-db.com/exploits/5429/","http://doc.emergingthreats.net/2009432"],"2009436":["http://xforce.iss.net/xforce/xfdb/41867","http://secunia.com/advisories/29870","http://milw0rm.com/exploits/5459","http://doc.emergingthreats.net/2009436"],"2009437":["http://milw0rm.com/exploits/5394","http://secunia.com/advisories/29685","http://www.securityfocus.com/bid/28659","http://doc.emergingthreats.net/2009437"],"2009442":["http://doc.emergingthreats.net/2009442"],"2009444":["http://www.f-secure.com/v-descs/virus_w32_virut.shtml","http://doc.emergingthreats.net/2009444"],"2009445":["http://doc.emergingthreats.net/2009445"],"2009446":["http://doc.emergingthreats.net/2009445"],"2009447":["http://doc.emergingthreats.net/2009447"],"2009448":["http://doc.emergingthreats.net/2009448"],"2009450":["http://www.paretologic.com/resources/definitions.aspx?remove=%41%67%65%6e%74%20%41%74%79%61%20%54%72%6f%6a%61%6e","http://doc.emergingthreats.net/2009450"],"2009451":["http://www.virustotal.com/analisis/df09ec9ec4e5caa42db9d08e0f9d34b378e301a1eeb3aa1e6dbd0de1aa4a66be-1246158969","http://doc.emergingthreats.net/2009451"],"2009455":["http://doc.emergingthreats.net/2009455"],"2009458":["http://doc.emergingthreats.net/2009458"],"2009461":["http://www.securityfocus.com/bid/29820","http://milw0rm.com/exploits/5864","http://doc.emergingthreats.net/2009461"],"2009462":["http://www.securityfocus.com/bid/29820","http://milw0rm.com/exploits/5864","http://doc.emergingthreats.net/2009462"],"2009463":["http://www.securityfocus.com/bid/29820","http://milw0rm.com/exploits/5864","http://doc.emergingthreats.net/2009463"],"2009464":["http://www.securityfocus.com/bid/29820","http://milw0rm.com/exploits/5864","http://doc.emergingthreats.net/2009464"],"2009471":["http://www.pctools.com/mrc/infections/id/Trojan.Bancos/","http://www.threatexpert.com/reports.aspx?find=Trojan.Bancos","http://doc.emergingthreats.net/2009471"],"2009472":["http://www.avast.com/eng/win32-fasec.html","http://www.threatexpert.com/threats/virus-win32-fasec.html","http://doc.emergingthreats.net/2009472"],"2009474":["http://www.spywareremove.com/removeTrojanDownloaderSalityG.html","http://www.microsoft.com/security/portal/beta/Threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FSality.AM","http://doc.emergingthreats.net/2009474"],"2009475":["http://www.teamviewer.com/index.aspx","http://doc.emergingthreats.net/2009475"],"2009477":["http://www.justinclarke.com/archives/2006/03/sqlbrute.html","http://www.darknet.org.uk/2007/06/sqlbrute-sql-injection-brute-force-tool/","http://doc.emergingthreats.net/2009477"],"2009479":["http://www.hacker-soft.net/Soft/Soft_2895.htm","http://wiki.remote-exploit.org/backtrack/wiki/asp-audit","http://doc.emergingthreats.net/2009479"],"2009480":["http://www.grendel-scan.com","http://doc.emergingthreats.net/2009480"],"2009481":["http://www.grendel-scan.com","http://doc.emergingthreats.net/2009481"],"2009483":["http://rgaucher.info/beta/grabber/","http://doc.emergingthreats.net/2009483"],"2009485":["http://en.wikipedia.org/wiki/Shadow_password","http://doc.emergingthreats.net/2009485"],"2009486":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=14cfaefa5b8bc6400467fba8af146b71"],"2009494":["http://bugs.horde.org/ticket/8399","http://doc.emergingthreats.net/2009494"],"2009495":["http://bugs.horde.org/ticket/8399","http://doc.emergingthreats.net/2009495"],"2009496":["http://bugs.horde.org/ticket/8398","http://doc.emergingthreats.net/2009496"],"2009497":["http://bugs.horde.org/ticket/8399","http://doc.emergingthreats.net/2009497"],"2009498":["http://bugs.horde.org/ticket/8399","http://doc.emergingthreats.net/2009498"],"2009499":["http://bugs.horde.org/ticket/8398","http://doc.emergingthreats.net/2009499"],"2009503":["http://www.securityfocus.com/bid/27945","http://secunia.com/advisories/29077","http://milw0rm.com/exploits/5174","http://doc.emergingthreats.net/2009503"],"2009505":["http://www.securityfocus.com/bid/27945","http://secunia.com/advisories/29077","http://milw0rm.com/exploits/5174","http://doc.emergingthreats.net/2009505"],"2009507":["http://secunia.com/advisories/28047","http://milw0rm.com/exploits/4712","http://doc.emergingthreats.net/2009507"],"2009508":["http://www.securityfocus.com/bid/34537","http://milw0rm.com/exploits/8443","http://doc.emergingthreats.net/2009508"],"2009509":["http://www.securityfocus.com/bid/34537","http://milw0rm.com/exploits/8443","http://doc.emergingthreats.net/2009509"],"2009512":["http://doc.emergingthreats.net/2009512"],"2009513":["http://www.milw0rm.com/exploits/9081","http://doc.emergingthreats.net/2009513"],"2009516":["http://www.threatexpert.com/threats/worm-win32-autorun.html","http://doc.emergingthreats.net/2009516"],"2009519":["http://www.threatexpert.com/report.aspx?md5=6e871b9c440d5c77b9158ebcbe3fcd4b","http://doc.emergingthreats.net/2009519"],"2009520":["http://doc.emergingthreats.net/2009520"],"2009521":["http://doc.emergingthreats.net/2009521"],"2009524":["http://www.spywareremove.com/removeMySideSearch.html","http://www.threatexpert.com/threats/adware-win32-mysidesearch.html","http://www.pctools.com/mrc/infections/id/Adware.MySideSearch/","http://doc.emergingthreats.net/2009524"],"2009525":["http://www.spywareremove.com/removeTrojanDownloaderSalityG.html","http://www.microsoft.com/security/portal/beta/Threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FSality.AM","http://doc.emergingthreats.net/2009525"],"2009526":["http://doc.emergingthreats.net/2009526"],"2009527":["http://doc.emergingthreats.net/2009527"],"2009530":["http://www.spywareremove.com/removeTrojanDownloaderSalityG.html","http://www.microsoft.com/security/portal/beta/Threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FSality.AM","http://doc.emergingthreats.net/2009530"],"2009531":["http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=166939","http://doc.emergingthreats.net/2009531"],"2009534":["http://vil.nai.com/vil/content/v_130975.htm","http://doc.emergingthreats.net/2009534"],"2009535":["http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=bpj05999#A3","http://doc.emergingthreats.net/2009535"],"2009536":["http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=bpj06165","http://doc.emergingthreats.net/2009536"],"2009537":["http://doc.emergingthreats.net/2009537"],"2009538":["http://doc.emergingthreats.net/2009538"],"2009541":["http://doc.emergingthreats.net/2009541"],"2009544":["http://doc.emergingthreats.net/2009544"],"2009545":["http://doc.emergingthreats.net/2009545"],"2009547":["http://doc.emergingthreats.net/2009547"],"2009549":["http://doc.emergingthreats.net/2009549"],"2009550":["http://www.pctools.com/mrc/infections/id/Trojan.Banker/","http://doc.emergingthreats.net/2009550"],"2009554":["http://doc.emergingthreats.net/2009554"],"2009555":["http://0x90.org/releases/absinthe","http://doc.emergingthreats.net/2009555"],"2009557":["http://doc.emergingthreats.net/2009557"],"2009579":["http://www.nologin.org/Downloads/Papers/meterpreter.pdf","http://doc.emergingthreats.net/2009579"],"2009610":["http://microsoft.com/technet/security/advisory/972890.mspx","http://doc.emergingthreats.net/2009610"],"2009611":["http://microsoft.com/technet/security/advisory/972890.mspx","http://doc.emergingthreats.net/2009611"],"2009613":["http://microsoft.com/technet/security/advisory/972890.mspx","http://doc.emergingthreats.net/2009613"],"2009614":["http://microsoft.com/technet/security/advisory/972890.mspx","http://doc.emergingthreats.net/2009614"],"2009615":["http://microsoft.com/technet/security/advisory/972890.mspx","http://doc.emergingthreats.net/2009615"],"2009616":["http://microsoft.com/technet/security/advisory/972890.mspx","http://doc.emergingthreats.net/2009616"],"2009643":["http://dsecrg.com/pages/vul/show.php?id=125","http://doc.emergingthreats.net/2009643"],"2009644":["http://dsecrg.com/pages/vul/show.php?id=131","http://doc.emergingthreats.net/2009644"],"2009646":["http://www.acunetix.com/","http://doc.emergingthreats.net/2009646"],"2009647":["http://www.packetstormsecurity.com/0907-exploits/hubscript-xssphpinfo.txt","http://doc.emergingthreats.net/2009647"],"2009650":["http://www.packetstormsecurity.com/0907-exploits/hubscript-xssphpinfo.txt","http://doc.emergingthreats.net/2009650"],"2009652":["http://www.securityfocus.com/bid/34538","http://milw0rm.com/exploits/8446","http://doc.emergingthreats.net/2009652"],"2009658":["http://www.securityfocus.com/bid/29205","http://milw0rm.com/exploits/5611","http://doc.emergingthreats.net/2009658"],"2009659":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1534","http://juniper.net/security/auto/vulnerabilities/vuln28421.html","http://www.securityfocus.com/bid/28421","http://milw0rm.com/exploits/5303","http://doc.emergingthreats.net/2009659"],"2009660":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1534","http://juniper.net/security/auto/vulnerabilities/vuln28421.html","http://www.securityfocus.com/bid/28421","http://milw0rm.com/exploits/5303","http://doc.emergingthreats.net/2009660"],"2009661":["http://secunia.com/advisories/28927/","http://milw0rm.com/exploits/5116","http://doc.emergingthreats.net/2009661"],"2009670":["http://www.securityfocus.com/bid/35464","http://doc.emergingthreats.net/2009670"],"2009671":["http://www.packetstormsecurity.org/0907-exploits/millionpixel-xss.txt","http://doc.emergingthreats.net/2009671"],"2009672":["http://www.packetstormsecurity.org/0907-exploits/programsrating-xss.txt","http://doc.emergingthreats.net/2009672"],"2009673":["http://www.packetstormsecurity.org/0907-exploits/programsrating-xss.txt","http://doc.emergingthreats.net/2009673"],"2009674":["http://www.milw0rm.com/exploits/9197","http://doc.emergingthreats.net/2009674"],"2009678":["http://isc.sans.org/diary.html?storyid=6853","http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/","http://doc.emergingthreats.net/2009678","http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173","http://www.securityfocus.com/bid/35742","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2765"],"2009690":["http://www.packetstormsecurity.org/0907-exploits/3awebmoney-rfi.txt","http://doc.emergingthreats.net/2009690"],"2009691":["http://www.packetstormsecurity.org/0907-exploits/3awebmoney-rfi.txt","http://doc.emergingthreats.net/2009691"],"2009698":["http://doc.emergingthreats.net/2009698"],"2009699":["http://doc.emergingthreats.net/2009699"],"2009700":["http://doc.emergingthreats.net/2009700"],"2009702":["http://doc.emergingthreats.net/2009702"],"2009703":["http://doc.emergingthreats.net/2009703"],"2009704":["http://doc.emergingthreats.net/2009704"],"2009705":["http://www.tallemu.com/oasis2/vendor/w3i__llc/623302","http://doc.emergingthreats.net/2009705"],"2009706":["http://www.nessus.org/nessus/","http://www.nessus.org/plugins/","http://doc.emergingthreats.net/2009706"],"2009711":["http://www.spywarecease.com/spyware-list/Spyware_Trojan.Win32.Runner.s.html","http://www.threatexpert.com/threats/trojan-win32-runner.html","http://www.threatexpert.com/report.aspx?md5=6d2919a92d7dda22f4bc7f9a9b15739f"],"2009714":["http://ha.ckers.org/xss.html","http://doc.emergingthreats.net/2009714"],"2009715":["http://www.w3schools.com/jsref/jsref_onmouseover.asp","http://doc.emergingthreats.net/2009715"],"2009716":["http://www.securityfocus.com/bid/34733","http://milw0rm.com/exploits/8548","http://doc.emergingthreats.net/2009716"],"2009718":["http://www.securityfocus.com/bid/31085","http://milw0rm.com/exploits/6411","http://doc.emergingthreats.net/2009718"],"2009719":["http://milw0rm.com/exploits/6000","http://www.securityfocus.com/bid/19838","http://doc.emergingthreats.net/2009719"],"2009720":["http://milw0rm.com/exploits/6000","http://www.securityfocus.com/bid/19838","http://doc.emergingthreats.net/2009720"],"2009724":["http://secunia.com/advisories/34997/","http://milw0rm.com/exploits/8602","http://doc.emergingthreats.net/2009724"],"2009726":["http://www.securityfocus.com/bid/34617","http://milw0rm.com/exploits/8494","http://doc.emergingthreats.net/2009726"],"2009727":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6242","http://www.securityfocus.com/bid/32039","http://milw0rm.com/exploits/6922","http://doc.emergingthreats.net/2009727"],"2009728":["http://milw0rm.com/exploits/8504","http://www.securityfocus.com/bid/34636","http://doc.emergingthreats.net/2009728"],"2009729":["http://milw0rm.com/exploits/8503","http://www.securityfocus.com/bid/34634","http://doc.emergingthreats.net/2009729"],"2009730":["http://www.securityfocus.com/bid/34300","http://milw0rm.com/exploits/8318","http://doc.emergingthreats.net/2009730"],"2009731":["http://www.securityfocus.com/bid/34648","http://milw0rm.com/exploits/8506","http://doc.emergingthreats.net/2009731"],"2009734":["http://www.securityfocus.com/bid/31426","http://xforce.iss.net/xforce/xfdb/45428","http://milw0rm.com/exploits/6578","http://doc.emergingthreats.net/2009734"],"2009738":["http://milw0rm.com/exploits/8258","http://www.securityfocus.com/bid/34197","http://doc.emergingthreats.net/2009738"],"2009739":["http://www.securityfocus.com/bid/33253","http://xforce.iss.net/xforce/xfdb/47959","http://milw0rm.com/exploits/7767","http://doc.emergingthreats.net/2009739"],"2009740":["http://secunia.com/advisories/33555","http://www.securityfocus.com/bid/33329","http://milw0rm.com/exploits/7814","http://doc.emergingthreats.net/2009740"],"2009741":["http://secunia.com/advisories/33555","http://www.securityfocus.com/bid/33329","http://milw0rm.com/exploits/7814","http://doc.emergingthreats.net/2009741"],"2009742":["http://secunia.com/advisories/33555","http://www.securityfocus.com/bid/33329","http://milw0rm.com/exploits/7814","http://doc.emergingthreats.net/2009742"],"2009743":["http://www.securityfocus.com/bid/30176","http://milw0rm.com/exploits/6037","http://doc.emergingthreats.net/2009743"],"2009744":["http://milw0rm.com/exploits/8255","http://www.securityfocus.com/bid/34195","http://doc.emergingthreats.net/2009744"],"2009745":["http://milw0rm.com/exploits/8549","http://www.securityfocus.com/bid/34734","http://doc.emergingthreats.net/2009745"],"2009746":["http://secunia.com/advisories/34997/","http://milw0rm.com/exploits/8602","http://doc.emergingthreats.net/2009746"],"2009747":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4371","http://secunia.com/advisories/31816/","http://milw0rm.com/exploits/6409","http://doc.emergingthreats.net/2009747"],"2009751":["http://www.pctools.com/mrc/infections/id/Trojan-Downloader.FraudLoad/","http://www.threatexpert.com/reports.aspx?find=Trojan-Downloader.FraudLoad","http://doc.emergingthreats.net/2009751"],"2009761":["http://www.securityfocus.com/bid/27964","http://juniper.net/security/auto/vulnerabilities/vuln27964.html","http://www.exploit-db.com/exploits/5179/","http://doc.emergingthreats.net/2009761"],"2009764":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6265","http://www.securityfocus.com/bid/32218","http://vupen.com/english/advisories/2008/3070","http://milw0rm.com/exploits/7065","http://doc.emergingthreats.net/2009764"],"2009766":["http://doc.emergingthreats.net/2009766"],"2009769":["http://www.sqlpowerinjector.com/index.htm","http://en.wikipedia.org/wiki/Sql_injection","http://doc.emergingthreats.net/2009769"],"2009776":["http://www.threatexpert.com/report.aspx?md5=38e1d644e2a16041b5ec1a02826df280","http://www.threatexpert.com/report.aspx?md5=1db0c8d48a76662496af7faf581b1cf0","http://doc.emergingthreats.net/2009776"],"2009778":["http://www.securityfocus.com/bid/35780","http://www.securityfocus.com/archive/1/505231","http://doc.emergingthreats.net/2009778"],"2009779":["http://www.securityfocus.com/bid/35780","http://www.securityfocus.com/archive/1/505231","http://doc.emergingthreats.net/2009779"],"2009780":["http://www.securityfocus.com/bid/35780","http://www.securityfocus.com/archive/1/505231","http://doc.emergingthreats.net/2009780"],"2009783":["http://vil.nai.com/vil/content/v_151034.htm","http://www.emsisoft.com/en/malware/?Adware.Win32.Ruby+Fortune+Casino+3.2.0.25","http://www.threatexpert.com/reports.aspx?find=mgsmup.com","http://doc.emergingthreats.net/2009783"],"2009787":["http://www.securityfocus.com/bid/34303","http://milw0rm.com/exploits/8323","http://doc.emergingthreats.net/2009787"],"2009789":["http://milw0rm.com/exploits/8667","http://vupen.com/english/advisories/2009/1304","http://doc.emergingthreats.net/2009789"],"2009790":["http://milw0rm.com/exploits/8680","http://www.securityfocus.com/bid/34968","http://secunia.com/advisories/35059/","http://doc.emergingthreats.net/2009790"],"2009791":["http://juniper.net/security/auto/vulnerabilities/vuln32307.html","http://xforce.iss.net/xforce/xfdb/46638","http://milw0rm.com/exploits/7117","http://doc.emergingthreats.net/2009791"],"2009794":["http://milw0rm.com/exploits/8737","http://www.securityfocus.com/bid/35033","http://doc.emergingthreats.net/2009794"],"2009795":["http://www.securityfocus.com/bid/35032","http://milw0rm.com/exploits/8738","http://doc.emergingthreats.net/2009795"],"2009801":["http://doc.emergingthreats.net/2009801"],"2009804":["http://vil.nai.com/vil/content/v_156782.htm","http://www.spywaredetector.net/spyware_encyclopedia/Backdoor.Prosti.htm","http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=207702#none","http://www.threatexpert.com/report.aspx?md5=0bcdc9c2e2102f36f594b9e727dae3c7","http://doc.emergingthreats.net/2009804"],"2009805":["http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=212955#none","http://www.threatexpert.com/threats/virus-win32-luder-b.html","http://doc.emergingthreats.net/2009805"],"2009806":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPoisonivy.I&ThreatID=-2147363597","http://www.viruslist.com/en/viruses/encyclopedia?virusid=133781","http://doc.emergingthreats.net/2009806"],"2009807":["http://vil.nai.com/vil/content/v_103738.htm","http://www.sunbeltsecurity.com/ThreatDisplay.aspx?tid=13811&cs=1437A28B7A90C4C502B683CE6DE23C4E","http://www.symantec.com/security_response/writeup.jsp?docid=2004-111918-0210-99","http://doc.emergingthreats.net/2009807"],"2009808":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32%2fVirut","http://www.avast.com/eng/win32-virut.html","http://free.avg.com/66558","http://www.threatexpert.com/threats/virus-win32-virut-ce.html","http://doc.emergingthreats.net/2009808"],"2009810":["http://www.cyber-ta.org/releases/malware-analysis/public/2009-07-12-public/ARCHIVE/1247423556.chatter","http://doc.emergingthreats.net/2009810"],"2009813":["http://doc.emergingthreats.net/2009813"],"2009815":["http://msdn.microsoft.com/en-us/library/ms175046.aspx","http://www.databasejournal.com/features/mssql/article.php/3372131/Using-xpcmdshell.htm","http://doc.emergingthreats.net/2009815"],"2009816":["http://www.sqlusa.com/bestpractices2005/administration/xpservicecontrol/","http://doc.emergingthreats.net/2009816"],"2009817":["http://technet.microsoft.com/en-us/library/ms181422.aspx","http://doc.emergingthreats.net/2009817"],"2009818":["http://www.mssqlcity.com/Articles/Undoc/UndocExtSP.htm","http://www.sql-server-performance.com/articles/dev/extended_stored_procedures_p1.aspx","http://doc.emergingthreats.net/2009818"],"2009819":["http://www.mssqlcity.com/Articles/Undoc/UndocExtSP.htm","http://www.dugger-it.com/articles/xp_fileexist.asp","http://www.sql-server-performance.com/articles/dev/extended_stored_procedures_p1.aspx","http://doc.emergingthreats.net/2009819"],"2009820":["http://www.mssqlcity.com/Articles/Undoc/UndocExtSP.htm","http://www.sql-server-performance.com/articles/dev/extended_stored_procedures_p1.aspx","http://doc.emergingthreats.net/2009820"],"2009822":["http://www.sql-server-performance.com/articles/dev/extended_stored_procedures_p1.aspx","http://www.sqlteam.com/article/using-xp_readerrorlog-in-sql-server-2005","http://doc.emergingthreats.net/2009822"],"2009823":["http://www.mssqlcity.com/Articles/Undoc/UndocExtSP.htm","http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/","http://msdn.microsoft.com/en-us/library/ms173792.aspx","http://doc.emergingthreats.net/2009823"],"2009825":["http://vil.nai.com/vil/content/v_187654.htm","http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=187654","http://doc.emergingthreats.net/2009825"],"2009827":["http://pavuk.sourceforge.net/about.html","http://doc.emergingthreats.net/2009827"],"2009831":["http://doc.emergingthreats.net/2009831"],"2009832":["http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf","http://www.blackhat.com/presentations/win-usa-04/bh-win-04-seki-up2.pdf","http://seclists.org/fulldisclosure/2003/Aug/0432.html","http://doc.emergingthreats.net/2009832"],"2009833":["http://witool.sourceforge.net/","http://doc.emergingthreats.net/2009833"],"2009834":["http://www.exploit-db.com/exploits/9563/","http://www.securityfocus.com/bid/36206/info","http://doc.emergingthreats.net/2009834"],"2009835":["http://www.exploit-db.com/exploits/9563/","http://www.securityfocus.com/bid/36206/info","http://doc.emergingthreats.net/2009835"],"2009836":["http://www.exploit-db.com/exploits/9563/","http://www.securityfocus.com/bid/36206/info","http://doc.emergingthreats.net/2009836"],"2009838":["http://www.securityfocus.com/bid/33434","http://juniper.net/security/auto/vulnerabilities/vuln33434.html","http://doc.emergingthreats.net/2009838"],"2009839":["http://www.securityfocus.com/bid/33434","http://juniper.net/security/auto/vulnerabilities/vuln33434.html","http://doc.emergingthreats.net/2009839"],"2009840":["http://www.securityfocus.com/bid/33434","http://juniper.net/security/auto/vulnerabilities/vuln33434.html","http://doc.emergingthreats.net/2009840"],"2009841":["http://www.securityfocus.com/bid/33434","http://juniper.net/security/auto/vulnerabilities/vuln33434.html","http://doc.emergingthreats.net/2009841"],"2009842":["http://www.securityfocus.com/bid/33434","http://juniper.net/security/auto/vulnerabilities/vuln33434.html","http://doc.emergingthreats.net/2009842"],"2009843":["http://www.securityfocus.com/bid/33434","http://juniper.net/security/auto/vulnerabilities/vuln33434.html","http://doc.emergingthreats.net/2009843"],"2009844":["http://www.securityfocus.com/bid/33434","http://juniper.net/security/auto/vulnerabilities/vuln33434.html","http://doc.emergingthreats.net/2009844"],"2009845":["http://www.securityfocus.com/bid/33434","http://juniper.net/security/auto/vulnerabilities/vuln33434.html","http://doc.emergingthreats.net/2009845"],"2009849":["http://www.securityfocus.com/bid/35060","http://milw0rm.com/exploits/8759","http://doc.emergingthreats.net/2009849"],"2009850":["http://www.securityfocus.com/bid/35060","http://milw0rm.com/exploits/8759","http://doc.emergingthreats.net/2009850"],"2009851":["http://www.securityfocus.com/bid/35060","http://milw0rm.com/exploits/8759","http://doc.emergingthreats.net/2009851"],"2009852":["http://www.securityfocus.com/bid/35060","http://milw0rm.com/exploits/8759","http://doc.emergingthreats.net/2009852"],"2009853":["http://www.securityfocus.com/bid/35060","http://milw0rm.com/exploits/8759","http://doc.emergingthreats.net/2009853"],"2009854":["http://www.securityfocus.com/bid/35060","http://milw0rm.com/exploits/8759","http://doc.emergingthreats.net/2009854"],"2009855":["http://www.securityfocus.com/bid/35060","http://milw0rm.com/exploits/8759","http://doc.emergingthreats.net/2009855"],"2009856":["http://www.securityfocus.com/bid/35060","http://milw0rm.com/exploits/8759","http://doc.emergingthreats.net/2009856"],"2009857":["http://secunia.com/advisories/35764/","http://milw0rm.com/exploits/9116","http://shinnai.net/xplits/TXT_nsGUdeley3EHfKEV690p.html","http://doc.emergingthreats.net/2009857"],"2009861":["http://doc.emergingthreats.net/2009861"],"2009862":["http://doc.emergingthreats.net/2009862"],"2009867":["http://doc.emergingthreats.net/2009867"],"2009870":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3399","http://milw0rm.com/exploits/6131","http://xforce.iss.net/xforce/xfdb/43992","http://doc.emergingthreats.net/2009870"],"2009875":["http://www.securityfocus.com/bid/35103","http://milw0rm.com/exploits/8790","http://doc.emergingthreats.net/2009875"],"2009876":["http://www.securityfocus.com/bid/35095","http://milw0rm.com/exploits/8781","http://doc.emergingthreats.net/2009876"],"2009878":["http://secunia.com/advisories/32467","http://www.securityfocus.com/bid/31986","http://milw0rm.com/exploits/6874","http://doc.emergingthreats.net/2009878"],"2009881":["http://www.exploit-db.com/exploits/9593/","http://doc.emergingthreats.net/2009881"],"2009882":["http://code.google.com/p/mysqloit/"],"2009883":["http://code.google.com/p/mysqloit/","http://doc.emergingthreats.net/2009883"],"2009887":["http://www.sans.org/top20/","http://www.packetstormsecurity.org/0908-exploits/projectbutler-rfi.txt","http://doc.emergingthreats.net/2009887"],"2009888":["http://www.sans.org/top20/","http://packetstormsecurity.org/0908-exploits/maxcms-rfi.txt","http://doc.emergingthreats.net/2009888"],"2009889":["http://www.sans.org/top20/","http://packetstormsecurity.org/0908-exploits/maxcms-rfi.txt","http://doc.emergingthreats.net/2009889"],"2009890":["http://www.sans.org/top20/","http://packetstormsecurity.org/0908-exploits/maxcms-rfi.txt","http://doc.emergingthreats.net/2009890"],"2009891":["http://www.sans.org/top20/","http://packetstormsecurity.org/0908-exploits/maxcms-rfi.txt","http://doc.emergingthreats.net/2009891"],"2009892":["http://packetstormsecurity.org/0907-exploits/paid4mail-rfi.txt","http://doc.emergingthreats.net/2009892"],"2009895":["http://unite.opera.com","http://doc.emergingthreats.net/2009895"],"2009897":["http://doc.emergingthreats.net/2009897"],"2009904":["http://secunia.com/advisories/35315/","http://milw0rm.com/exploits/8851","http://doc.emergingthreats.net/2009904"],"2009905":["http://www.exploit-db.com/exploits/8841/","http://secunia.com/advisories/35299/","http://doc.emergingthreats.net/2009905"],"2009906":["http://secunia.com/advisories/35304/","http://milw0rm.com/exploits/8844","http://doc.emergingthreats.net/2009906"],"2009909":["http://doc.emergingthreats.net/bin/view/Main/2009909"],"2009913":["http://www.exploit-db.com/exploits/9693/","http://doc.emergingthreats.net/2009913"],"2009914":["http://www.exploit-db.com/exploits/9693/","http://doc.emergingthreats.net/2009914"],"2009915":["http://www.exploit-db.com/exploits/9693/","http://doc.emergingthreats.net/2009915"],"2009916":["http://www.exploit-db.com/exploits/9693/","http://doc.emergingthreats.net/2009916"],"2009917":["http://www.exploit-db.com/exploits/9693/","http://doc.emergingthreats.net/2009917"],"2009919":["http://www.securityfocus.com/bid/36427/info","http://doc.emergingthreats.net/2009919"],"2009920":["http://www.securityfocus.com/bid/36427/info","http://doc.emergingthreats.net/2009920"],"2009921":["http://www.securityfocus.com/bid/36427/info","http://doc.emergingthreats.net/2009921"],"2009922":["http://www.securityfocus.com/bid/36427/info","http://doc.emergingthreats.net/2009922"],"2009924":["http://www.securityfocus.com/bid/36427/info","http://doc.emergingthreats.net/2009924"],"2009926":["http://secunia.com/advisories/31920","http://www.securityfocus.com/bid/31225","http://milw0rm.com/exploits/6480","http://doc.emergingthreats.net/2009926"],"2009928":["http://secunia.com/advisories/31920","http://www.securityfocus.com/bid/31225","http://milw0rm.com/exploits/6480","http://doc.emergingthreats.net/2009928"],"2009929":["http://www.securityfocus.com/bid/36441/info","http://www.exploit-db.com/exploits/9706/","http://doc.emergingthreats.net/2009929"],"2009930":["http://doc.emergingthreats.net/2009930"],"2009931":["http://www.securityfocus.com/bid/36445/info","http://www.owasp.org/index.php/PHP_File_Inclusion","http://doc.emergingthreats.net/2009931"],"2009932":["http://www.securityfocus.com/bid/36411/info","http://www.owasp.org/index.php/PHP_File_Inclusion","http://doc.emergingthreats.net/2009932"],"2009933":["http://www.securityfocus.com/bid/36447/info","http://www.owasp.org/index.php/PHP_File_Inclusion","http://doc.emergingthreats.net/2009933"],"2009934":["http://www.securityfocus.com/bid/35259","http://www.exploit-db.com/exploits/8898/","http://doc.emergingthreats.net/2009934"],"2009935":["http://secunia.com/advisories/35369/","http://milw0rm.com/exploits/8900","http://doc.emergingthreats.net/2009935"],"2009936":["http://www.securityfocus.com/bid/30547","http://xforce.iss.net/xforce/xfdb/44233","http://milw0rm.com/exploits/6204","http://doc.emergingthreats.net/2009936"],"2009937":["http://www.securityfocus.com/bid/27472/info","http://doc.emergingthreats.net/2009937"],"2009938":["http://www.securityfocus.com/bid/36464/info","http://doc.emergingthreats.net/2009938"],"2009939":["http://www.securityfocus.com/bid/36464/info","http://doc.emergingthreats.net/2009939"],"2009940":["http://www.securityfocus.com/bid/36464/info","http://doc.emergingthreats.net/2009940"],"2009941":["http://www.securityfocus.com/bid/36464/info","http://doc.emergingthreats.net/2009941"],"2009942":["http://www.securityfocus.com/bid/36464/info","http://doc.emergingthreats.net/2009942"],"2009943":["http://www.securityfocus.com/bid/36461/info","http://doc.emergingthreats.net/2009943"],"2009944":["http://www.securityfocus.com/bid/36461/info","http://doc.emergingthreats.net/2009944"],"2009945":["http://www.securityfocus.com/bid/36461/info","http://doc.emergingthreats.net/2009945"],"2009946":["http://www.securityfocus.com/bid/36461/info","http://doc.emergingthreats.net/2009946"],"2009947":["http://www.securityfocus.com/bid/36461/info","http://doc.emergingthreats.net/2009947"],"2009949":["http://seclists.org/fulldisclosure/2009/Sep/0321.html","http://doc.emergingthreats.net/2009949"],"2009950":["http://seclists.org/fulldisclosure/2009/Sep/0321.html","http://doc.emergingthreats.net/2009950"],"2009951":["http://seclists.org/fulldisclosure/2009/Sep/0321.html","http://doc.emergingthreats.net/2009951"],"2009952":["http://seclists.org/fulldisclosure/2009/Sep/0321.html","http://doc.emergingthreats.net/2009952"],"2009953":["http://seclists.org/fulldisclosure/2009/Sep/0321.html","http://doc.emergingthreats.net/2009953"],"2009955":["http://seclists.org/fulldisclosure/2009/Sep/0321.html","http://doc.emergingthreats.net/2009955"],"2009956":["http://www.securityfocus.com/bid/36484/info","http://doc.emergingthreats.net/2009956"],"2009957":["http://www.securityfocus.com/bid/36484/info","http://doc.emergingthreats.net/2009957"],"2009958":["http://www.securityfocus.com/bid/36484/info","http://doc.emergingthreats.net/2009958"],"2009959":["http://www.securityfocus.com/bid/36484/info","http://doc.emergingthreats.net/2009959"],"2009960":["http://www.securityfocus.com/bid/36484/info","http://doc.emergingthreats.net/2009960"],"2009961":["http://www.securityfocus.com/bid/36481/info","http://doc.emergingthreats.net/2009961"],"2009962":["http://www.securityfocus.com/bid/36481/info","http://doc.emergingthreats.net/2009962"],"2009963":["http://www.securityfocus.com/bid/36481/info","http://doc.emergingthreats.net/2009963"],"2009964":["http://www.securityfocus.com/bid/36481/info","http://doc.emergingthreats.net/2009964"],"2009965":["http://www.securityfocus.com/bid/36481/info","http://doc.emergingthreats.net/2009965"],"2009966":["http://koogoo.com","http://doc.emergingthreats.net/2009966"],"2009967":["http://emule-project.net","http://doc.emergingthreats.net/2009967"],"2009968":["http://emule-project.net","http://doc.emergingthreats.net/2009968"],"2009969":["http://emule-project.net","http://doc.emergingthreats.net/2009969"],"2009972":["http://emule-project.net","http://doc.emergingthreats.net/2009972"],"2009978":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3326","http://www.milw0rm.com/exploits/9727","http://doc.emergingthreats.net/2009978"],"2009980":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3326","http://www.milw0rm.com/exploits/9727","http://doc.emergingthreats.net/2009980"],"2009981":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2009981"],"2009982":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2009982"],"2009983":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2009983"],"2009984":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2009984"],"2009985":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2009985"],"2009986":["http://msmvps.com/blogs/bradley/archive/2009/01/20/peer-to-peer-on-cnn.aspx","http://doc.emergingthreats.net/2009986"],"2009988":["http://www.avira.com/en/threats/section/details/id_vir/1836/tr_banker.delf.df735649.html","http://doc.emergingthreats.net/2007594"],"2009990":["http://www.securitytracker.com/alerts/2009/Sep/1022945.html","http://doc.emergingthreats.net/2009990"],"2009991":["http://doc.emergingthreats.net/2009991"],"2009993":["http://doc.emergingthreats.net/2009993"],"2009994":["http://anubis.iseclab.org/?action=result&task_id=17b118a86edba30f4f588db66eaf55d10","http://security.thejoshmeister.com/2009/09/new-malware-ddos-botexe-etc-and.html","http://doc.emergingthreats.net/2009994"],"2009998":["http://www.smilebox.com/info/privacy.html","http://doc.emergingthreats.net/2009998"],"2010001":["http://doc.emergingthreats.net/2010001"],"2010002":["http://doc.emergingthreats.net/2010002"],"2010003":["http://doc.emergingthreats.net/2010003"],"2010004":["http://doc.emergingthreats.net/2010004"],"2010008":["http://doc.emergingthreats.net/2010008"],"2010009":["http://bliki.rimuhosting.com/comments/knowledgebase/linux/miscapplications/webmin","http://doc.emergingthreats.net/2010009"],"2010014":["http://www.securityfocus.com/bid/36213/info","http://doc.emergingthreats.net/2010014"],"2010015":["http://www.securityfocus.com/bid/36213/info","http://doc.emergingthreats.net/2010015"],"2010016":["http://www.securityfocus.com/bid/36213/info","http://doc.emergingthreats.net/2010016"],"2010017":["http://www.securityfocus.com/bid/36213/info","http://doc.emergingthreats.net/2010017"],"2010018":["http://www.securityfocus.com/bid/36213/info","http://doc.emergingthreats.net/2010018"],"2010019":["http://doc.emergingthreats.net/2010019"],"2010020":["http://www.securityfocus.com/bid/33471","http://milw0rm.com/exploits/7874","http://secunia.com/advisories/33660/","http://doc.emergingthreats.net/2010020"],"2010021":["http://milw0rm.com/exploits/9000","http://vupen.com/english/advisories/2009/1658","http://doc.emergingthreats.net/2010021"],"2010022":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2152","http://en.securitylab.ru/nvd/381723.php","http://milw0rm.com/exploits/8954","http://doc.emergingthreats.net/2010022"],"2010023":["http://www.exploit-db.com/exploits/9015/","http://en.securitylab.ru/nvd/381880.php","http://doc.emergingthreats.net/2010023"],"2010024":["http://www.exploit-db.com/exploits/9015/","http://en.securitylab.ru/nvd/381880.php","http://doc.emergingthreats.net/2010024"],"2010025":["http://secunia.com/advisories/35622/","http://www.securityfocus.com/bid/35521","http://milw0rm.com/exploits/9044","http://doc.emergingthreats.net/2010025"],"2010026":["http://milw0rm.com/exploits/8958","http://www.securityfocus.com/bid/35369","http://doc.emergingthreats.net/2010026"],"2010028":["http://secunia.com/advisories/35611/","http://www.exploit-db.com/exploits/9042/","http://doc.emergingthreats.net/7741"],"2010031":["http://www.securityfocus.com/bid/36567/info","http://doc.emergingthreats.net/2010031"],"2010037":["http://www.milw0rm.com/papers/372","http://www.greensql.net/publications/backdoor-webserver-using-mysql-sql-injection","http://websec.wordpress.com/2007/11/17/mysql-into-outfile/","http://doc.emergingthreats.net/2010037"],"2010039":["http://www.securityfocus.com/bid/36580/info","http://www.securityfocus.com/archive/1/506889","http://doc.emergingthreats.net/2010039"],"2010040":["http://www.securityfocus.com/bid/36598/info","http://doc.emergingthreats.net/2010040"],"2010041":["http://www.securityfocus.com/bid/36598/info","http://doc.emergingthreats.net/2010041"],"2010042":["http://www.securityfocus.com/bid/36598/info","http://doc.emergingthreats.net/2010042"],"2010043":["http://www.securityfocus.com/bid/36598/info","http://doc.emergingthreats.net/2010043"],"2010044":["http://www.securityfocus.com/bid/36598/info","http://doc.emergingthreats.net/2010044"],"2010045":["http://www.securityfocus.com/bid/36597/info","http://doc.emergingthreats.net/2010045"],"2010046":["http://www.securityfocus.com/bid/36597/info","http://doc.emergingthreats.net/2010046"],"2010047":["http://www.securityfocus.com/bid/36597/info","http://doc.emergingthreats.net/2010047"],"2010048":["http://www.securityfocus.com/bid/36597/info","http://doc.emergingthreats.net/2010048"],"2010061":["http://doc.emergingthreats.net/2010061"],"2010066":["http://doc.emergingthreats.net/2010066"],"2010067":["http://doc.emergingthreats.net/2010067"],"2010071":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3aWin32%2fHiloti.gen!A","http://doc.emergingthreats.net/2010071","http://blog.fortinet.com/hiloti-the-botmaster-of-disguise/"],"2010073":["http://www.securityfocus.com/bid/36654/info","http://www.securityfocus.com/archive/1/507072","http://doc.emergingthreats.net/2010073"],"2010074":["http://www.securityfocus.com/bid/36654/info","http://www.securityfocus.com/archive/1/507072","http://doc.emergingthreats.net/2010074"],"2010075":["http://www.securityfocus.com/bid/36654/info","http://www.securityfocus.com/archive/1/507072","http://doc.emergingthreats.net/2010075"],"2010076":["http://www.securityfocus.com/bid/36654/info","http://www.securityfocus.com/archive/1/507072","http://doc.emergingthreats.net/2010076"],"2010077":["http://www.securityfocus.com/bid/36654/info","http://www.securityfocus.com/archive/1/507072","http://doc.emergingthreats.net/2010077"],"2010078":["http://www.securityfocus.com/bid/36654/info","http://www.securityfocus.com/archive/1/507072","http://doc.emergingthreats.net/2010078"],"2010080":["http://www.securityfocus.com/bid/36609/info","http://www.securityfocus.com/archive/1/507030","http://doc.emergingthreats.net/2010080"],"2010081":["http://www.milw0rm.com/papers/372","http://www.greensql.net/publications/backdoor-webserver-using-mysql-sql-injection","http://websec.wordpress.com/2007/11/17/mysql-into-outfile/","http://doc.emergingthreats.net/2010081"],"2010082":["http://www.securityfocus.com/bid/30730/info","http://bugzilla.redhat.com/show_bug.cgi?id=474396","http://sourceforge.net/tracker/index.php?func=detail&aid=2001151&group_id=13764&atid=113764","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-3714","http://doc.emergingthreats.net/2010082"],"2010084":["http://www.owasp.org/index.php/SQL_Injection","http://www.w3schools.com/SQl/sql_alter.asp","http://doc.emergingthreats.net/2010084"],"2010085":["http://www.owasp.org/index.php/SQL_Injection","http://www.w3schools.com/SQl/sql_drop.asp","http://doc.emergingthreats.net/2010085"],"2010086":["http://www.owasp.org/index.php/SQL_Injection","http://www.w3schools.com/Sql/sql_create_db.asp","http://doc.emergingthreats.net/2010086"],"2010087":["http://www.owasp.org/index.php/SQL_Injection","http://doc.emergingthreats.net/2010087"],"2010088":["http://doc.emergingthreats.net/2010088"],"2010089":["http://doc.emergingthreats.net/2010089"],"2010097":["http://www.securityfocus.com/bid/14030","http://doc.emergingthreats.net/2010097"],"2010098":["http://www.securityfocus.com/bid/29614","http://xforce.iss.net/xforce/xfdb/42972","http://milw0rm.com/exploits/5764","http://doc.emergingthreats.net/2010098"],"2010121":["http://milw0rm.com/exploits/9249","http://xforce.iss.net/xforce/xfdb/51985","http://doc.emergingthreats.net/2010121"],"2010122":["http://secunia.com/advisories/35611/","http://www.exploit-db.com/exploits/9042/","http://doc.emergingthreats.net/2010122"],"2010123":["http://secunia.com/advisories/35611/","http://www.exploit-db.com/exploits/9042/","http://doc.emergingthreats.net/2010123"],"2010124":["http://www.securityfocus.com/bid/26747","http://milworm.com/exploits/9284","http://doc.emergingthreats.net/2010124"],"2010125":["http://www.securityfocus.com/bid/26747","http://milworm.com/exploits/9284","http://doc.emergingthreats.net/2010125"],"2010127":["http://milw0rm.com/exploits/9297","http://secunia.com/advisories/36033/","http://doc.emergingthreats.net/2010127"],"2010129":["http://doc.emergingthreats.net/2010129"],"2010131":["http://securitytracker.com/alerts/2009/Oct/1023017.html","http://www.bonsai-sec.com/research/vulnerabilities/achievo-sql-injection-0102.txt","http://www.securityfocus.com/bid/36660/info","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2734","http://doc.emergingthreats.net/2010131"],"2010132":["http://securitytracker.com/alerts/2009/Oct/1023017.html","http://www.bonsai-sec.com/research/vulnerabilities/achievo-sql-injection-0102.txt","http://www.securityfocus.com/bid/36660/info","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2734","http://doc.emergingthreats.net/2010132"],"2010133":["http://securitytracker.com/alerts/2009/Oct/1023017.html","http://www.bonsai-sec.com/research/vulnerabilities/achievo-sql-injection-0102.txt","http://www.securityfocus.com/bid/36660/info","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2734","http://doc.emergingthreats.net/2010133"],"2010134":["http://securitytracker.com/alerts/2009/Oct/1023017.html","http://www.bonsai-sec.com/research/vulnerabilities/achievo-sql-injection-0102.txt","http://www.securityfocus.com/bid/36660/info","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2734","http://doc.emergingthreats.net/2010134"],"2010135":["http://securitytracker.com/alerts/2009/Oct/1023017.html","http://www.bonsai-sec.com/research/vulnerabilities/achievo-sql-injection-0102.txt","http://www.securityfocus.com/bid/36660/info","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2734","http://doc.emergingthreats.net/2010135"],"2010137":["http://doc.emergingthreats.net/2010137"],"2010139":["http://vuze.com","http://doc.emergingthreats.net/2010139"],"2010140":["http://vuze.com","http://doc.emergingthreats.net/2010140"],"2010141":["http://vuze.com","http://doc.emergingthreats.net/2010141"],"2010142":["http://doc.emergingthreats.net/2010142"],"2010143":["http://doc.emergingthreats.net/2010143"],"2010144":["http://vuze.com","http://doc.emergingthreats.net/2010144"],"2010145":["http://www.securityfocus.com/bid/36721/info","http://www-01.ibm.com/support/docview.wss?uid=swg1PK83895","http://doc.emergingthreats.net/2010145"],"2010146":["http://www.securityfocus.com/bid/29502/info","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-1947","http://doc.emergingthreats.net/2010146"],"2010147":["http://www.securityfocus.com/bid/36700/info","http://doc.emergingthreats.net/2010147"],"2010150":["http://ddanchev.blogspot.com/2009/09/koobface-botnets-scareware-business.html","http://doc.emergingthreats.net/2010150"],"2010151":["http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/the_20heart_20of_20koobface_final_1_.pdf","http://doc.emergingthreats.net/2010151"],"2010152":["http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/the_20heart_20of_20koobface_final_1_.pdf","http://doc.emergingthreats.net/2010152"],"2010153":["http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/the_20heart_20of_20koobface_final_1_.pdf","http://doc.emergingthreats.net/2010153"],"2010157":["http://doc.emergingthreats.net/bin/view/Main/2010157"],"2010159":["http://securitytracker.com/alerts/2009/Oct/1023051.html","http://www.securityfocus.com/archive/1/507263","http://www.securityfocus.com/bid/36722/info","http://doc.emergingthreats.net/2010159"],"2010162":["http://securitytracker.com/alerts/2009/Apr/1022123.html","http://www.securityfocus.com/bid/34710","http://seclists.org/bugtraq/2009/Apr/242","http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr09-05","http://doc.emergingthreats.net/2010162"],"2010165":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3aWin32%2fHarnig","http://www.threatexpert.com/report.aspx?md5=2ce9c871a8a217cafcdce15c6c1e8dfc","http://doc.emergingthreats.net/2010165"],"2010167":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010167"],"2010168":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010168"],"2010169":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010169"],"2010170":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010170"],"2010171":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010171"],"2010172":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010172"],"2010173":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010173"],"2010174":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010174"],"2010175":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010175"],"2010176":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010176"],"2010177":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010177"],"2010178":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010178"],"2010179":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010179"],"2010180":["http://www.securityfocus.com/bid/36741/","http://doc.emergingthreats.net/2010180"],"2010181":["http://www.securityfocus.com/bid/36721/info","http://www-01.ibm.com/support/docview.wss?uid=swg1PK83895","http://doc.emergingthreats.net/2010181"],"2010182":["http://www.securityfocus.com/bid/36721/info","http://www-01.ibm.com/support/docview.wss?uid=swg1PK83895","http://doc.emergingthreats.net/2010182"],"2010183":["http://www.securityfocus.com/bid/36721/info","http://www-01.ibm.com/support/docview.wss?uid=swg1PK83895","http://doc.emergingthreats.net/2010183"],"2010184":["http://www.securityfocus.com/bid/36721/info","http://www-01.ibm.com/support/docview.wss?uid=swg1PK83895","http://doc.emergingthreats.net/2010184"],"2010185":["http://packetstormsecurity.org/0910-exploits/quickteam-sql.txt","http://doc.emergingthreats.net/2010185"],"2010186":["http://packetstormsecurity.org/0910-exploits/quickteam-sql.txt","http://doc.emergingthreats.net/2010186"],"2010187":["http://packetstormsecurity.org/0910-exploits/quickteam-sql.txt","http://doc.emergingthreats.net/2010187"],"2010188":["http://packetstormsecurity.org/0910-exploits/quickteam-sql.txt","http://doc.emergingthreats.net/2010188"],"2010189":["http://packetstormsecurity.org/0910-exploits/quickteam-sql.txt","http://doc.emergingthreats.net/2010189"],"2010194":["http://www.dsecrg.ru/pages/vul/show.php?id=152","http://www.vupen.com/english/advisories/2009/2285","http://doc.emergingthreats.net/2010194"],"2010195":["http://packetstormsecurity.org/0908-exploits/dscms-sql.txt","http://doc.emergingthreats.net/2010195"],"2010196":["http://secunia.com/advisories/36294/","http://osvdb.org/show/osvdb/57136","http://doc.emergingthreats.net/2010196"],"2010197":["http://osvdb.org/show/osvdb/57688","http://doc.emergingthreats.net/2010197"],"2010198":["http://secunia.com/advisories/36354","http://packetstormsecurity.nl/0908-exploits/autonomouslan-rfi.txt","http://doc.emergingthreats.net/2010198"],"2010200":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-5923","http://www.securityfocus.com/bid/26375/info","http://doc.emergingthreats.net/2010200"],"2010214":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1879","http://securitytracker.com/alerts/2009/Aug/1022748.html","http://doc.emergingthreats.net/2010214"],"2010215":["http://www.prevx.com/filenames/89385984947861762-X1/UIL2PN.EXE.html","http://doc.emergingthreats.net/2010215"],"2010220":["http://doc.emergingthreats.net/2010220"],"2010229":["http://securitytracker.com/alerts/2009/Oct/1023095.html","http://www.securityfocus.com/bid/36814/info","http://www.securityfocus.com/archive/1/507456","http://doc.emergingthreats.net/2010229"],"2010241":["http://www.threatexpert.com/report.aspx?md5=d9bcb4e4d650a6ed4402fab8f9ef1387","http://doc.emergingthreats.net/2010241"],"2010242":["http://www.threatexpert.com/report.aspx?md5=d9bcb4e4d650a6ed4402fab8f9ef1387","http://doc.emergingthreats.net/2010242"],"2010244":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3aWin32%2fObitel.gen!A","http://threatinfo.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_AGENT.ASLV&VSect=T","http://doc.emergingthreats.net/2010244"],"2010245":["http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00","http://www.securityfocus.com/bid/36698/info","http://sotiriu.de/adv/NSOADV-2009-001.txt","http://securitytracker.com/alerts/2009/Nov/1023122.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3031","http://doc.emergingthreats.net/2010245"],"2010247":["http://www.threatexpert.com/report.aspx?md5=d9bcb4e4d650a6ed4402fab8f9ef1387","http://doc.emergingthreats.net/2010247"],"2010254":["http://osvdb.org/show/osvdb/57679","http://doc.emergingthreats.net/2010254"],"2010255":["http://osvdb.org/show/osvdb/57680","http://doc.emergingthreats.net/2010255"],"2010259":["http://www.securityfocus.com/bid/36282","http://doc.emergingthreats.net/2010259"],"2010260":["http://osvdb.org/show/osvdb/59056","http://packetstormsecurity.org/0910-exploits/joomlaajaxchat-rfi.txt","http://doc.emergingthreats.net/2010260"],"2010261":["http://www.threatexpert.com/report.aspx?md5=d9bcb4e4d650a6ed4402fab8f9ef1387","http://doc.emergingthreats.net/2010261"],"2010265":["http://doc.emergingthreats.net/2010265"],"2010270":["http://www.secureworks.com/research/threats/danmecasprox/","http://www.toorcon.org/tcx/18_Brown.pdf","http://doc.emergingthreats.net/2010270"],"2010271":["http://osvdb.org/show/osvdb/59406","http://www.packetstormsecurity.org/0910-exploits/dedecms-sql.txt","http://doc.emergingthreats.net/2010271"],"2010272":["http://osvdb.org/show/osvdb/59406","http://www.packetstormsecurity.org/0910-exploits/dedecms-sql.txt","http://doc.emergingthreats.net/2010272"],"2010273":["http://osvdb.org/show/osvdb/59406","http://www.packetstormsecurity.org/0910-exploits/dedecms-sql.txt","http://doc.emergingthreats.net/2010273"],"2010274":["http://osvdb.org/show/osvdb/59406","http://www.packetstormsecurity.org/0910-exploits/dedecms-sql.txt","http://doc.emergingthreats.net/2010274"],"2010275":["http://osvdb.org/show/osvdb/59406","http://www.packetstormsecurity.org/0910-exploits/dedecms-sql.txt","http://doc.emergingthreats.net/2010275"],"2010276":["http://osvdb.org/show/osvdb/58298","http://doc.emergingthreats.net/2010276"],"2010284":["http://www.psoug.org/reference/substr_instr.html","http://www.easywebtech.com/artical/Oracle_INSTR.html","http://www.owasp.org/index.php/SQL_Injection","http://msdn.microsoft.com/en-us/library/ms161953.aspx","http://doc.emergingthreats.net/2010284"],"2010285":["http://www.1keydata.com/sql/sql-substring.html","http://www.owasp.org/index.php/SQL_Injection","http://msdn.microsoft.com/en-us/library/ms161953.aspx","http://doc.emergingthreats.net/2010285"],"2010288":["http://www.f-secure.com/v-descs/trojan_w32_scar_a.shtml","http://doc.emergingthreats.net/2010288"],"2010334":["http://www.f-secure.com/v-descs/trojan-proxy_w32_kvadr_gen!a.shtml","http://www.threatexpert.com/report.aspx?md5=fd2d6bb1d2a9803c49f1e175d558a934","http://www.threatexpert.com/report.aspx?md5=e4664144f8e95cfec510d5efa24a35e7","http://doc.emergingthreats.net/2010334"],"2010344":["http://doc.emergingthreats.net/2010344","http://www.threatexpert.com/report.aspx?md5=9fbd691ffdb797cebe8761006b26b572"],"2010345":["http://doc.emergingthreats.net/2010345","http://www.threatexpert.com/report.aspx?md5=9fbd691ffdb797cebe8761006b26b572"],"2010349":["http://www.securityfocus.com/bid/36809","http://www.packetstormsecurity.org/0910-exploits/joomlaphotoblog-sql.txt","http://doc.emergingthreats.net/2010349"],"2010350":["http://www.securityfocus.com/bid/36809","http://www.packetstormsecurity.org/0910-exploits/joomlaphotoblog-sql.txt","http://doc.emergingthreats.net/2010350"],"2010351":["http://www.securityfocus.com/bid/36809","http://www.packetstormsecurity.org/0910-exploits/joomlaphotoblog-sql.txt","http://doc.emergingthreats.net/2010351"],"2010352":["http://www.securityfocus.com/bid/36809","http://www.packetstormsecurity.org/0910-exploits/joomlaphotoblog-sql.txt","http://doc.emergingthreats.net/2010352"],"2010353":["http://www.securityfocus.com/bid/36809","http://www.packetstormsecurity.org/0910-exploits/joomlaphotoblog-sql.txt","http://doc.emergingthreats.net/2010353"],"2010354":["http://www.securityfocus.com/bid/36822","http://doc.emergingthreats.net/2010354"],"2010355":["http://osvdb.org/show/osvdb/57869","http://secunia.com/advisories/36658/","http://doc.emergingthreats.net/2010355"],"2010362":["http://osvdb.org/show/osvdb/55485","http://doc.emergingthreats.net/2010362"],"2010371":["http://freeworld.thc.org/thc-amap/","http://doc.emergingthreats.net/2010371"],"2010372":["http://freeworld.thc.org/thc-amap/","http://doc.emergingthreats.net/2010372"],"2010375":["http://www.securityfocus.com/bid/36748","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1991","http://doc.emergingthreats.net/2010375"],"2010379":["http://www.notsosecure.com/folder2/2009/10/27/hacking-jboss-with-jmx-console/","http://www.nruns.com/_downloads/Whitepaper-Hacking-jBoss-using-a-Browser.pdf","http://doc.emergingthreats.net/2010379"],"2010380":["http://www.notsosecure.com/folder2/2009/10/27/hacking-jboss-with-jmx-console/","http://www.nruns.com/_downloads/Whitepaper-Hacking-jBoss-using-a-Browser.pdf","http://doc.emergingthreats.net/2010380"],"2010381":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3aWin32%2fSyrutrk.A","http://www.threatexpert.com/report.aspx?md5=a5f94577d00d0306e4ef64bad30e5d37","http://www.threatexpert.com/report.aspx?md5=011d403b345672adc29846074e717865","http://doc.emergingthreats.net/2010381"],"2010382":["http://threatexpert.com/report.aspx?md5=8d1b47452307259f1e191e16ed23cd35","http://doc.emergingthreats.net/2010382"],"2010439":["http://doc.emergingthreats.net/2010439"],"2010457":["http://www.securityfocus.com/bid/35475/info","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1203","http://doc.emergingthreats.net/2010457"],"2010458":["http://doc.emergingthreats.net/2010458"],"2010460":["http://www.securityfocus.com/bid/29191/info","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-2165","http://doc.emergingthreats.net/2010460"],"2010461":["http://doc.emergingthreats.net/2010461"],"2010462":["http://www.securityfocus.com/bid/37248/info","http://doc.emergingthreats.net/2010462"],"2010463":["http://doc.emergingthreats.net/2010463","http://opinion.josepino.com/php/howto_website_hack1"],"2010466":["http://www.packetstormsecurity.nl/0911-exploits/pointcomma-rfi.txt","http://doc.emergingthreats.net/2010466"],"2010473":["http://osvdb.org/show/osvdb/56763","http://doc.emergingthreats.net/2010473"],"2010474":["http://www.securityfocus.com/bid/37043","http://doc.emergingthreats.net/2010474"],"2010475":["http://www.packetstormsecurity.nl/0911-exploits/krweb-rfi.txt","http://doc.emergingthreats.net/2010475"],"2010476":["http://www.securityfocus.com/bid/36808","http://www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt","http://doc.emergingthreats.net/2010476"],"2010477":["http://www.securityfocus.com/bid/36808","http://www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt","http://doc.emergingthreats.net/2010477"],"2010478":["http://www.securityfocus.com/bid/36808","http://www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt","http://doc.emergingthreats.net/2010478"],"2010479":["http://www.securityfocus.com/bid/36808","http://www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt","http://doc.emergingthreats.net/2010479"],"2010480":["http://www.securityfocus.com/bid/36808","http://www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt","http://doc.emergingthreats.net/2010480"],"2010484":["http://osvdb.org/show/osvdb/55751","http://doc.emergingthreats.net/2010484"],"2010485":["http://www.packetstormsecurity.nl/0911-exploits/phptraverse-rfi.txt","http://doc.emergingthreats.net/2010485"],"2010490":["http://www.symantec.com/security_response/writeup.jsp?docid=2004-112111-3912-99","http://doc.emergingthreats.net/2010490"],"2010493":["http://www.cyberciti.biz/tips/how-do-i-enable-remote-access-to-mysql-database-server.html","http://doc.emergingthreats.net/2010493"],"2010494":["http://doc.emergingthreats.net/2010494"],"2010495":["http://www.metasploit.com/redmine/projects/framework/repository/revisions/7881/entry/modules/exploits/windows/fileformat/adobe_media_newplayer.rb","http://vrt-sourcefire.blogspot.com/2009/12/adobe-reader-medianewplayer-analysis.html","http://www.securityfocus.com/bid/37331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-4324"],"2010505":["http://www.securityfocus.com/bid/34307/info","http://tools.cisco.com/security/center/viewAlert.x?alertId=17950","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1220","http://doc.emergingthreats.net/2010505"],"2010506":["http://www.securityfocus.com/bid/29191/info","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-2165","http://doc.emergingthreats.net/2010506"],"2010507":["http://securitytracker.com/alerts/2009/Dec/1023331.html","http://doc.emergingthreats.net/2010507"],"2010508":["http://springenwerk.org/","http://doc.emergingthreats.net/2010508"],"2010509":["http://securiteam.com/exploits/6O00C1FQAS.html","http://doc.emergingthreats.net/2010509"],"2010510":["http://doc.emergingthreats.net/2010510"],"2010511":["http://securiteam.com/exploits/6P00D1FQAG.html","http://doc.emergingthreats.net/2010511"],"2010512":["http://isc.sans.org/diary.html?storyid=7768","http://doc.emergingthreats.net/2010512"],"2010513":["http://doc.emergingthreats.net/2010513"],"2010514":["http://doc.emergingthreats.net/2010514"],"2010515":["http://doc.emergingthreats.net/2010515"],"2010519":["http://doc.emergingthreats.net/2010519"],"2010520":["http://doc.emergingthreats.net/2010520"],"2010521":["http://doc.emergingthreats.net/2010521"],"2010522":["http://doc.emergingthreats.net/2010522"],"2010524":["http://doc.emergingthreats.net/2010524"],"2010525":["http://doc.emergingthreats.net/2010525"],"2010526":["http://doc.emergingthreats.net/2010526"],"2010527":["http://doc.emergingthreats.net/2010527"],"2010528":["http://milw0rm.org/exploits/9733","http://doc.emergingthreats.net/2010528"],"2010529":["http://milw0rm.org/exploits/9732","http://doc.emergingthreats.net/2010529"],"2010530":["http://www.exploit-db.com/exploits/9729/","http://doc.emergingthreats.net/2010530"],"2010535":["http://packetstormsecurity.org/0912-exploits/joomlacp-sql.txt","http://doc.emergingthreats.net/2010535"],"2010536":["http://packetstormsecurity.org/0912-exploits/joomlacp-sql.txt","http://doc.emergingthreats.net/2010536"],"2010537":["http://packetstormsecurity.org/0912-exploits/joomlazal-sql.txt","http://doc.emergingthreats.net/2010537"],"2010538":["http://packetstormsecurity.org/0912-exploits/joomlazal-sql.txt","http://doc.emergingthreats.net/2010538"],"2010539":["http://packetstormsecurity.org/0903-exploits/joomladigistore-sql.txt","http://doc.emergingthreats.net/2010539"],"2010540":["http://packetstormsecurity.org/filedesc/joomlajbook-sql.txt.html","http://doc.emergingthreats.net/2010540"],"2010541":["http://packetstormsecurity.org/0912-exploits/joomlapersonel-sql.txt","http://doc.emergingthreats.net/2010541"],"2010542":["http://packetstormsecurity.org/0912-exploits/joomlaportfolio-sql.txt","http://doc.emergingthreats.net/2010542"],"2010543":["http://packetstormsecurity.org/0912-exploits/f3site2009-lfi.txt","http://doc.emergingthreats.net/2010543"],"2010544":["http://packetstormsecurity.org/0912-exploits/f3site2009-lfi.txt","http://doc.emergingthreats.net/2010544"],"2010547":["http://packetstormsecurity.org/0912-exploits/barracuda-inject.txt","http://doc.emergingthreats.net/2010547"],"2010548":["http://packetstormsecurity.org/0912-exploits/barracuda-inject.txt","http://doc.emergingthreats.net/2010548"],"2010549":["http://packetstormsecurity.org/0912-exploits/barracuda-inject.txt","http://doc.emergingthreats.net/2010549"],"2010550":["http://packetstormsecurity.org/0912-exploits/barracuda-inject.txt","http://doc.emergingthreats.net/2010550"],"2010553":["http://milw0rm.com/exploits/3334","http://packetstormsecurity.org/0912-exploits/phpnukeemporium-sql.txt","http://doc.emergingthreats.net/2010553"],"2010555":["http://www.securityfocus.com/bid/37178","http://secunia.com/advisories/37535/","http://doc.emergingthreats.net/2010555"],"2010556":["http://www.securityfocus.com/bid/37178","http://secunia.com/advisories/37535/","http://doc.emergingthreats.net/2010556"],"2010557":["http://www.securityfocus.com/bid/37178","http://secunia.com/advisories/37535/","http://doc.emergingthreats.net/2010557"],"2010558":["http://www.securityfocus.com/bid/37178","http://secunia.com/advisories/37535/","http://doc.emergingthreats.net/2010558"],"2010559":["http://www.securityfocus.com/bid/37178","http://secunia.com/advisories/37535/","http://doc.emergingthreats.net/2010559"],"2010564":["http://www.securityfocus.com/bid/23334","http://doc.emergingthreats.net/2010564"],"2010592":["http://www.securityfocus.com/bid/37460/info","http://doc.emergingthreats.net/2010592","http://www.securityfocus.com/bid/37460/info","http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-4444"],"2010593":["http://www.securityfocus.com/bid/37460/info","http://doc.emergingthreats.net/2010593","http://www.securityfocus.com/bid/37460/info","http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-4444"],"2010595":["http://doc.emergingthreats.net/2010595"],"2010597":["http://microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Rogue%3AWin32/FakeSpypro","http://www.malwaredomainlist.com/forums/index.php?topic=3190.420","http://doc.emergingthreats.net/2010597"],"2010599":["http://doc.emergingthreats.net/2010599"],"2010602":["http://www.securityfocus.com/bid/37446/info","http://doc.emergingthreats.net/2010602"],"2010604":["http://www.securityfocus.com/bid/37541/info","http://doc.emergingthreats.net/2010604"],"2010605":["http://www.packetstormsecurity.org/0912-exploits/mambovfl-sql.txt","http://doc.emergingthreats.net/2010605"],"2010606":["http://www.packetstormsecurity.org/0912-exploits/joomlakkcontent-sql.txt","http://doc.emergingthreats.net/2010606"],"2010607":["http://www.packetstormsecurity.org/0912-exploits/xoopsdictionary-sql.txt","http://doc.emergingthreats.net/2010607"],"2010608":["http://www.packetstormsecurity.org/0912-exploits/galleryshow-sql.txt","http://doc.emergingthreats.net/2010608"],"2010609":["http://www.www.packetstormsecurity.org/0912-exploits/helpdesk-sql.txt","http://doc.emergingthreats.net/2010609"],"2010610":["http://www.packetstormsecurity.org/0912-exploits/roseonlinecms-lfi.txt","http://doc.emergingthreats.net/2010610"],"2010615":["http://osvdb.org/show/osvdb/59194","http://xforce.iss.net/xforce/xfdb/51650","http://doc.emergingthreats.net/2010615"],"2010616":["http://osvdb.org/show/osvdb/59194","http://xforce.iss.net/xforce/xfdb/51650","http://doc.emergingthreats.net/2010616"],"2010617":["http://osvdb.org/show/osvdb/59194","http://xforce.iss.net/xforce/xfdb/51650","http://doc.emergingthreats.net/2010617"],"2010618":["http://osvdb.org/show/osvdb/59194","http://xforce.iss.net/xforce/xfdb/51650","http://doc.emergingthreats.net/2010618"],"2010619":["http://osvdb.org/show/osvdb/59194","http://xforce.iss.net/xforce/xfdb/51650","http://doc.emergingthreats.net/2010619"],"2010620":["http://xforce.iss.net/xforce/xfdb/54662","http://www.exploit-db.com/exploits/10369","http://doc.emergingthreats.net/2010620"],"2010621":["http://doc.emergingthreats.net/2009029","http://www.Whitehatsecurityresponse.blogspot.com"],"2010622":["http://www.securityfocus.com/bid/34454/info","http://doc.emergingthreats.net/2010622"],"2010623":["http://doc.emergingthreats.net/2010623"],"2010625":["http://www.bleepingcomputer.com/forums/lofiversion/index.php/t247125.html","http://doc.emergingthreats.net/2010625"],"2010626":["http://www.threatexpert.com/report.aspx?md5=f5e907a11831c757a94cde9257b3574c","http://doc.emergingthreats.net/2010626"],"2010627":["http://www.threatexpert.com/report.aspx?md5=f5e907a11831c757a94cde9257b3574c","http://doc.emergingthreats.net/2010627"],"2010628":["http://www.threatexpert.com/report.aspx?md5=f5e907a11831c757a94cde9257b3574c","http://doc.emergingthreats.net/2010628"],"2010630":["http://doc.emergingthreats.net/2010630"],"2010631":["http://osvdb.org/show/osvdb/56583","http://www.exploit-db.com/exploits/9018/","http://doc.emergingthreats.net/2010631"],"2010636":["http://www.securityfocus.com/bid/37279","http://doc.emergingthreats.net/2010636"],"2010637":["http://www.securityfocus.com/bid/37279","http://doc.emergingthreats.net/2010637"],"2010638":["http://www.securityfocus.com/bid/37279","http://doc.emergingthreats.net/2010638"],"2010639":["http://www.securityfocus.com/bid/37279","http://doc.emergingthreats.net/2010639"],"2010640":["http://www.securityfocus.com/bid/37279","http://doc.emergingthreats.net/2010640"],"2010641":["http://doc.emergingthreats.net/2010641"],"2010642":["http://doc.emergingthreats.net/2010642"],"2010643":["http://doc.emergingthreats.net/2010643"],"2010645":["http://doc.emergingthreats.net/2010645"],"2010646":["http://www.m86security.com/trace/spambotitem.asp?article=1205","http://doc.emergingthreats.net/2010646"],"2010652":["http://www.exploit-db.com/exploits/10479","http://doc.emergingthreats.net/2010652"],"2010653":["http://www.exploit-db.com/exploits/10479","http://doc.emergingthreats.net/2010653"],"2010654":["http://www.exploit-db.com/exploits/10479","http://doc.emergingthreats.net/2010654"],"2010655":["http://www.exploit-db.com/exploits/10479","http://doc.emergingthreats.net/2010655"],"2010656":["http://www.exploit-db.com/exploits/10479","http://doc.emergingthreats.net/2010656"],"2010657":["http://secunia.com/advisories/24199/","http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/oracle_dc_submittoexpress.rb","http://doc.emergingthreats.net/2010657"],"2010658":["http://secunia.com/advisories/24199/","http://doc.emergingthreats.net/2010658"],"2010659":["http://www.packetstormsecurity.nl/0912-exploits/joomlamojoblog-rfi.txt","http://www.securityfocus.com/bid/37179","http://doc.emergingthreats.net/2010659"],"2010660":["http://www.packetstormsecurity.nl/0912-exploits/joomlamojoblog-rfi.txt","http://www.securityfocus.com/bid/37179","http://doc.emergingthreats.net/2010660"],"2010661":["http://www.exploit-db.com/exploits/10697","http://doc.emergingthreats.net/2010661"],"2010664":["http://www.securityfocus.com/bid/37763","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3956","http://doc.emergingthreats.net/2010664","http://www.stratsec.net/files/SS-2010-001_Stratsec_Acrobat_Script_Injection_Security_Advisory_v1.0.pdf"],"2010665":["http://www.securityfocus.com/bid/37759","http://www.kb.cert.org/vuls/id/773545","http://www.adobe.com/support/security/bulletins/apsb10-02.html","http://www.exploit-db.com/exploits/11172/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3958","http://doc.emergingthreats.net/2010665"],"2010667":["http://doc.emergingthreats.net/2010667"],"2010669":["http://www.securityfocus.com/bid/37802/info","http://doc.emergingthreats.net/2010669"],"2010670":["http://www.securityfocus.com/bid/37802/info","http://doc.emergingthreats.net/2010670"],"2010672":["http://www.securityfocus.com/bid/37802/info","http://doc.emergingthreats.net/2010672"],"2010673":["http://www.securityfocus.com/bid/37802/info","http://doc.emergingthreats.net/2010673"],"2010675":["http://doc.emergingthreats.net/2010675"],"2010676":["http://doc.emergingthreats.net/2010676"],"2010677":["http://doc.emergingthreats.net/2010677"],"2010678":["http://doc.emergingthreats.net/2010678"],"2010679":["http://doc.emergingthreats.net/2010679"],"2010680":["http://doc.emergingthreats.net/2010680"],"2010681":["http://www.koders.com/delphi/fid942A4EAF946B244BD3CD9BC83FEAAC35BA1F38AB.aspx","http://doc.emergingthreats.net/2010681"],"2010686":["http://doc.emergingthreats.net/2010686"],"2010695":["http://www.trustedsource.org/blog/373/An-Insight-into-the-Aurora-Communication-Protocol","http://doc.emergingthreats.net/2010695"],"2010698":["http://www.securityfocus.com/bid/37690","http://doc.emergingthreats.net/2010698"],"2010699":["http://www.securityfocus.com/bid/36933","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2685","http://doc.emergingthreats.net/2010699"],"2010700":["http://doc.emergingthreats.net/2010700"],"2010701":["http://www.packetstormsecurity.org/1001-exploits/vbulletin401-sql.txt","http://doc.emergingthreats.net/2010701"],"2010704":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-4179","http://doc.emergingthreats.net/2010704"],"2010705":["http://www.packetstormsecurity.nl/0911-exploits/acropdf-dos.txt","http://doc.emergingthreats.net/2010705"],"2010707":["http://www.exploit-db.com/exploits/10682","http://doc.emergingthreats.net/2010707"],"2010708":["http://www.exploit-db.com/exploits/10682","http://doc.emergingthreats.net/2010708"],"2010709":["http://www.exploit-db.com/exploits/10682","http://doc.emergingthreats.net/2010709"],"2010710":["http://www.securityfocus.com/bid/36425","http://doc.emergingthreats.net/2010710"],"2010711":["http://www.securityfocus.com/bid/36425","http://doc.emergingthreats.net/2010711"],"2010712":["http://www.securityfocus.com/bid/36425","http://doc.emergingthreats.net/2010712"],"2010713":["http://www.securityfocus.com/bid/36425","http://doc.emergingthreats.net/2010713"],"2010714":["http://www.securityfocus.com/bid/36425","http://doc.emergingthreats.net/2010714"],"2010715":["http://doc.emergingthreats.net/2010715"],"2010717":["http://doc.emergingthreats.net/2010717"],"2010719":["http://seclists.org/fulldisclosure/2010/Jan/480","http://www.e107.org/news.php","http://doc.emergingthreats.net/2010719"],"2010720":["http://doc.emergingthreats.net/2010720"],"2010725":["http://httpd.apache.org/docs/2.0/programs/ab.html/","http://doc.emergingthreats.net/2010725"],"2010726":["http://www.packetstormsecurity.nl/0911-exploits/acropdf-dos.txt","http://doc.emergingthreats.net/2010726"],"2010727":["http://doc.emergingthreats.net/2010727"],"2010728":["http://www.securityfocus.com/bid/35584","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2334","http://doc.emergingthreats.net/2010728"],"2010730":["http://tools.cisco.com/security/center/viewAlert.x?alertId=18442","http://www.securityfocus.com/archive/1/504516","http://www.securityfocus.com/bid/35476","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1201","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1202","http://doc.emergingthreats.net/2010730"],"2010741":["http://anubis.iseclab.org/?action=result&task_id=11873c8979f34c8d4fd0da512df635cac&format=txt","http://doc.emergingthreats.net/2010741"],"2010743":["http://www.threatexpert.com/report.aspx?md5=f71d48a86776f8c0da4d7a46257ff97c","http://doc.emergingthreats.net/2010743"],"2010745":["http://www.kb.cert.org/vuls/id/914785","http://www.packetstormsecurity.nl/0911-exploits/softartisans_getdrivename.rb.txt","http://osvdb.org/47794","http://doc.emergingthreats.net/2010745"],"2010746":["http://www.kb.cert.org/vuls/id/914785","http://www.packetstormsecurity.nl/0911-exploits/softartisans_getdrivename.rb.txt","http://osvdb.org/47794","http://doc.emergingthreats.net/2010746"],"2010747":["http://www.kb.cert.org/vuls/id/914785","http://www.packetstormsecurity.nl/0911-exploits/softartisans_getdrivename.rb.txt","http://osvdb.org/47794","http://doc.emergingthreats.net/2010747"],"2010748":["http://www.kb.cert.org/vuls/id/914785","http://www.packetstormsecurity.nl/0911-exploits/softartisans_getdrivename.rb.txt","http://osvdb.org/47794","http://doc.emergingthreats.net/2010748"],"2010749":["http://www.kb.cert.org/vuls/id/914785","http://www.packetstormsecurity.nl/0911-exploits/softartisans_getdrivename.rb.txt","http://osvdb.org/47794","http://doc.emergingthreats.net/2010749"],"2010750":["http://www.securityfocus.com/bid/37146","http://www.packetstormsecurity.nl/0911-exploits/joomlamg-sql.txt","http://doc.emergingthreats.net/2010750"],"2010751":["http://www.securityfocus.com/bid/37146","http://www.packetstormsecurity.nl/0911-exploits/joomlamg-sql.txt","http://doc.emergingthreats.net/2010751"],"2010752":["http://www.securityfocus.com/bid/37146","http://www.packetstormsecurity.nl/0911-exploits/joomlamg-sql.txt","http://doc.emergingthreats.net/2010752"],"2010753":["http://www.securityfocus.com/bid/37146","http://www.packetstormsecurity.nl/0911-exploits/joomlamg-sql.txt","http://doc.emergingthreats.net/2010753"],"2010754":["http://www.securityfocus.com/bid/37146","http://www.packetstormsecurity.nl/0911-exploits/joomlamg-sql.txt","http://doc.emergingthreats.net/2010754"],"2010756":["http://www.fortiguard.com/analysis/sasfisanalysis.html","http://doc.emergingthreats.net/2010756"],"2010757":["http://doc.emergingthreats.net/2010757"],"2010758":["http://www.securityfocus.com/bid/37832/info","http://doc.emergingthreats.net/2010758"],"2010761":["http://www.securityfocus.com/bid/37843","http://doc.emergingthreats.net/2010761"],"2010763":["http://www.securityfocus.com/bid/37843","http://doc.emergingthreats.net/2010763"],"2010765":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Backdoor%3aWin32%2fKoceg.gen!B","http://www.symantec.com/security_response/writeup.jsp?docid=2008-042816-0445-99&tabid=2","http://www.threatexpert.com/report.aspx?md5=b2aad8e259cbfdd2ba1fcbf22bcee2e9","http://doc.emergingthreats.net/2010765"],"2010766":["http://doc.emergingthreats.net/2010766"],"2010768":["http://www.botsvsbrowsers.com/details/214715/index.html","http://doc.emergingthreats.net/2010768"],"2010770":["http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02000727","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-4185","http://doc.emergingthreats.net/2010770"],"2010771":["http://www.packetstormsecurity.org/0912-exploits/asaherpro-rfi.txt","http://doc.emergingthreats.net/2010771"],"2010772":["http://www.packetstormsecurity.org/0912-exploits/asaherpro-rfi.txt","http://doc.emergingthreats.net/2010772"],"2010773":["http://www.packetstormsecurity.org/0912-exploits/asaherpro-rfi.txt","http://doc.emergingthreats.net/2010773"],"2010774":["http://www.packetstormsecurity.org/0912-exploits/asaherpro-rfi.txt","http://doc.emergingthreats.net/2010774"],"2010775":["http://www.packetstormsecurity.org/0912-exploits/asaherpro-rfi.txt","http://doc.emergingthreats.net/2010775"],"2010776":["http://www.packetstormsecurity.org/0912-exploits/asaherpro-rfi.txt","http://doc.emergingthreats.net/2010776"],"2010777":["http://www.packetstormsecurity.org/0912-exploits/asaherpro-rfi.txt","http://doc.emergingthreats.net/2010777"],"2010780":["http://www.securityfocus.com/bid/37440","http://doc.emergingthreats.net/2010780"],"2010781":["http://xinn.org/Snort-psexec.html","http://doc.emergingthreats.net/2010781"],"2010782":["http://xinn.org/Snort-rctrlx.html","http://doc.emergingthreats.net/2010782"],"2010784":["http://doc.emergingthreats.net/2010784"],"2010785":["http://doc.emergingthreats.net/2010785"],"2010786":["http://doc.emergingthreats.net/2010786"],"2010787":["http://www.malwaredomainlist.com/mdl.php?search=knock.php","http://doc.emergingthreats.net/2010787"],"2010788":["http://www.malwaredomainlist.com/mdl.php?search=knock.php","http://doc.emergingthreats.net/2010788"],"2010794":["http://doc.emergingthreats.net/2010794"],"2010795":["http://doc.emergingthreats.net/2010795"],"2010798":["http://www.securityfocus.com/bid/37884","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0027","http://doc.emergingthreats.net/2010798"],"2010799":["http://www.microsoft.com/technet/security/bulletin/ms10-002.mspx","http://tools.cisco.com/security/center/viewAlert.x?alertId=19726","http://www.kb.cert.org/vuls/id/492515","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0249","http://doc.emergingthreats.net/2010799"],"2010800":["http://secunia.com/advisories/38113/","http://doc.emergingthreats.net/2010800"],"2010801":["http://secunia.com/advisories/38113/","http://doc.emergingthreats.net/2010801"],"2010802":["http://secunia.com/advisories/38113/","http://doc.emergingthreats.net/2010802"],"2010803":["http://secunia.com/advisories/38113/","http://doc.emergingthreats.net/2010803"],"2010804":["http://secunia.com/advisories/38113/","http://doc.emergingthreats.net/2010804"],"2010805":["http://www.securityfocus.com/bid/38022","http://doc.emergingthreats.net/2010805"],"2010806":["http://www.securityfocus.com/bid/38022","http://doc.emergingthreats.net/2010806"],"2010807":["http://www.securityfocus.com/bid/38022","http://doc.emergingthreats.net/2010807"],"2010808":["http://www.securityfocus.com/bid/38022","http://doc.emergingthreats.net/2010808"],"2010809":["http://www.securityfocus.com/bid/38022","http://doc.emergingthreats.net/2010809"],"2010813":["http://www.securityfocus.com/bid/35500/info","http://doc.emergingthreats.net/2010813"],"2010819":["http://www.facebook.com/sitetour/chat.php","http://doc.emergingthreats.net/2010819"],"2010820":["http://seclists.org/fulldisclosure/2009/Sep/0321.html","http://doc.emergingthreats.net/2010820"],"2010833":["http://www.exploit-db.com/exploits/10730","http://doc.emergingthreats.net/2010833"],"2010838":["http://www.bluetack.co.uk/forums/lofiversion/index.php/t18462.html","http://doc.emergingthreats.net/2010838"],"2010842":["http://www.securityfocus.com/bid/37576","http://doc.emergingthreats.net/2010842"],"2010843":["http://www.securityfocus.com/bid/37576","http://doc.emergingthreats.net/2010843"],"2010844":["http://www.securityfocus.com/bid/37576","http://doc.emergingthreats.net/2010844"],"2010845":["http://www.securityfocus.com/bid/37576","http://doc.emergingthreats.net/2010845"],"2010846":["http://www.securityfocus.com/bid/37576","http://doc.emergingthreats.net/2010846"],"2010847":["http://www.exploit-db.com/exploits/10754","http://doc.emergingthreats.net/2010847"],"2010848":["http://secdb.4sec.org/?s1=exp&sid=18773","http://doc.emergingthreats.net/2010848"],"2010853":["http://packetstorm.foofus.com/1002-exploits/joomlajobcom-sql.txt","http://doc.emergingthreats.net/2010853"],"2010854":["http://packetstorm.foofus.com/1002-exploits/joomlajobcom-sql.txt","http://doc.emergingthreats.net/2010854"],"2010855":["http://packetstorm.foofus.com/1002-exploits/joomlajobcom-sql.txt","http://doc.emergingthreats.net/2010855"],"2010856":["http://packetstorm.foofus.com/1002-exploits/joomlajobcom-sql.txt","http://doc.emergingthreats.net/2010856"],"2010857":["http://packetstorm.foofus.com/1002-exploits/joomlajobcom-sql.txt","http://doc.emergingthreats.net/2010857"],"2010862":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1798","http://doc.emergingthreats.net/2010862"],"2010863":["http://www.coresecurity.com/content/landesk-csrf-vulnerability","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0369","http://doc.emergingthreats.net/2010863"],"2010864":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-0921","http://doc.emergingthreats.net/2010864"],"2010865":["http://www.securityfocus.com/bid/38481","http://doc.emergingthreats.net/2010865"],"2010868":["http://doc.emergingthreats.net/2010868"],"2010875":["http://doc.emergingthreats.net/2010875"],"2010883":["http://isc.sans.org/diary.html?storyid=1519","http://isc.sans.org/diary.html?storyid=7906","http://doc.emergingthreats.net/2010883"],"2010885":["http://www.secureworks.com/research/threats/blackenergy2/?threat=blackenergy2","http://doc.emergingthreats.net/2010885"],"2010886":["http://www.secureworks.com/research/threats/blackenergy2/?threat=blackenergy2","http://doc.emergingthreats.net/2010886"],"2010888":["http://doc.emergingthreats.net/2010888"],"2010889":["http://doc.emergingthreats.net/2010889"],"2010902":["http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/","http://doc.emergingthreats.net/2010902"],"2010903":["http://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/","http://doc.emergingthreats.net/2010903"],"2010919":["http://dsecrg.com/pages/vul/show.php?id=148","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2684","http://doc.emergingthreats.net/2010919"],"2010920":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://doc.emergingthreats.net/2010920"],"2010921":["http://www.packetstormsecurity.nl/0911-exploits/ask_shortformat.rb.txt","http://secunia.com/advisories/26960/","http://doc.emergingthreats.net/2010921"],"2010922":["http://www.packetstormsecurity.org/0912-exploits/saurus-rfi.txt","http://doc.emergingthreats.net/2010922"],"2010923":["http://www.packetstormsecurity.org/0912-exploits/saurus-rfi.txt","http://doc.emergingthreats.net/2010923"],"2010924":["http://www.exploit-db.com/exploits/11103","http://doc.emergingthreats.net/2010924"],"2010925":["http://www.exploit-db.com/exploits/11103","http://doc.emergingthreats.net/2010925"],"2010926":["http://www.exploit-db.com/exploits/11103","http://doc.emergingthreats.net/2010926"],"2010927":["http://www.exploit-db.com/exploits/11103","http://doc.emergingthreats.net/2010927"],"2010928":["http://www.exploit-db.com/exploits/11103","http://doc.emergingthreats.net/2010928"],"2010932":["http://doc.emergingthreats.net/2010932"],"2010934":["http://doc.emergingthreats.net/2010934"],"2010935":["http://doc.emergingthreats.net/2010935"],"2010936":["http://doc.emergingthreats.net/2010936"],"2010937":["http://doc.emergingthreats.net/2010937"],"2010938":["http://doc.emergingthreats.net/2010938"],"2010939":["http://doc.emergingthreats.net/2010939"],"2010942":["http://www.exploit-db.com/exploits/11088","http://doc.emergingthreats.net/2010942"],"2010943":["http://secunia.com/advisories/37967/","http://doc.emergingthreats.net/2010943"],"2010944":["http://www.shinnai.net/exploits/X6hU4E0E7P5H3qH5yXrn.txt","http://secunia.com/advisories/38156/","http://doc.emergingthreats.net/2010944"],"2010945":["http://www.shinnai.net/exploits/pD9YWswsoR3EIcE9bf3N.txt","http://doc.emergingthreats.net/2010945"],"2010946":["http://www.shinnai.net/exploits/pD9YWswsoR3EIcE9bf3N.txt","http://doc.emergingthreats.net/2010946"],"2010947":["http://secunia.com/advisories/38691/","http://doc.emergingthreats.net/2010947"],"2010948":["http://secunia.com/advisories/38691/","http://doc.emergingthreats.net/2010948"],"2010949":["http://secunia.com/advisories/38691/","http://doc.emergingthreats.net/2010949"],"2010950":["http://secunia.com/advisories/38691/","http://doc.emergingthreats.net/2010950"],"2010951":["http://secunia.com/advisories/38691/","http://doc.emergingthreats.net/2010951"],"2010953":["http://isc.sans.org/diary.html?storyid=8467","http://code.google.com/p/skipfish/","http://doc.emergingthreats.net/2010953"],"2010954":["http://doc.emergingthreats.net/2010954"],"2010956":["http://isc.sans.org/diary.html?storyid=8467","http://code.google.com/p/skipfish/","http://doc.emergingthreats.net/2010956"],"2010960":["http://www.morningstarsecurity.com/research/whatweb","http://doc.emergingthreats.net/2010960"],"2010963":["http://en.wikipedia.org/wiki/SQL_injection","http://doc.emergingthreats.net/2010963"],"2010964":["http://en.wikipedia.org/wiki/SQL_injection","http://dev.mysql.com/doc/refman/5.0/en/show-character-set.html","http://doc.emergingthreats.net/2010964"],"2010965":["http://en.wikipedia.org/wiki/SQL_injection","http://dev.mysql.com/doc/refman/5.1/en/server-system-variables.html","http://doc.emergingthreats.net/2010965"],"2010966":["http://en.wikipedia.org/wiki/SQL_injection","http://dev.mysql.com/doc/refman/5.1/en/date-and-time-functions.html#function_curdate","http://dev.mysql.com/doc/refman/5.1/en/date-and-time-functions.html#function_curtime","http://doc.emergingthreats.net/2010966"],"2010967":["http://en.wikipedia.org/wiki/SQL_injection","http://dev.mysql.com/doc/refman/4.1/en/show-tables.html","http://doc.emergingthreats.net/2010967"],"2010968":["http://www.kb.cert.org/vuls/id/570177","http://www.h-online.com/security/news/item/Criminals-attempt-to-exploit-unpatched-hole-in-Adobe-Reader-979286.html","http://www.sudosecure.net/archives/673","http://www.h-online.com/security/news/item/Adobe-issues-official-workaround-for-PDF-vulnerability-971932.html","http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/","http://www.m86security.com/labs/i/PDF-Launch-Feature-Used-to-Install-Zeus,trace.1301~.asp","http://doc.emergingthreats.net/2010968"],"2010969":["http://doc.emergingthreats.net/2010969"],"2010972":["http://www.browserdefender.com/file/484661/site/putas18.info/","http://doc.emergingthreats.net/2010792"],"2010975":["http://ddanchev.blogspot.com/2010/03/copyright-lawsuit-filed-against-you.html","http://isc.sans.org/diary.html?storyid=8497","http://threatinfo.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_AGENT.STM&VSect=T","http://doc.emergingthreats.net/2010975"],"2010976":["http://www.exploit-db.com/exploits/11059","http://secunia.com/advisories/38081/","http://doc.emergingthreats.net/2010976"],"2010979":["http://packetstorm.foofus.com/1003-exploits/ispcp-rfi.txt","http://www.securityfocus.com/bid/38644","http://doc.emergingthreats.net/2010979"],"2010980":["http://packetstorm.foofus.com/1003-exploits/ibmenovia-xss.txt","http://doc.emergingthreats.net/2010980"],"2010981":["http://www.securityfocus.com/bid/37161","http://doc.emergingthreats.net/2010981"],"2010982":["http://www.securityfocus.com/bid/37161","http://doc.emergingthreats.net/2010982"],"2010983":["http://www.securityfocus.com/bid/37161","http://doc.emergingthreats.net/2010983"],"2010984":["http://www.securityfocus.com/bid/37161","http://doc.emergingthreats.net/2010984"],"2010985":["http://www.securityfocus.com/bid/37161","http://doc.emergingthreats.net/2010985"],"2010988":["http://www.securityfocus.com/bid/37986","http://doc.emergingthreats.net/2010988"],"2010989":["http://www.securityfocus.com/bid/37987","http://doc.emergingthreats.net/2010989"],"2010990":["http://secunia.com/advisories/38678/","http://doc.emergingthreats.net/2010990"],"2010991":["http://secunia.com/advisories/38678/","http://doc.emergingthreats.net/2010991"],"2010992":["http://secunia.com/advisories/38678/","http://doc.emergingthreats.net/2010992"],"2010993":["http://secunia.com/advisories/38678/","http://doc.emergingthreats.net/2010993"],"2010994":["http://secunia.com/advisories/38678/","http://doc.emergingthreats.net/2010994"],"2010996":["http://www.exploit-db.com/exploits/11511","http://doc.emergingthreats.net/2010996"],"2011000":["http://www.exploit-db.com/exploits/10676","http://doc.emergingthreats.net/2011000"],"2011001":["http://www.securityfocus.com/bid/38009","http://doc.emergingthreats.net/2011001"],"2011002":["http://www.securityfocus.com/bid/38009","http://doc.emergingthreats.net/2011002"],"2011003":["http://www.securityfocus.com/bid/38009","http://doc.emergingthreats.net/2011003"],"2011004":["http://www.securityfocus.com/bid/38009","http://doc.emergingthreats.net/2011004"],"2011005":["http://www.securityfocus.com/bid/38009","http://doc.emergingthreats.net/2011005"],"2011006":["http://www.coresecurity.com/content/nextgen-gallery-xss-vulnerability","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1186","http://doc.emergingthreats.net/2011006"],"2011007":["http://securitytracker.com/alerts/2010/Mar/1023773.html","http://tools.cisco.com/security/center/viewAlert.x?alertId=20202","http://www.metasploit.com/redmine/projects/framework/repository/revisions/9018/entry/modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb","http://www.microsoft.com/technet/security/bulletin/ms10-018.mspx","http://www.vupen.com/english/advisories/2010/0744","http://www.kb.cert.org/vuls/id/744549","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0805","http://doc.emergingthreats.net/2011007"],"2011011":["http://www.cisco.com/warp/public/707/cisco-sa-20010228-ios-snmp-community.shtml","http://www.cisco.com/warp/public/707/cisco-sa-20010227-ios-snmp-ilmi.shtml","http://doc.emergingthreats.net/2011011"],"2011013":["http://www.cisco.com/warp/public/707/cisco-sa-20010228-ios-snmp-community.shtml","http://www.iss.net/security_center/reference/vuln/cisco-ios-cable-docsis.htm","http://www.kb.cert.org/vuls/id/840665","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1776","http://doc.emergingthreats.net/2011013"],"2011014":["http://www.cisco.com/warp/public/707/cisco-sa-20010228-ios-snmp-community.shtml","http://www.iss.net/security_center/reference/vuln/cisco-ios-cable-docsis.htm","http://www.kb.cert.org/vuls/id/840665","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1776","http://doc.emergingthreats.net/2011014"],"2011017":["http://www.packetstormsecurity.org/0912-exploits/joomlajcalpro-rfi.txt","http://doc.emergingthreats.net/2011017"],"2011018":["http://www.exploit-db.com/exploits/10705","http://doc.emergingthreats.net/2011018"],"2011019":["http://packetstorm.foofus.com/1001-exploits/comtrend-xss.txt","http://xforce.iss.net/xforce/xfdb/47765","http://doc.emergingthreats.net/2011019"],"2011022":["http://www.securityfocus.com/bid/38668","http://exploit-db.com/exploits/11688","http://doc.emergingthreats.net/2011022"],"2011023":["http://www.securityfocus.com/bid/38668","http://exploit-db.com/exploits/11688","http://doc.emergingthreats.net/2011023"],"2011024":["http://www.securityfocus.com/bid/38668","http://exploit-db.com/exploits/11688","http://doc.emergingthreats.net/2011024"],"2011025":["http://www.securityfocus.com/bid/38668","http://exploit-db.com/exploits/11688","http://doc.emergingthreats.net/2011025"],"2011026":["http://www.securityfocus.com/bid/38668","http://exploit-db.com/exploits/11688","http://doc.emergingthreats.net/2011026"],"2011027":["http://w3af.sourceforge.net","http://doc.emergingthreats.net/2011027"],"2011028":["http://www.krakowlabs.com/dev.html","http://doc.emergingthreats.net/2011028"],"2011029":["http://www.mavitunasecurity.com/communityedition/"],"2011030":["http://www.mavitunasecurity.com/communityedition/","http://doc.emergingthreats.net/2011030"],"2011035":["http://msdn.microsoft.com/en-us/library/ms188365.aspx","http://msdn.microsoft.com/en-us/library/ms175915.aspx","http://www.sqlteam.com/article/using-bulk-insert-to-load-a-text-file","http://doc.emergingthreats.net/2011035"],"2011037":["http://support.microsoft.com/kb/321185","http://doc.emergingthreats.net/2011037"],"2011039":["http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/","http://en.wikipedia.org/wiki/Insert_(SQL)","http://doc.emergingthreats.net/2011039"],"2011041":["http://dev.mysql.com/doc/refman/5.1/en/information-functions.html#function_benchmark","http://doc.emergingthreats.net/2011041"],"2011042":["http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/","http://www.webdevelopersnotes.com/tutorials/sql/a_little_more_on_the_mysql_select_statement.php3","http://doc.emergingthreats.net/2011042"],"2011044":["http://www.exploit-db.com/exploits/11458","http://doc.emergingthreats.net/2011044"],"2011045":["http://www.exploit-db.com/exploits/11458","http://doc.emergingthreats.net/2011045"],"2011046":["http://www.exploit-db.com/exploits/11458","http://doc.emergingthreats.net/2011046"],"2011047":["http://www.exploit-db.com/exploits/11458","http://doc.emergingthreats.net/2011047"],"2011051":["http://www.securityfocus.com/bid/38842","http://exploit-db.com/exploits/11807","http://doc.emergingthreats.net/2011051"],"2011052":["http://www.securityfocus.com/bid/38842","http://exploit-db.com/exploits/11807","http://doc.emergingthreats.net/2011052"],"2011054":["http://www.coresecurity.com/content/cactushop-xss-persistent-vulnerability","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1486","http://doc.emergingthreats.net/2011054"],"2011057":["http://www.securityfocus.com/bid/39510","http://doc.emergingthreats.net/2011057"],"2011058":["http://www.securityfocus.com/bid/39510","http://doc.emergingthreats.net/2011058"],"2011059":["http://www.securityfocus.com/bid/39510","http://doc.emergingthreats.net/2011059"],"2011060":["http://www.securityfocus.com/bid/39510","http://doc.emergingthreats.net/2011060"],"2011061":["http://www.securityfocus.com/bid/39510","http://doc.emergingthreats.net/2011061"],"2011062":["http://exploit-db.com/exploits/12219","http://doc.emergingthreats.net/2011062"],"2011063":["http://exploit-db.com/exploits/12219","http://doc.emergingthreats.net/2011063"],"2011065":["http://secunia.com/advisories/38097","http://packetstormsecurity.org/1001-exploits/surgeftp-xss.txt","http://doc.emergingthreats.net/2011065"],"2011067":["http://secunia.com/advisories/39467","http://exploit-db.com/exploits/12230","http://doc.emergingthreats.net/2011067"],"2011071":["http://www.exploit-db.com/exploits/11458","http://doc.emergingthreats.net/2011071"],"2011072":["http://community.ca.com/blogs/securityadvisor/archive/2009/03/26/in-the-wild-win32-fruspam-using-american-greetings.aspx","http://doc.emergingthreats.net/2011072"],"2011073":["http://www.htbridge.ch/advisory/xss_in_microsoft_sharepoint_server_2007.html","http://tools.cisco.com/security/center/viewAlert.x?alertId=20415","http://www.microsoft.com/technet/security/Bulletin/MS10-039.mspx","http://tools.cisco.com/security/center/viewAlert.x?alertId=20610","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0817","http://doc.emergingthreats.net/2011073"],"2011077":["http://exploit-db.com/exploits/12299","http://packetstormsecurity.org/1004-exploits/joomlagbufacebook-sql.txt","http://doc.emergingthreats.net/2011077"],"2011078":["http://exploit-db.com/exploits/12299","http://packetstormsecurity.org/1004-exploits/joomlagbufacebook-sql.txt","http://doc.emergingthreats.net/2011078"],"2011079":["http://exploit-db.com/exploits/12299","http://packetstormsecurity.org/1004-exploits/joomlagbufacebook-sql.txt","http://doc.emergingthreats.net/2011079"],"2011080":["http://exploit-db.com/exploits/12299","http://packetstormsecurity.org/1004-exploits/joomlagbufacebook-sql.txt","http://doc.emergingthreats.net/2011080"],"2011081":["http://exploit-db.com/exploits/12299","http://packetstormsecurity.org/1004-exploits/joomlagbufacebook-sql.txt","http://doc.emergingthreats.net/2011081"],"2011082":["http://exploit-db.com/sploits/cybsec_advisory_2010_0402.pdf","http://doc.emergingthreats.net/2011082"],"2011083":["http://exploit-db.com/sploits/cybsec_advisory_2010_0402.pdf","http://doc.emergingthreats.net/2011083"],"2011088":["http://www.darknet.org.uk/2010/04/davtest-webdav-vulerability-scanning-scanner-tool/","http://code.google.com/p/davtest/","http://doc.emergingthreats.net/2011088"],"2011089":["http://www.darknet.org.uk/2010/04/davtest-webdav-vulerability-scanning-scanner-tool/","http://code.google.com/p/davtest/","http://doc.emergingthreats.net/2011089"],"2011090":["http://doc.emergingthreats.net/2011090","http://www.piriform.com/"],"2011091":["http://secunia.com/advisories/39032/","http://exploit-db.com/exploits/11793","http://doc.emergingthreats.net/2011091"],"2011092":["http://secunia.com/advisories/39032/","http://exploit-db.com/exploits/11793","http://doc.emergingthreats.net/2011092"],"2011093":["http://secunia.com/advisories/39032/","http://exploit-db.com/exploits/11793","http://doc.emergingthreats.net/2011093"],"2011094":["http://secunia.com/advisories/39032/","http://exploit-db.com/exploits/11793","http://doc.emergingthreats.net/2011094"],"2011095":["http://secunia.com/advisories/39032/","http://exploit-db.com/exploits/11793","http://doc.emergingthreats.net/2011095"],"2011096":["http://exploit-db.com/exploits/11188","http://doc.emergingthreats.net/2011096"],"2011097":["http://exploit-db.com/exploits/11188","http://doc.emergingthreats.net/2011097"],"2011098":["http://inj3ct0r.com/exploits/11708","http://doc.emergingthreats.net/2011098"],"2011099":["http://exploit-db.com/exploits/11888","http://doc.emergingthreats.net/2011099"],"2011100":["http://exploit-db.com/exploits/11888","http://doc.emergingthreats.net/2011100"],"2011106":["http://doc.emergingthreats.net/2011106"],"2011107":["http://doc.emergingthreats.net/2011107"],"2011108":["http://www.securiteam.com/securitynews/6T00C0AN5G.html","http://doc.emergingthreats.net/2011108"],"2011109":["http://www.securiteam.com/securitynews/6T00C0AN5G.html","http://doc.emergingthreats.net/2011109"],"2011110":["http://www.securiteam.com/securitynews/6T00C0AN5G.html","http://doc.emergingthreats.net/2011110"],"2011111":["http://www.securiteam.com/securitynews/6T00C0AN5G.html","http://doc.emergingthreats.net/2011111"],"2011112":["http://www.securiteam.com/securitynews/6T00C0AN5G.html","http://doc.emergingthreats.net/2011112"],"2011113":["http://secunia.com/advisories/11803/","http://www.securityfocus.com/bid/10260","http://doc.emergingthreats.net/2011113"],"2011114":["http://www.securityfocus.com/bid/38441","http://secunia.com/advisories/38793","http://doc.emergingthreats.net/2011114"],"2011115":["http://www.securityfocus.com/bid/37394","http://vupen.com/english/advisories/2009/3608","http://doc.emergingthreats.net/2011115"],"2011116":["http://exploit-db.com/exploits/12488","http://www.securityfocus.com/bid/39890","http://doc.emergingthreats.net/2011116"],"2011117":["http://www.securityfocus.com/bid/39696","http://secunia.com/advisories/39627","http://doc.emergingthreats.net/2011117"],"2011120":["http://poweredbysave.com"],"2011121":["http://malwareint.blogspot.com/2010/03/new-phishing-campaign-against-facebook.html","http://doc.emergingthreats.net/2011121"],"2011122":["http://snosoft.blogspot.com/2010/05/reversenoitcejni-lqs-dnilb-bank-hacking.html","http://doc.emergingthreats.net/2011122"],"2011125":["http://doc.emergingthreats.net/2011125"],"2011127":["http://doc.emergingthreats.net/2011127"],"2011131":["http://exploit-db.com/exploits/11845","http://doc.emergingthreats.net/2011131"],"2011132":["http://exploit-db.com/exploits/11865","http://www.securityfocus.com/bid/38949","http://doc.emergingthreats.net/2011132"],"2011133":["http://exploit-db.com/exploits/12514","http://www.securityfocus.com/bid/39925","http://doc.emergingthreats.net/2011133"],"2011134":["http://exploit-db.com/exploits/12514","http://www.securityfocus.com/bid/39925","http://doc.emergingthreats.net/2011134"],"2011135":["http://exploit-db.com/exploits/12514","http://www.securityfocus.com/bid/39925","http://doc.emergingthreats.net/2011135"],"2011136":["http://exploit-db.com/exploits/12514","http://www.securityfocus.com/bid/39925","http://doc.emergingthreats.net/2011136"],"2011137":["http://exploit-db.com/exploits/12514","http://www.securityfocus.com/bid/39925","http://doc.emergingthreats.net/2011137"],"2011138":["http://www.securityfocus.com/bid/37997","http://doc.emergingthreats.net/2011138"],"2011139":["http://www.securityfocus.com/bid/37997","http://doc.emergingthreats.net/2011139"],"2011140":["http://exploit-db.com/exploits/12598","http://doc.emergingthreats.net/2011140"],"2011141":["http://osvdb.org/12184","http://www.0php.com/php_easter_egg.php","http://seclists.org/nmap-dev/2010/q2/569","http://doc.emergingthreats.net/2011141"],"2011142":["http://osvdb.org/12184","http://www.0php.com/php_easter_egg.php","http://seclists.org/nmap-dev/2010/q2/569","http://doc.emergingthreats.net/2011142"],"2011143":["http://osvdb.org/12184","http://www.0php.com/php_easter_egg.php","http://seclists.org/nmap-dev/2010/q2/569","http://doc.emergingthreats.net/2011143"],"2011144":["http://osvdb.org/12184","http://www.0php.com/php_easter_egg.php","http://seclists.org/nmap-dev/2010/q2/569","http://doc.emergingthreats.net/2011144"],"2011145":["http://securitytracker.com/alerts/2010/May/1024022.html","http://support.3com.com/documents/netmgr/imc/3Com_IMC_readme_plat_3.30-SP2.html","http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-02","http://doc.emergingthreats.net/2011145"],"2011146":["http://www.httpuseragent.org/list/Download+Master-n727.htm","http://www.westbyte.com/dm/","http://doc.emergingthreats.net/2011146"],"2011149":["http://doc.emergingthreats.net/2011149"],"2011152":["http://www.securityfocus.com/bid/39999","http://juniper.net/security/auto/vulnerabilities/vuln39999.html","http://doc.emergingthreats.net/2011152"],"2011153":["http://www.securityfocus.com/bid/39679","http://secunia.com/advisories/39547/","http://doc.emergingthreats.net/2011153"],"2011154":["http://www.securityfocus.com/bid/39679","http://secunia.com/advisories/39547/","http://doc.emergingthreats.net/2011154"],"2011155":["http://secunia.com/advisories/39404/","http://doc.emergingthreats.net/2011155"],"2011156":["http://secunia.com/advisories/39404/","http://doc.emergingthreats.net/2011156"],"2011157":["http://secunia.com/advisories/39404/","http://doc.emergingthreats.net/2011157"],"2011158":["http://secunia.com/advisories/39404/","http://doc.emergingthreats.net/2011158"],"2011159":["http://secunia.com/advisories/39404/","http://doc.emergingthreats.net/2011159"],"2011161":["http://inj3ct0r.com/exploits/11731","http://exploit-db.com/exploits/12160","http://doc.emergingthreats.net/2011161"],"2011162":["http://doc.emergingthreats.net/2011162"],"2011164":["http://exploit-db.com/exploits/12558","http://www.securityfocus.com/bid/40049","http://doc.emergingthreats.net/2011164","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1922"],"2011165":["http://exploit-db.com/exploits/12558","http://www.securityfocus.com/bid/40049","http://doc.emergingthreats.net/2011165"],"2011167":["http://exploit-db.com/exploits/12558","http://www.securityfocus.com/bid/40049","http://doc.emergingthreats.net/2011167"],"2011168":["http://packetstormsecurity.org/1005-exploits/phpnukefriend-sql.txt","http://www.securityfocus.com/bid/39992","http://doc.emergingthreats.net/2011168"],"2011169":["http://packetstormsecurity.org/1005-exploits/phpnukefriend-sql.txt","http://www.securityfocus.com/bid/39992","http://doc.emergingthreats.net/2011169"],"2011170":["http://packetstormsecurity.org/1005-exploits/phpnukefriend-sql.txt","http://www.securityfocus.com/bid/39992","http://doc.emergingthreats.net/2011170"],"2011171":["http://packetstormsecurity.org/1005-exploits/phpnukefriend-sql.txt","http://www.securityfocus.com/bid/39992","http://doc.emergingthreats.net/2011171"],"2011172":["http://packetstormsecurity.org/1005-exploits/phpnukefriend-sql.txt","http://www.securityfocus.com/bid/39992","http://doc.emergingthreats.net/2011172"],"2011174":["http://doc.emergingthreats.net/2011174"],"2011175":["http://doc.emergingthreats.net/2011175"],"2011179":["http://doc.emergingthreats.net/2011179"],"2011184":["http://doc.emergingthreats.net/2011184"],"2011188":["http://doc.emergingthreats.net/2011188"],"2011190":["http://dsecrg.com/pages/vul/show.php?id=154","http://doc.emergingthreats.net/2011190"],"2011191":["http://dsecrg.com/pages/vul/show.php?id=154","http://doc.emergingthreats.net/2011191"],"2011192":["http://dsecrg.com/pages/vul/show.php?id=154","http://doc.emergingthreats.net/2011192"],"2011193":["http://dsecrg.com/pages/vul/show.php?id=154","http://doc.emergingthreats.net/2011193"],"2011194":["http://dsecrg.com/pages/vul/show.php?id=154","http://doc.emergingthreats.net/2011194"],"2011195":["http://dsecrg.com/pages/vul/show.php?id=154","http://doc.emergingthreats.net/2011195"],"2011200":["http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4934.php","http://exploit-db.com/exploits/12294","http://doc.emergingthreats.net/2011200"],"2011201":["http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4934.php","http://exploit-db.com/exploits/12294","http://doc.emergingthreats.net/2011201"],"2011202":["http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4934.php","http://exploit-db.com/exploits/12294","http://doc.emergingthreats.net/2011202"],"2011203":["http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4934.php","http://exploit-db.com/exploits/12294","http://doc.emergingthreats.net/2011203"],"2011204":["http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4934.php","http://exploit-db.com/exploits/12294","http://doc.emergingthreats.net/2011204"],"2011205":["http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4934.php","http://exploit-db.com/exploits/12294","http://doc.emergingthreats.net/2011205"],"2011206":["http://zeroscience.mk/en/vulnerabilities/ZSL-2010-4934.php","http://exploit-db.com/exploits/12294","http://doc.emergingthreats.net/2011206"],"2011207":["http://exploit-db.com/exploits/14215/","http://www.securityfocus.com/bid/41343","http://doc.emergingthreats.net/2011207"],"2011208":["http://exploit-db.com/exploits/14215/","http://www.securityfocus.com/bid/41343","http://doc.emergingthreats.net/2011208"],"2011209":["http://osvdb.org/show/osvdb/65117","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2145","http://doc.emergingthreats.net/2011209"],"2011214":["http://www.securityfocus.com/bid/40811","http://vupen.com/english/advisories/2010/1444","http://exploit-db.com/exploits/13832/","http://doc.emergingthreats.net/2011214"],"2011215":["http://secunia.com/advisories/39580/","http://doc.emergingthreats.net/2011215"],"2011216":["http://secunia.com/advisories/39580/","http://doc.emergingthreats.net/2011216"],"2011217":["http://secunia.com/advisories/39580/","http://doc.emergingthreats.net/2011217"],"2011218":["http://secunia.com/advisories/39580/","http://doc.emergingthreats.net/2011218"],"2011219":["http://secunia.com/advisories/39580/","http://doc.emergingthreats.net/2011219"],"2011225":["http://doc.emergingthreats.net/2011225"],"2011226":["http://doc.emergingthreats.net/2011225"],"2011227":["http://doc.emergingthreats.net/2011227"],"2011232":["http://doc.emergingthreats.net/2011232"],"2011238":["http://doc.emergingthreats.net/2011238"],"2011243":["http://eromang.zataz.com/2010/07/13/byroenet-casper-bot-search-e107-rce-scanner/","http://doc.emergingthreats.net/2011243"],"2011244":["http://eromang.zataz.com/2010/07/13/byroenet-casper-bot-search-e107-rce-scanner/","http://doc.emergingthreats.net/2011244"],"2011245":["http://doc.emergingthreats.net/2011245"],"2011246":["http://doc.emergingthreats.net/2011246"],"2011247":["http://doc.emergingthreats.net/2011247"],"2011248":["http://doc.emergingthreats.net/2011248"],"2011254":["http://vupen.com/english/advisories/2010/0942","http://exploit-db.com/exploits/12276","http://doc.emergingthreats.net/2011254"],"2011255":["http://vupen.com/english/advisories/2010/0942","http://exploit-db.com/exploits/12276","http://doc.emergingthreats.net/2011255"],"2011256":["http://secunia.com/advisories/40569/","http://h.ackack.net/more-0day-wordpress-security-leaks-in-firestats.html","http://doc.emergingthreats.net/2011256"],"2011257":["http://secunia.com/advisories/40569/","http://h.ackack.net/more-0day-wordpress-security-leaks-in-firestats.html","http://doc.emergingthreats.net/2011257"],"2011258":["http://secunia.com/advisories/40569/","http://h.ackack.net/more-0day-wordpress-security-leaks-in-firestats.html","http://doc.emergingthreats.net/2011258"],"2011259":["http://www.exploit-db.com/exploits/9350/","http://vupen.com/english/advisories/2009/2136","http://doc.emergingthreats.net/2011259"],"2011262":["http://secunia.com/advisories/40665/","http://packetstormsecurity.org/1007-exploits/groupoffice-sql.txt","http://doc.emergingthreats.net/2011262"],"2011263":["http://secunia.com/advisories/40665/","http://packetstormsecurity.org/1007-exploits/groupoffice-sql.txt","http://doc.emergingthreats.net/2011263"],"2011264":["http://secunia.com/advisories/40665/","http://packetstormsecurity.org/1007-exploits/groupoffice-sql.txt","http://doc.emergingthreats.net/2011264"],"2011265":["http://secunia.com/advisories/40665/","http://packetstormsecurity.org/1007-exploits/groupoffice-sql.txt","http://doc.emergingthreats.net/2011265"],"2011266":["http://secunia.com/advisories/40665/","http://packetstormsecurity.org/1007-exploits/groupoffice-sql.txt","http://doc.emergingthreats.net/2011266"],"2011268":["http://exploit-db.com/exploits/14369/","http://secunia.com/advisories/40605","http://doc.emergingthreats.net/2011268"],"2011269":["http://doc.emergingthreats.net/2011269"],"2011271":["http://doc.emergingthreats.net/2011271"],"2011272":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AWin32/Chekafe.A","http://doc.emergingthreats.net/2011272"],"2011274":["http://exploit-db.com/exploits/14432/","http://inj3ct0r.com/exploits/13426","http://doc.emergingthreats.net/2011274"],"2011276":["http://doc.emergingthreats.net/2011276"],"2011277":["http://doc.emergingthreats.net/2011277"],"2011278":["http://www.threatexpert.com/report.aspx?md5=f39554f3afe92dca3597efc1f7709ad4"],"2011285":["http://eromang.zataz.com/2010/07/13/byroenet-casper-bot-search-e107-rce-scanner/","http://doc.emergingthreats.net/2011285"],"2011286":["http://eromang.zataz.com/2010/07/13/byroenet-casper-bot-search-e107-rce-scanner/","http://doc.emergingthreats.net/2011286"],"2011287":["http://www.m86security.com/labs/i/GootKit--Automated-Website-Infection,trace.1368~.asp","http://doc.emergingthreats.net/2011287"],"2011289":["http://www.m86security.com/labs/i/GootKit--Automated-Website-Infection,trace.1368~.asp","http://doc.emergingthreats.net/2011285"],"2011290":["http://www.m86security.com/labs/i/GootKit--Automated-Website-Infection,trace.1368~.asp","http://doc.emergingthreats.net/2011286"],"2011300":["http://research.zscaler.com/2010/07/lnk-cve-2010-2568-stuxnet-incident.html"],"2011329":["http://www.kb.cert.org/vuls/id/570177","http://www.h-online.com/security/news/item/Criminals-attempt-to-exploit-unpatched-hole-in-Adobe-Reader-979286.html","http://www.sudosecure.net/archives/673","http://www.h-online.com/security/news/item/Adobe-issues-official-workaround-for-PDF-vulnerability-971932.html","http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/","http://www.m86security.com/labs/i/PDF-Launch-Feature-Used-to-Install-Zeus,trace.1301~.asp","http://blog.didierstevens.com/2008/04/29/pdf-let-me-count-the-ways/"],"2011336":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FSality.AU","http://microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AWin32/Keatep.B","http://www.threatexpert.com/report.aspx?md5=239aacf49bb6381fd71841fda4d4ee58"],"2011337":["http://www.threatexpert.com/report.aspx?md5=76cf08503cdd036850bcc4f29f64022f","http://www.threatexpert.com/report.aspx?md5=579f2e29434218d62d31625d369cbc42"],"2011338":["http://www.threatexpert.com/report.aspx?md5=438bcb3c4a304b65419674ce8775d8a3"],"2011358":["http://h30507.www3.hp.com/t5/Following-the-White-Rabbit-A/Adobe-ColdFusion-s-Directory-Traversal-Disaster/ba-p/81964","http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2861","http://www.exploit-db.com/exploits/14641/"],"2011359":["http://h30507.www3.hp.com/t5/Following-the-White-Rabbit-A/Adobe-ColdFusion-s-Directory-Traversal-Disaster/ba-p/81964","http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2861","http://www.exploit-db.com/exploits/14641/"],"2011360":["http://h30507.www3.hp.com/t5/Following-the-White-Rabbit-A/Adobe-ColdFusion-s-Directory-Traversal-Disaster/ba-p/81964","http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2861","http://www.exploit-db.com/exploits/14641/"],"2011362":["http://h30507.www3.hp.com/t5/Following-the-White-Rabbit-A/Adobe-ColdFusion-s-Directory-Traversal-Disaster/ba-p/81964","http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2861","http://www.exploit-db.com/exploits/14641/"],"2011377":["http://inj3ct0r.com/exploits/13665"],"2011378":["http://www.securityfocus.com/bid/41377"],"2011380":["http://www.securityfocus.com/bid/41377"],"2011381":["http://www.securityfocus.com/bid/41377"],"2011382":["http://www.securityfocus.com/bid/41377"],"2011383":["http://secunia.com/advisories/40515/","http://cross-site-scripting.blogspot.com/2010/07/impresscms-121-final-reflected-cross.html"],"2011384":["http://inj3ct0r.com/exploits/5609","http://vupen.com/english/advisories/2009/2136"],"2011385":["http://exploit-db.com/exploits/12427"],"2011389":["http://w3af.sourceforge.net"],"2011390":["http://cirt.net/nikto2"],"2011396":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Rogue%3aWin32%2fFakeYak"],"2011409":["http://sign.kaffenews.com/?p=104"],"2011410":["http://sign.kaffenews.com/?p=104"],"2011413":["http://inj3ct0r.com/exploits/13365"],"2011422":["http://code.google.com/p/sipvicious/","http://blog.sipvicious.org/"],"2011423":["http://www.securityfocus.com/bid/42575","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2544","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2545"],"2011424":["http://technet.microsoft.com/en-us/library/ms188787.aspx","http://technet.microsoft.com/en-us/library/ms190693.aspx"],"2011426":["http://www.securityfocus.com/bid/41204"],"2011427":["http://www.securityfocus.com/bid/41204"],"2011428":["http://www.securityfocus.com/bid/41204"],"2011429":["http://www.securityfocus.com/bid/41204"],"2011450":["http://www.securityfocus.com/bid/41204"],"2011451":["http://secunia.com/advisories/40987/","http://exploit-db.com/exploits/14656/"],"2011452":["http://inj3ct0r.com/exploits/13770"],"2011453":["http://inj3ct0r.com/exploits/13709"],"2011454":["http://exploit-db.com/exploits/14712/"],"2011457":["http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html","http://www.us-cert.gov/cas/techalerts/TA10-238A.html","http://www.microsoft.com/technet/security/advisory/2269637.mspx","http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx","http://blog.metasploit.com/2010/08/better-faster-stronger.html","http://blog.rapid7.com/?p=5325"],"2011472":["http://www.theregister.co.uk/2010/09/06/mystery_ie_bug/","http://www.darknet.org.uk/2010/09/microsoft-investigate-ie-css-cross-origin-theft-vulnerability/","http://seclists.org/fulldisclosure/2010/Sep/64"],"2011480":["http://www.damballa.com/downloads/r_pubs/Damballa_Report_IMDDOS.pdf"],"2011481":["http://www.damballa.com/downloads/r_pubs/Damballa_Report_IMDDOS.pdf"],"2011482":["http://www.damballa.com/downloads/r_pubs/Damballa_Report_IMDDOS.pdf"],"2011483":["http://www.damballa.com/downloads/r_pubs/Damballa_Report_IMDDOS.pdf"],"2011484":["http://www.damballa.com/downloads/r_pubs/Damballa_Report_IMDDOS.pdf"],"2011485":["http://service.real.com/realplayer/security/08262010_player/en/","http://www.exploit-db.com/moaub-13-realplayer-flv-parsing-multiple-integer-overflow/","http://www.securityfocus.com/bid/42775","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3000"],"2011487":["http://www.checkpoint.com/defense/advisories/public/2010/sbp-16-Aug.html"],"2011488":["http://www.checkpoint.com/defense/advisories/public/2010/sbp-16-Aug.html"],"2011489":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3AWin32%2FNusump&ThreatID=-2147329857","http://www.threatexpert.com/report.aspx?md5=ef0616d75bd892ed69fe22a510079686","http://www.threatexpert.com/report.aspx?md5=463cdec2df12a04d6ea1d015746ee950"],"2011493":["http://www.afterdawn.com/news/article.cfm/2010/09/12/vulnerability_in_openx_advertisement_server_afterdawn_s_ads_affected_as_well","http://www.esarcasm.com/17960/no-esarcasm-is-not-a-tool-of-satan-or-malware-authors/","http://www.thinq.co.uk/2010/9/13/pirate-bay-cracked-spread-malware/","http://www.kreativrauschen.com/blog/2010/09/09/critical-vulnerability-in-openx-286-open-flash-chart-2/","http://www.heise.de/newsticker/meldung/Ein-Jahr-alte-Luecke-gefaehrdet-OpenX-Ad-Server-1077941.html","http://www.kreativrauschen.de/blog/2010/09/09/kritische-sicherheitsluecke-in-openx-2-8-6-open-flash-chart-2/","http://doc.emergingthreats.net/2011493"],"2011494":["http://www.afterdawn.com/news/article.cfm/2010/09/12/vulnerability_in_openx_advertisement_server_afterdawn_s_ads_affected_as_well","http://www.esarcasm.com/17960/no-esarcasm-is-not-a-tool-of-satan-or-malware-authors/","http://www.thinq.co.uk/2010/9/13/pirate-bay-cracked-spread-malware/","http://www.kreativrauschen.com/blog/2010/09/09/critical-vulnerability-in-openx-286-open-flash-chart-2/","http://www.heise.de/newsticker/meldung/Ein-Jahr-alte-Luecke-gefaehrdet-OpenX-Ad-Server-1077941.html","http://www.kreativrauschen.de/blog/2010/09/09/kritische-sicherheitsluecke-in-openx-2-8-6-open-flash-chart-2/","http://doc.emergingthreats.net/2011494"],"2011497":["http://freeworld.thc.org/thc-hydra"],"2011499":["http://feliam.wordpress.com/2010/02/11/flash-on-a-pdf-with-minipdf-py/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1297","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2201"],"2011500":["http://www.exploit-db.com/moaub12-adobe-acrobat-and-reader-pushstring-memory-corruption/","http://www.securityfocus.com/bid/41237","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2201"],"2011502":["http://shh.thathost.com/secadv/2009-06-15-entrust-ies.txt","http://securitytracker.com/alerts/2010/Sep/1024391.html"],"2011505":["http://feliam.wordpress.com/2010/02/11/flash-on-a-pdf-with-minipdf-py/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1297"],"2011507":["http://blog.didierstevens.com/2009/07/01/embedding-and-hiding-files-in-pdf-documents/"],"2011519":["http://www.exploit-db.com/adobe-acrobat-newclass-invalid-pointer-vulnerability/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1297"],"2011520":["http://asert.arbornetworks.com/2010/09/shiz-and-rohimafo-malware-cousins/","http://threatexpert.com/report.aspx?md5=3614d4f6527d512b61c27c4e213347a6","http://threatexpert.com/report.aspx?md5=0bb4662b54f02c989edc520314fc20ea","http://threatexpert.com/report.aspx?md5=a671eb9979505119f4106a990c4ef7ab"],"2011523":["http://asert.arbornetworks.com/2010/09/shiz-and-rohimafo-malware-cousins/","http://threatexpert.com/report.aspx?md5=3614d4f6527d512b61c27c4e213347a6","http://threatexpert.com/report.aspx?md5=0bb4662b54f02c989edc520314fc20ea","http://threatexpert.com/report.aspx?md5=a671eb9979505119f4106a990c4ef7ab"],"2011528":["http://blog.didierstevens.com/2008/04/29/pdf-let-me-count-the-ways/"],"2011529":["http://blog.didierstevens.com/2008/04/29/pdf-let-me-count-the-ways/"],"2011536":["http://blog.didierstevens.com/2008/04/29/pdf-let-me-count-the-ways/"],"2011538":["http://www.exploit-db.com/moaub-17-firefox-plugin-parameter-ensurecachedattrparamarrays-remote-code-execution/","http://www.mozilla.org/security/announce/2010/mfsa2010-37.html","http://www.securityfocus.com/bid/41842","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1214"],"2011543":["http://exploit-db.com/download_pdf/15077"],"2011544":["http://doc.emergingthreats.net/2011544","http://krebsonsecurity.com/tag/crimepack/","http://www.offensivecomputing.net/?q=node/1572"],"2011547":["http://exploit-db.com/exploits/14979/"],"2011552":["http://exploit-db.com/exploits/14965/"],"2011553":["http://exploit-db.com/exploits/14965/"],"2011554":["http://exploit-db.com/exploits/14964/"],"2011557":["http://secunia.com/advisories/41047/","http://exploit-db.com/exploits/14718/"],"2011558":["http://secunia.com/advisories/41047/","http://exploit-db.com/exploits/14718/"],"2011559":["http://secunia.com/advisories/41047/","http://exploit-db.com/exploits/14718/"],"2011560":["http://secunia.com/advisories/41047/","http://exploit-db.com/exploits/14718/"],"2011561":["http://secunia.com/advisories/41047/","http://exploit-db.com/exploits/14718/"],"2011562":["http://exploit-db.com/exploits/13899/"],"2011563":["http://secunia.com/advisories/41317/"],"2011564":["http://exploit-db.com/exploits/14893/"],"2011565":["http://exploit-db.com/exploits/14851/"],"2011566":["http://inj3ct0r.com/exploits/13944"],"2011571":["http://inj3ct0r.com/exploits/13028"],"2011572":["http://exploit-db.com/exploits/14636/"],"2011573":["http://exploit-db.com/exploits/14636/"],"2011574":["http://exploit-db.com/exploits/14636/"],"2011575":["http://www.adobe.com/support/security/bulletins/apsb10-15.html","http://www.exploit-db.com/moaub-23-adobe-acrobat-and-reader-newfunction-remote-code-execution-vulnerability/","http://www.securityfocus.com/bid/41236","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2168"],"2011577":["http://www.abuse.ch/?p=2740","http://www.abuse.ch/?p=2796","http://www.threatexpert.com/report.aspx?md5=c59cdd1366dd5c2f448c03738ec0dc88","http://www.threatexpert.com/report.aspx?md5=b93360ec3798215a5cca573747df0139"],"2011578":["http://www.abuse.ch/?p=2740","http://www.abuse.ch/?p=2796","http://www.threatexpert.com/report.aspx?md5=c59cdd1366dd5c2f448c03738ec0dc88","http://www.threatexpert.com/report.aspx?md5=b93360ec3798215a5cca573747df0139"],"2011581":["http://www.oracle.com/technetwork/java/javase/documentation/index.html"],"2011582":["http://www.oracle.com/technetwork/articles/javase/overview-156328.html"],"2011584":["http://www.oracle.com/technetwork/java/javase/documentation/index.html"],"2011585":["http://asert.arbornetworks.com/2010/09/another-family-of-ddos-bots-avzhan/"],"2011588":["http://www.secureworks.com/research/threats/zeus/?threat=zeus","http://lists.emergingthreats.net/pipermail/emerging-sigs/2010-October/009807.html"],"2011589":["http://packetstorm.linuxsecurity.com/1009-exploits/msvidctl-activex.txt"],"2011590":["http://packetstorm.linuxsecurity.com/1009-exploits/msvidctl-activex.txt"],"2011666":["http://exploit-db.com/exploits/12558","http://www.securityfocus.com/bid/40049","http://doc.emergingthreats.net/2011666"],"2011667":["http://www.sensepost.com/labs/tools/pentest/reduh","http://doc.emergingthreats.net/2011667"],"2011668":["http://www.sensepost.com/labs/tools/pentest/reduh","http://doc.emergingthreats.net/2011668"],"2011669":["http://seclists.org/fulldisclosure/2010/Jun/176","http://doc.emergingthreats.net/2011669"],"2011676":["http://www.exploit-db.com/exploits/11403/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0641","http://doc.emergingthreats.net/2011676"],"2011677":["http://www.threatexpert.com/report.aspx?md5=af0bbdf6097233e8688c5429aa97bbed","http://doc.emergingthreats.net/2011677"],"2011678":["http://doc.emergingthreats.net/2011678"],"2011681":["http://secunia.com/advisories/40184/","http://www.securityfocus.com/bid/40535","http://doc.emergingthreats.net/2011681"],"2011692":["http://secunia.com/advisories/40184/","http://www.securityfocus.com/bid/40535","http://doc.emergingthreats.net/10767"],"2011694":["http://doc.emergingthreats.net/2011694"],"2011696":["http://www.redteam-pentesting.de/en/publications/jboss/-bridging-the-gap-between-the-enterprise-and-you-or-whos-the-jboss-now","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0738","http://doc.emergingthreats.net/2011696"],"2011697":["http://www.redteam-pentesting.de/en/publications/jboss/-bridging-the-gap-between-the-enterprise-and-you-or-whos-the-jboss-now","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0738","http://doc.emergingthreats.net/2011697"],"2011698":["http://seclists.org/fulldisclosure/2010/Apr/119","http://doc.emergingthreats.net/2011698"],"2011699":["http://www.transmissionbt.com","http://doc.emergingthreats.net/2011699"],"2011700":["http://ktorrent.org","http://doc.emergingthreats.net/2011700"],"2011701":["http://www.opera.com","http://doc.emergingthreats.net/2011701"],"2011702":["http://www.bittornado.com","http://doc.emergingthreats.net/2011702"],"2011703":["http://www.rahul.net/dholmes/ctorrent","http://doc.emergingthreats.net/2011703"],"2011704":["http://deluge-torrent.org","http://doc.emergingthreats.net/2011704"],"2011705":["http://libtorrent.rakshasa.no","http://doc.emergingthreats.net/2011705"],"2011706":["http://www.utorrent.com","http://doc.emergingthreats.net/2011706"],"2011707":["http://shareaza.sourceforge.net","http://doc.emergingthreats.net/2011707"],"2011708":["http://www.worldofwarcraft.com/info/faq/blizzarddownloader.html","http://doc.emergingthreats.net/2011708"],"2011710":["http://www.bitcomet.com","http://doc.emergingthreats.net/2011710"],"2011711":["http://ktorrent.org","http://doc.emergingthreats.net/2011711"],"2011712":["http://www.freedownloadmanager.org","http://doc.emergingthreats.net/2011712"],"2011713":["http://doc.emergingthreats.net/2011713"],"2011716":["http://code.google.com/p/sipvicious/","http://blog.sipvicious.org/","http://doc.emergingthreats.net/2011716"],"2011719":["http://doc.emergingthreats.net/2011719","http://microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Program%3aWin32%2fSogou"],"2011720":["http://code.google.com/p/waffit/","http://doc.emergingthreats.net/2011720"],"2011721":["http://www.offensive-security.com/metasploit-unleashed/Fast-Track-Modes","http://doc.emergingthreats.net/2011721"],"2011722":["http://www.securityfocus.com/bid/41078","http://doc.emergingthreats.net/2011722"],"2011723":["http://exploit-db.com/exploits/12431","http://doc.emergingthreats.net/2011723"],"2011724":["http://exploit-db.com/exploits/12431","http://doc.emergingthreats.net/2011724"],"2011725":["http://exploit-db.com/exploits/13890/","http://vupen.com/english/advisories/2010/1497","http://www.securityfocus.com/bid/40881","http://doc.emergingthreats.net/2011725"],"2011726":["http://www.securityfocus.com/bid/40737","http://exploit-db.com/exploits/13812/","http://doc.emergingthreats.net/2011726"],"2011727":["http://www.securityfocus.com/bid/40737","http://exploit-db.com/exploits/13812/","http://doc.emergingthreats.net/2011727"],"2011728":["http://www.securityfocus.com/bid/40737","http://exploit-db.com/exploits/13812/","http://doc.emergingthreats.net/2011728"],"2011729":["http://www.securityfocus.com/bid/40737","http://exploit-db.com/exploits/13812/","http://doc.emergingthreats.net/2011729"],"2011730":["http://www.securityfocus.com/bid/40737","http://exploit-db.com/exploits/13812/","http://doc.emergingthreats.net/2011730"],"2011731":["http://www.securityfocus.com/bid/40737","http://exploit-db.com/exploits/13812/","http://doc.emergingthreats.net/2011731"],"2011763":["http://www.secureworks.com/ctu/advisories/SWRX-2010-001/","http://tools.cisco.com/security/center/viewAlert.x?alertId=20737","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-7257","http://doc.emergingthreats.net/2011763"],"2011766":["http://honeynet.org.au/?q=sunday_scanner","http://code.google.com/p/sipvicious/","http://blog.sipvicious.org/","http://doc.emergingthreats.net/2011766"],"2011768":["http://isc.sans.edu/diary.html?storyid=9478"],"2011791":["http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-041308-3301-99&tabid=2","http://asert.arbornetworks.com/2010/09/shiz-and-rohimafo-malware-cousins/","http://threatexpert.com/report.aspx?md5=3614d4f6527d512b61c27c4e213347a6","http://threatexpert.com/report.aspx?md5=0bb4662b54f02c989edc520314fc20ea","http://threatexpert.com/report.aspx?md5=a671eb9979505119f4106a990c4ef7ab","http://doc.emergingthreats.net/2010791"],"2011794":["http://www.securityfocus.com/bid/41377"],"2011799":["http://www.trustdefender.com/blog/2010/10/06/carberp-%E2%80%93-a-new-trojan-in-the-making/","http://www.honeynet.org/node/578","http://www.symantec.com/security_response/writeup.jsp?docid=2010-101313-5632-99&tabid=2","http://www.eset.com/threat-center/encyclopedia/threats/win32trojandownloadercarberpb","http://www.threatexpert.com/report.aspx?md5=31a4bc4e9a431d91dc0b368f4a76ee85","http://www.threatexpert.com/report.aspx?md5=1d0d38dd63551a30eda664611ed4958b","http://www.threatexpert.com/report.aspx?md5=6f89b98729483839283d04b82055dc44","http://www.threatexpert.com/report.aspx?md5=07d3fbb124ff39bd5c1045599f719e36"],"2011801":["http://exploit-db.com/exploits/14599/","http://packetstormsecurity.org/1010-exploits/aoaae-rop.txt"],"2011806":["http://netifera.com/research/","http://www.microsoft.com/technet/security/advisory/2416728.mspx"],"2011807":["http://netifera.com/research/","http://www.microsoft.com/technet/security/advisory/2416728.mspx"],"2011808":["http://code.google.com/p/inspathx/","http://www.darknet.org.uk/2010/09/inspathx-tool-for-finding-path-disclosure-vulnerabilities/"],"2011809":["http://code.google.com/p/inspathx/","http://www.darknet.org.uk/2010/09/inspathx-tool-for-finding-path-disclosure-vulnerabilities/"],"2011821":["http://www.linuxquestions.org/questions/linux-security-4/massive-ddos-need-advice-help-795298/"],"2011822":["http://www.linuxquestions.org/questions/linux-security-4/massive-ddos-need-advice-help-795298/"],"2011823":["http://www.linuxquestions.org/questions/linux-security-4/massive-ddos-need-advice-help-795298/"],"2011824":["http://www.linuxquestions.org/questions/linux-security-4/massive-ddos-need-advice-help-795298/"],"2011825":["http://extraexploit.blogspot.com/2010/10/some-domains-for-licatmurofettrojanzbot.html"],"2011828":["http://packetstormsecurity.org/1005-exploits/724cms459-lfi.txt"],"2011829":["http://inj3ct0r.com/exploits/12674"],"2011830":["http://inj3ct0r.com/exploits/12674"],"2011831":["http://packetstormsecurity.org/1010-exploits/cmsboard-rfi.txt"],"2011832":["http://inj3ct0r.com/exploits/14205"],"2011833":["http://inj3ct0r.com/exploits/14205"],"2011834":["http://inj3ct0r.com/exploits/14205"],"2011835":["http://inj3ct0r.com/exploits/14205"],"2011836":["http://inj3ct0r.com/exploits/14205"],"2011837":["http://www.securityfocus.com/bid/19198","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3930"],"2011838":["http://packetstormsecurity.com/1010-exploits/phpfusionmguser-sql.txt"],"2011839":["http://packetstormsecurity.com/1010-exploits/phpfusionmguser-sql.txt"],"2011840":["http://packetstormsecurity.com/1010-exploits/phpfusionmguser-sql.txt"],"2011841":["http://packetstormsecurity.com/1010-exploits/phpfusionmguser-sql.txt"],"2011842":["http://packetstormsecurity.com/1010-exploits/phpfusionmguser-sql.txt"],"2011843":["http://packetstormsecurity.com/1010-exploits/baconmap10-lfi.txt"],"2011844":["http://packetstormsecurity.com/1010-exploits/joomlarwcards-rfi.txt"],"2011845":["http://www.securityfocus.com/bid/43865"],"2011846":["http://exploit-db.com/exploits/15232"],"2011847":["http://inj3ct0r.com/exploits/12835"],"2011848":["http://threatexpert.com/report.aspx?md5=5e1c680e70e423dd02e31ab9d689e40b","http://microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3AWin32%2FComotor.A!dll&ThreatID=-2147346593"],"2011852":["http://www.securityfocus.com/bid/44370"],"2011857":["http://www.symantec.com/connect/blogs/spyeye-bot-versus-zeus-bot","http://krebsonsecurity.com/2010/10/spyeye-v-zeus-rivalry-ends-in-quiet-merger/"],"2011860":["http://www.securityfocus.com/bid/43954","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3581"],"2011861":["http://blog.fireeye.com/.a/6a00d835018afd53ef013488839529970c-pi"],"2011867":["http://www.exploit-db.com/trend-micro-internet-security-pro-2010-activex-extsetowner-remote-code-execution/"],"2011868":["http://www.h-online.com/security/features/CSI-Internet-PDF-timebomb-1038864.html?page=4","http://www.vicheck.ca/md5query.php?hash=6932d141916cd95e3acaa3952c7596e4","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-4980","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-4961"],"2011869":["http://exploit-db.com/exploits/15071"],"2011870":["http://exploit-db.com/exploits/15071/"],"2011871":["http://thedailywtf.com/Articles/Submit-WTF-Code-Directly-From-Your-IDE.aspx","http://code.google.com/p/submittotdwtf/source/browse/trunk/"],"2011876":["http://exploit-db.com/exploits/15309/"],"2011877":["http://exploit-db.com/exploits/15309/"],"2011878":["http://exploit-db.com/exploits/15309/"],"2011879":["http://exploit-db.com/exploits/15309/"],"2011880":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2315","http://exploit-db.com/exploits/12855/"],"2011882":["http://exploit-db.com/exploits/11903/"],"2011883":["http://exploit-db.com/exploits/11903/"],"2011884":["http://packetstormsecurity.org/1010-exploits/igamingcms-lfi.txt"],"2011886":["http://exploit-db.com/exploits/15152/"],"2011887":["http://www.foofus.net/~jmk/medusa/medusa.html"],"2011892":["http://extraexploit.blogspot.com/2010/11/cve-2010-3962-yet-another-internet.html","http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks","http://blog.fireeye.com/research/2010/11/ie-0-day-hupigon-joins-the-party.html","http://www.offensive-security.com/0day/ie-0day.txt","http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ms10_xxx_ie_css_clip.rb"],"2011893":["http://bugzilla.mozilla.org/show_bug.cgi?id=607222","http://blog.mozilla.com/security/2010/10/26/critical-vulnerability-in-firefox-3-5-and-firefox-3-6/"],"2011910":["http://www.securityfocus.com/bid/44638","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4091"],"2011911":["http://sign.kaffenews.com/?p=104","http://blog.fortinet.com/hiloti-the-botmaster-of-disguise/"],"2011914":["http://www.owasp.org/index.php/Category%3aOWASP_DirBuster_Project"],"2011915":["http://dotdotpwn.sectester.net"],"2011924":["http://itsecteam.com/en/projects/project1.htm"],"2011925":["http://malwareurl.com"],"2011926":["http://eternal-todo.com/blog/thoughts-facts-zeus-mitmo"],"2011927":["http://packetstormsecurity.org/1008-exploits/siteloomcms-xss.txt"],"2011928":["http://exploit-db.com/exploits/15345/"],"2011929":["http://packetstormsecurity.org/1010-exploits/joomlabanners-rfi.txt"],"2011930":["http://inj3ct0r.com/exploits/14090"],"2011931":["http://inj3ct0r.com/exploits/14090"],"2011932":["http://inj3ct0r.com/exploits/14090"],"2011933":["http://inj3ct0r.com/exploits/14090"],"2011934":["http://inj3ct0r.com/exploits/14090"],"2011935":["http://packetstormsecurity.org/1011-exploits/joomlaxplorer-rfi.txt"],"2011936":["http://secunia.com/advisories/42108","http://exploit-db.com/exploits/15400/"],"2011941":["http://packetstormsecurity.org/files/view/95646/osticket-lfi.txt"],"2011942":["http://secunia.com/advisories/42195"],"2011943":["http://securityreason.com/exploitalert/9145"],"2011944":["http://securityreason.com/exploitalert/9145"],"2011945":["http://securityreason.com/exploitalert/9145"],"2011946":["http://securityreason.com/exploitalert/9145"],"2011947":["http://securityreason.com/exploitalert/9145"],"2011948":["http://exploit-db.com/exploits/15510/"],"2011949":["http://exploit-db.com/exploits/15510/"],"2011950":["http://exploit-db.com/exploits/15510/"],"2011967":["http://www.malwareurl.com/listing.php?domain=19eylulmusikicemiyeti.com"],"2011976":["http://www.exploit-db.com/exploits/15337/"],"2011982":["http://www.malwareurl.com/listing.php?domain=newpornmov.info"],"2011987":["http://exploit-db.com/exploits/14910/"],"2011996":["http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20101205","http://ef.kaffenews.com/?p=833","http://www.threatexpert.com/report.aspx?md5=55edeb8742f0c38aaa3d984eb4205c68","http://www.threatexpert.com/report.aspx?md5=60c84bb1ca03f80ca385f16946322440","http://www.threatexpert.com/report.aspx?md5=7fcebf5bd67cede35d08bedd683e3524","http://www.threatexpert.com/report.aspx?md5=778113cc4e758ed65de0123bb79cbd1f"],"2012000":["http://threatexpert.com/report.aspx?md5=3f6413475b1466964498c8450de4062f"],"2012001":["http://exploit-db.com/exploits/15405/"],"2012002":["http://exploit-db.com/exploits/15405/"],"2012003":["http://exploit-db.com/exploits/15405/"],"2012004":["http://exploit-db.com/exploits/15405/"],"2012005":["http://exploit-db.com/exploits/15405/"],"2012006":["http://exploit-db.com/exploits/15441/"],"2012007":["http://packetstormsecurity.org/1011-exploits/phpcow-rfilfi.txt"],"2012008":["http://packetstormsecurity.org/1011-exploits/phpcow-rfilfi.txt"],"2012009":["http://secunia.com/advisories/42197/","http://johnleitch.net/Vulnerabilities/WordPress.Feed.List.2.61.01.Reflected.Cross-site.Scripting/56"],"2012010":["http://secunia.com/advisories/42101/"],"2012011":["http://packetstormsecurity.org/files/view/94299/hordeimp-xss.txt"],"2012012":["http://exploit-db.com/exploits/13966/"],"2012013":["http://packetstormsecurity.org/files/view/95510/mambosmf-rfi.txt"],"2012014":["http://expbase.com/WebApps/13388.html","http://secunia.com/advisories/42324/"],"2012015":["http://expbase.com/WebApps/13387.html","http://xforce.iss.net/xforce/xfdb/63343"],"2012016":["http://expbase.com/WebApps/13391.html","http://secunia.com/advisories/42330/"],"2012017":["http://expbase.com/WebApps/13391.html","http://secunia.com/advisories/42330/"],"2012018":["http://expbase.com/WebApps/13391.html","http://secunia.com/advisories/42330/"],"2012019":["http://expbase.com/WebApps/13391.html","http://secunia.com/advisories/42330/"],"2012020":["http://expbase.com/WebApps/13391.html","http://secunia.com/advisories/42330/"],"2012021":["http://exploit-db.com/exploits/15595/","http://secunia.com/advisories/42334/"],"2012022":["http://exploit-db.com/exploits/15222/"],"2012023":["http://secunia.com/advisories/42344/","http://archives.neohapsis.com/archives/bugtraq/2010-11/0190.html"],"2012024":["http://exploit-db.com/exploits/10986/"],"2012025":["http://packetstormsecurity.org/files/view/95644/seopanel-disclose.txt"],"2012026":["http://exploit-db.com/exploits/15526/"],"2012027":["http://exploit-db.com/exploits/15526/"],"2012028":["http://exploit-db.com/exploits/15526/"],"2012029":["http://exploit-db.com/exploits/15526/"],"2012030":["http://exploit-db.com/exploits/15526/"],"2012031":["http://exploit-db.com/exploits/15711/"],"2012032":["http://exploit-db.com/exploits/15711/"],"2012033":["http://secunia.com/advisories/39144/","http://1337db.com/exploits/11446"],"2012034":["http://exploit-db.com/exploits/15006/"],"2012035":["http://exploit-db.com/exploits/15006/"],"2012036":["http://exploit-db.com/exploits/15006/"],"2012037":["http://exploit-db.com/exploits/15006/"],"2012038":["http://exploit-db.com/exploits/15006/"],"2012039":["http://exploit-db.com/exploits/15135/"],"2012040":["http://secunia.com/advisories/42440/"],"2012041":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012042":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012043":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012044":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012052":["http://www.exploit-db.com/exploits/15695/"],"2012053":["http://www.exploit-db.com/exploits/15694/"],"2012059":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012060":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012061":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012062":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012064":["http://www.exploit-db.com/exploits/15532/"],"2012065":["http://secunia.com/advisories/42463/","http://securityreason.com/securityalert/7955"],"2012066":["http://secunia.com/advisories/42463/","http://securityreason.com/securityalert/7955"],"2012068":["http://exploit-db.com/exploits/12005/"],"2012069":["http://exploit-db.com/exploits/15736/","http://secunia.com/advisories/42597/"],"2012070":["http://exploit-db.com/exploits/15735/","http://secunia.com/advisories/42597/"],"2012071":["http://exploit-db.com/exploits/15737/"],"2012072":["http://secunia.com/advisories/42544"],"2012073":["http://secunia.com/advisories/42463/","http://securityreason.com/securityalert/7955"],"2012074":["http://secunia.com/advisories/42463/","http://securityreason.com/securityalert/7955"],"2012078":["http://www.stunnel.org/download/binaries.html"],"2012079":["http://www.stunnel.org/download/binaries.html"],"2012080":["http://www.stunnel.org/download/binaries.html"],"2012084":["http://www.exploit-db.com/exploits/12258/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0017","http://www.securityfocus.com/bid/38100","http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx"],"2012087":["http://www.networkforensics.com/2010/05/16/network-detection-of-x86-buffer-overflow-shellcode/"],"2012090":["http://www.networkforensics.com/2010/05/16/network-detection-of-x86-buffer-overflow-shellcode/"],"2012091":["http://www.networkforensics.com/2010/05/16/network-detection-of-x86-buffer-overflow-shellcode/"],"2012092":["http://www.networkforensics.com/2010/05/16/network-detection-of-x86-buffer-overflow-shellcode/"],"2012093":["http://www.networkforensics.com/2010/05/16/network-detection-of-x86-buffer-overflow-shellcode/"],"2012094":["http://www.exploit-db.com/exploits/14607/","http://seclists.org/fulldisclosure/2010/Aug/122","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2550","http://www.securityfocus.com/bid/42224","http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx"],"2012096":["http://www.securityfocus.com/bid/31418","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4322","http://secunia.com/advisories/32055"],"2012097":["http://www.exploit-db.com/exploits/15809/"],"2012098":["http://www.exploit-db.com/exploits/15655"],"2012099":["http://exploit-db.com/exploits/15721/"],"2012100":["http://www.exploit-db.com/exploits/15241/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3552","http://www.securityfocus.com/bid/44023"],"2012104":["http://www.siteadvisor.com/sites/config.poweredbyadvantage.com"],"2012105":["http://www.siteadvisor.com/sites/config.poweredbyadvantage.com"],"2012106":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012107":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012108":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012109":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012110":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.windowsecurity.com/articles/Obfuscated-Shellcode-Part1.html"],"2012111":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.windowsecurity.com/articles/Obfuscated-Shellcode-Part1.html"],"2012112":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.windowsecurity.com/articles/Obfuscated-Shellcode-Part1.html"],"2012113":["http://threatexpert.com/report.aspx?md5=d5ff6df296c068fcc0ddd303984fa6b9"],"2012115":["http://sign.kaffenews.com/?p=104","http://www.isc.sans.org/diary.html?storyid=10165"],"2012116":["http://www.exploit-db.com/exploits/15842/"],"2012117":["http://www.exploit-db.com/exploits/15842/"],"2012122":["http://exploit-db.com/exploits/15783/","http://doc.emergingthreats.net/2012122"],"2012123":["http://exploit-db.com/exploits/15783/","http://doc.emergingthreats.net/2012123"],"2012124":["http://exploit-db.com/exploits/15783/","http://doc.emergingthreats.net/2012124"],"2012125":["http://exploit-db.com/exploits/15783/","http://doc.emergingthreats.net/2012125"],"2012126":["http://exploit-db.com/exploits/15783/","http://doc.emergingthreats.net/2012126"],"2012127":["http://exploit-db.com/exploits/15783/","http://doc.emergingthreats.net/2012127"],"2012128":["http://exploit-db.com/exploits/15783/","http://doc.emergingthreats.net/2012128"],"2012129":["http://exploit-db.com/exploits/15783/","http://doc.emergingthreats.net/2012129"],"2012130":["http://packetstormsecurity.org/files/view/96805/mybloggie216-rfi.txt","http://doc.emergingthreats.net/2012130"],"2012131":["http://exploit-db.com/exploits/14172/","http://doc.emergingthreats.net/2012131"],"2012133":["http://www.exploit-db.com/exploits/14552/"],"2012140":["http://www.isc.sans.org/diary.html?storyid=10186"],"2012141":["http://en.wikipedia.org/wiki/6in4"],"2012143":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0480","http://www.exploit-db.com/moaub-5-microsoft-mpeg-layer-3-audio-stack-based-overflow/","http://www.exploit-db.com/exploits/14895/","http://www.microsoft.com/technet/security/Bulletin/MS10-026.mspx"],"2012147":["http://www.exploit-db.com/exploits/14580/"],"2012148":["http://www.exploit-db.com/exploits/14586/"],"2012150":["http://bugs.php.net/bug.php?id=53632"],"2012151":["http://bugs.php.net/bug.php?id=53632"],"2012153":["http://www.exploit-db.com/moaub-8-microsoft-office-visio-dxf-file-stack-overflow","http://www.exploit-db.com/exploits/14944/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1681","http://www.microsoft.com/technet/security/bulletin/ms10-028.mspx","http://www.securityfocus.com/bid/39836"],"2012157":["http://xcon.xfocus.net/XCon2010_ChenXie_EN.pdf","http://wooyun.org/bug.php?action=view&id=1006"],"2012158":["http://xcon.xfocus.net/XCon2010_ChenXie_EN.pdf","http://wooyun.org/bug.php?action=view&id=1006","http://www.securityfocus.com/bid/45546","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3973"],"2012159":["http://packetstormsecurity.org/files/view/97188/phpig-sql.txt"],"2012160":["http://packetstormsecurity.org/files/view/97188/phpig-sql.txt"],"2012161":["http://packetstormsecurity.org/files/view/97188/phpig-sql.txt"],"2012162":["http://packetstormsecurity.org/files/view/97188/phpig-sql.txt"],"2012163":["http://packetstormsecurity.org/files/view/97188/phpig-sql.txt"],"2012164":["http://packetstormsecurity.org/files/view/96928/wpsignups-xss.txt"],"2012165":["http://www.securityfocus.com/bid/45669"],"2012166":["http://packetstormsecurity.org/files/view/96996/xmovie-fli.txt"],"2012167":["http://exploit-db.com/exploits/15124/"],"2012168":["http://johnleitch.net/Vulnerabilities/Tiki.Wiki.CMS.Groupware.5.2.Local.File.Inclusion/46"],"2012169":["http://krebsonsecurity.com/2010/10/java-a-gift-to-exploit-pack-makers/"],"2012171":["http://isc.sans.edu/diary.html?storyid=3266","http://isc.sans.edu/diary.html?storyid=5710","http://google.com/safebrowsing/diagnostic?site=3322.org/","http://www.mywot.com/en/scorecard/3322.org"],"2012179":["http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=827","http://www.adobe.com/support/security/bulletins/apsb09-15.html","http://www.securityfocus.com/bid/36638","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2990"],"2012181":["http://exploit-db.com/exploits/15907/"],"2012182":["http://exploit-db.com/exploits/15907/"],"2012184":["http://exploit-db.com/exploits/15907/"],"2012185":["http://exploit-db.com/exploits/15907/"],"2012186":["http://exploit-db.com/exploits/15938/"],"2012187":["http://packetstormsecurity.org/files/view/96613/bizdir510-xss.txt"],"2012189":["http://exploit-db.com/exploits/12026/"],"2012190":["http://packetstormsecurity.org/files/view/96466/zimplit-xss.txt"],"2012191":["http://packetstormsecurity.org/files/view/96466/zimplit-xss.txt"],"2012193":["http://packetstormsecurity.org/files/view/97265/lexmark-xss.txt"],"2012196":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012197":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012198":["http://www.threatexpert.com/report.aspx?md5=fcb828c0b735ea8d560a45b3bdd29b94","http://www.threatexpert.com/report.aspx?md5=36d9a446d6311f9a4c19865e2b62f15d"],"2012199":["http://www.threatexpert.com/report.aspx?md5=fb789b067c2809c25fb36abb677cdfcd"],"2012200":["http://www.threatexpert.com/report.aspx?md5=fb789b067c2809c25fb36abb677cdfcd"],"2012201":["http://www.threatexpert.com/report.aspx?md5=a70aad8f27957702febfa162556dc5b5"],"2012204":["http://code.google.com/p/sipvicious/","http://blog.sipvicious.org/","http://honeynet.org.au/?q=sunday_scanner"],"2012206":["http://www.zerodayinitiative.com/advisories/ZDI-10-256/","http://www.vupen.com/english/advisories/2010/3023","http://www.securityfocus.com/bid/44966","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4321"],"2012211":["http://packetstormsecurity.org/files/view/96808/tunngavikcms-sql.txt"],"2012212":["http://packetstormsecurity.org/files/view/96808/tunngavikcms-sql.txt"],"2012213":["http://packetstormsecurity.org/files/view/96808/tunngavikcms-sql.txt"],"2012214":["http://packetstormsecurity.org/files/view/96808/tunngavikcms-sql.txt"],"2012215":["http://packetstormsecurity.org/files/view/96808/tunngavikcms-sql.txt"],"2012216":["http://packetstormsecurity.org/files/view/97618/bcumulus-xss.txt"],"2012217":["http://www.securityfocus.com/bid/37828"],"2012219":["http://exploit-db.com/exploits/15999/"],"2012220":["http://packetstormsecurity.org/files/view/97618/bcumulus-xss.txt"],"2012221":["http://www.sunbeltsecurity.com/partnerresources/cwsandbox/md5.aspx?id=17fdf0cb5970b71b81b1a5406e017ac1"],"2012222":["http://www.threatexpert.com/report.aspx?md5=d773d063d8cf35166831af0dae13a4b7","http://xml.ssdsandbox.net/index.php/935021734dd64921defd1eb266c3fb39"],"2012223":["http://www.threatexpert.com/report.aspx?md5=d773d063d8cf35166831af0dae13a4b7","http://xml.ssdsandbox.net/index.php/935021734dd64921defd1eb266c3fb39"],"2012224":["http://www.threatexpert.com/report.aspx?md5=d773d063d8cf35166831af0dae13a4b7","http://xml.ssdsandbox.net/index.php/935021734dd64921defd1eb266c3fb39"],"2012225":["http://www.threatexpert.com/report.aspx?md5=58b3c37b61d27cdc0a55321f4c12ef04"],"2012226":["http://www.threatexpert.com/report.aspx?md5=7ce03717d6879444d8e45b7cf6470c67"],"2012234":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3599"],"2012241":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.guardian.co.uk/technology/2008/apr/03/security.google"],"2012242":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.guardian.co.uk/technology/2008/apr/03/security.google"],"2012243":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.guardian.co.uk/technology/2008/apr/03/security.google"],"2012244":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.guardian.co.uk/technology/2008/apr/03/security.google"],"2012245":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012252":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012254":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012255":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012257":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012258":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012259":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012260":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.w3schools.com/jsref/jsref_parseInt.asp"],"2012261":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.w3schools.com/jsref/jsref_parseInt.asp"],"2012262":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.w3schools.com/jsref/jsref_parseInt.asp"],"2012263":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012264":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012265":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012266":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012267":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012268":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012269":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012270":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012271":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012272":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012273":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012274":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012296":["http://blog.sipvicious.org/2010/11/distributed-sip-scanning-during.html"],"2012297":["http://blog.sipvicious.org/2010/12/11-million-euro-loss-in-voip-fraud-and.html"],"2012299":["http://www.threatexpert.com/report.aspx?md5=fbcdfecc73c4389e8d3ed7e2e573b6f1"],"2012303":["http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf"],"2012304":["http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-Night-dragon.pdf"],"2012305":["http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-Night-dragon.pdf"],"2012306":["http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-Night-dragon.pdf"],"2012307":["http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-Night-dragon.pdf"],"2012308":["http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-Night-dragon.pdf"],"2012309":["http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-Night-dragon.pdf"],"2012314":["http://contagiodump.blogspot.com/2011/02/tdss-tdl-4-alureon-32-bit-and-64-bit.html"],"2012317":["http://tools.cisco.com/security/center/viewAlert.x?alertId=22457","http://www.securityfocus.com/bid/46360"],"2012322":["http://www.kernelmode.info/forum/viewtopic.php?f=16&t=19","http://www.securelist.com/en/analysis/204792180/TDL4_Top_Bot"],"2012334":["http://exploit-db.com/exploits/16051/"],"2012335":["http://exploit-db.com/exploits/16034/"],"2012336":["http://exploit-db.com/exploits/16028/"],"2012337":["http://exploit-db.com/exploits/16028/"],"2012338":["http://packetstormsecurity.org/files/view/97588/phpfusiontsi-sql.txt"],"2012339":["http://packetstormsecurity.org/files/view/97588/phpfusiontsi-sql.txt"],"2012340":["http://packetstormsecurity.org/files/view/97588/phpfusiontsi-sql.txt"],"2012341":["http://packetstormsecurity.org/files/view/97588/phpfusiontsi-sql.txt"],"2012342":["http://packetstormsecurity.org/files/view/97588/phpfusiontsi-sql.txt"],"2012343":["http://johnleitch.net/Vulnerabilities/WeBid.0.8.5P1.Local.File.Inclusion/63"],"2012344":["http://exploit-db.com/exploits/12369/"],"2012345":["http://secunia.com/advisories/43137/","http://securityhome.eu/exploits/exploit.php?eid=17879866924d479451d88fa8.02873909"],"2012346":["http://exploit-db.com/exploits/16087/"],"2012347":["http://exploit-db.com/exploits/16087/"],"2012348":["http://exploit-db.com/exploits/16087/"],"2012349":["http://exploit-db.com/exploits/16087/"],"2012350":["http://exploit-db.com/exploits/16087/"],"2012351":["http://packetstormsecurity.org/files/view/98029/enp-xss.txt"],"2012352":["http://exploit-db.com/exploits/16062/"],"2012353":["http://packetstormsecurity.org/files/view/97834/WordPressAudio0.5.1-xss.txt"],"2012354":["http://www.securityfocus.com/bid/46173"],"2012355":["http://packetstormsecurity.org/files/view/98053/Moodle2.0.1-xss.txt"],"2012356":["http://packetstormsecurity.org/files/view/97826/WordPressFeaturedContent0.0.1-xss.txt"],"2012357":["http://packetstormsecurity.org/files/view/96864/joomlaxgallery-lfi.txt"],"2012358":["http://www.securityfocus.com/bid/45933"],"2012359":["http://packetstormsecurity.org/files/view/98190/tcms-sql.txt"],"2012360":["http://packetstormsecurity.org/files/view/98190/tcms-sql.txt"],"2012361":["http://packetstormsecurity.org/files/view/98190/tcms-sql.txt"],"2012362":["http://packetstormsecurity.org/files/view/98190/tcms-sql.txt"],"2012363":["http://packetstormsecurity.org/files/view/98190/tcms-sql.txt"],"2012364":["http://packetstormsecurity.org/files/view/97294/phpbexfront-sql.txt"],"2012365":["http://packetstormsecurity.org/files/view/97294/phpbexfront-sql.txt"],"2012366":["http://packetstormsecurity.org/files/view/97294/phpbexfront-sql.txt"],"2012367":["http://packetstormsecurity.org/files/view/97294/phpbexfront-sql.txt"],"2012368":["http://packetstormsecurity.org/files/view/97294/phpbexfront-sql.txt"],"2012369":["http://packetstormsecurity.org/files/view/95505/joomlaswmenupro-rfi.txt"],"2012370":["http://packetstormsecurity.org/files/view/98408/Dolphin7.0.4-xss.txt","http://www.securityfocus.com/bid/46337"],"2012371":["http://packetstormsecurity.org/files/view/98408/Dolphin7.0.4-xss.txt","http://www.securityfocus.com/bid/46337"],"2012372":["http://exploit-db.com/exploits/14935/"],"2012373":["http://packetstormsecurity.org/files/view/98424/horde-lfi.txt"],"2012374":["http://exploit-db.com/exploits/16202/"],"2012375":["http://exploit-db.com/exploits/16202/"],"2012376":["http://exploit-db.com/exploits/16202/"],"2012377":["http://exploit-db.com/exploits/16202/"],"2012378":["http://exploit-db.com/exploits/16202/"],"2012379":["http://packetstormsecurity.org/files/view/82724/telebidauction-sql.txt"],"2012380":["http://packetstormsecurity.org/files/view/98143/podcastgenerator-xss.txt"],"2012381":["http://exploit-db.com/exploits/9497"],"2012382":["http://packetstormsecurity.org/files/view/98347/cpg15x-exec.txt"],"2012383":["http://packetstormsecurity.org/files/view/98347/cpg15x-exec.txt"],"2012392":["http://www.malwareurl.com/listing.php?domain=antivirus-live21.com"],"2012393":["http://www.securityfocus.com/bid/45123","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4367"],"2012394":["http://www.securityfocus.com/bid/46471","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1038"],"2012395":["http://www.securityfocus.com/bid/46471","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1038"],"2012398":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012399":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012400":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html"],"2012405":["http://www.threatexpert.com/report.aspx?md5=f5dd61e29eff89a93c591fba7ea14d92"],"2012406":["http://lists.grok.org.uk/pipermail/full-disclosure/2011-February/079547.html"],"2012407":["http://lists.grok.org.uk/pipermail/full-disclosure/2011-February/079568.html"],"2012408":["http://lists.grok.org.uk/pipermail/full-disclosure/2011-February/079568.html"],"2012411":["http://exploit-db.com/exploits/16236/","http://htbridge.ch/advisory/sql_injection_in_iwantonebutton_wordpress_plugin.html"],"2012412":["http://exploit-db.com/exploits/16236/","http://htbridge.ch/advisory/sql_injection_in_iwantonebutton_wordpress_plugin.html"],"2012413":["http://exploit-db.com/exploits/16236/","http://htbridge.ch/advisory/sql_injection_in_iwantonebutton_wordpress_plugin.html"],"2012414":["http://exploit-db.com/exploits/16236/","http://htbridge.ch/advisory/sql_injection_in_iwantonebutton_wordpress_plugin.html"],"2012415":["http://exploit-db.com/exploits/16236/","http://htbridge.ch/advisory/sql_injection_in_iwantonebutton_wordpress_plugin.html"],"2012416":["http://exploit-db.com/exploits/16236/","http://htbridge.ch/advisory/sql_injection_in_iwantonebutton_wordpress_plugin.html"],"2012417":["http://exploit-db.com/exploits/16236/","http://htbridge.ch/advisory/sql_injection_in_iwantonebutton_wordpress_plugin.html"],"2012418":["http://packetstormsecurity.org/files/view/98756/PhreeBooksR30RC4-xss.txt","http://exploit-db.com/exploits/16249/"],"2012419":["http://packetstormsecurity.org/files/view/98756/PhreeBooksR30RC4-xss.txt","http://exploit-db.com/exploits/16249/"],"2012420":["http://exploit-db.com/exploits/16225/","http://securelist.com/en/advisories/43460","http://secunia.com/advisories/43460"],"2012421":["http://exploit-db.com/exploits/16225/","http://securelist.com/en/advisories/43460","http://secunia.com/advisories/43460"],"2012422":["http://exploit-db.com/exploits/16225/","http://securelist.com/en/advisories/43460","http://secunia.com/advisories/43460"],"2012423":["http://exploit-db.com/exploits/16225/","http://securelist.com/en/advisories/43460","http://secunia.com/advisories/43460"],"2012424":["http://exploit-db.com/exploits/16225/","http://securelist.com/en/advisories/43460","http://secunia.com/advisories/43460"],"2012425":["http://exploit-db.com/exploits/16225/","http://securelist.com/en/advisories/43460","http://secunia.com/advisories/43460"],"2012426":["http://www.securityfocus.com/bid/46582","http://exploit-db.com/exploits/16246/"],"2012427":["http://www.securityfocus.com/bid/46582","http://exploit-db.com/exploits/16246/"],"2012428":["http://www.securityfocus.com/bid/46582","http://exploit-db.com/exploits/16246/"],"2012429":["http://www.securityfocus.com/bid/46582","http://exploit-db.com/exploits/16246/"],"2012430":["http://www.securityfocus.com/bid/46582","http://exploit-db.com/exploits/16246/"],"2012431":["http://exploit-db.com/exploits/16235/"],"2012432":["http://exploit-db.com/exploits/16235/"],"2012433":["http://exploit-db.com/exploits/16235/"],"2012434":["http://exploit-db.com/exploits/16235/"],"2012435":["http://exploit-db.com/exploits/16235/"],"2012436":["http://exploit-db.com/exploits/16235/"],"2012437":["http://packetstormsecurity.org/files/view/98746/WordPressZotpress2.6-xss.txt"],"2012438":["http://threatexpert.com/report.aspx?md5=40d1819b9c3c85e1f3b7723c7a9118ad"],"2012441":["http://threatexpert.com/report.aspx?md5=43b0ddf87c66418053ee055501193abf","http://scumware.org/report/89.108.68.81"],"2012451":["http://virus.netqin.com/en/android/MSO.PJApps.A"],"2012452":["http://virus.netqin.com/en/android/MSO.PJApps.A/"],"2012453":["http://blog.mylookout.com/2011/03/security-alert-malware-found-in-official-android-market-droiddream/"],"2012454":["http://blog.aegislab.com/index.php?op=ViewArticle&articleId=81&blogId=1"],"2012455":["http://blog.aegislab.com/index.php?op=ViewArticle&articleId=81&blogId=1"],"2012457":["http://asert.arbornetworks.com/2011/03/jkddos-ddos-bot-with-an-interest-in-the-mining-industry"],"2012460":["http://asert.arbornetworks.com/2011/03/jkddos-ddos-bot-with-an-interest-in-the-mining-industry"],"2012461":["http://asert.arbornetworks.com/2011/03/jkddos-ddos-bot-with-an-interest-in-the-mining-industry"],"2012468":["http://securityreason.com/wlb_show/WLB-2011020009"],"2012469":["http://securityreason.com/wlb_show/WLB-2011020009"],"2012470":["http://securityreason.com/wlb_show/WLB-2011020009"],"2012471":["http://securityreason.com/wlb_show/WLB-2011020009"],"2012472":["http://securityreason.com/wlb_show/WLB-2011020009"],"2012473":["http://securityreason.com/wlb_show/WLB-2011020009"],"2012474":["http://www.securityfocus.com/bid/46798","http://exploit-db.com/exploits/16950/"],"2012475":["http://www.securityfocus.com/bid/46798","http://exploit-db.com/exploits/16950/"],"2012476":["http://htbridge.ch/advisory/xss_in_1_flash_gallery_wordpress_plugin.html","http://packetstormsecurity.org/files/view/99086/1flashgal-sqlxss.txt"],"2012477":["http://htbridge.ch/advisory/sql_injection_in_1_flash_gallery_wordpress_plugin.html"],"2012478":["http://htbridge.ch/advisory/sql_injection_in_1_flash_gallery_wordpress_plugin.html"],"2012479":["http://htbridge.ch/advisory/sql_injection_in_1_flash_gallery_wordpress_plugin.html"],"2012480":["http://htbridge.ch/advisory/sql_injection_in_1_flash_gallery_wordpress_plugin.html"],"2012481":["http://htbridge.ch/advisory/sql_injection_in_1_flash_gallery_wordpress_plugin.html"],"2012482":["http://htbridge.ch/advisory/sql_injection_in_1_flash_gallery_wordpress_plugin.html"],"2012483":["http://secunia.com/advisories/43709"],"2012484":["http://secunia.com/advisories/43709"],"2012485":["http://exploit-db.com/exploits/16954/"],"2012486":["http://exploit-db.com/exploits/16954/"],"2012487":["http://exploit-db.com/exploits/16954/"],"2012488":["http://exploit-db.com/exploits/16954/"],"2012489":["http://exploit-db.com/exploits/16954/"],"2012490":["http://exploit-db.com/exploits/16954/"],"2012496":["http://www.securityfocus.com/bid/45656","http://exploit-db.com/exploits/15896/","http://xforce.iss.net/xforce/xfdb/64442"],"2012497":["http://www.securityfocus.com/bid/45656","http://exploit-db.com/exploits/15896/","http://xforce.iss.net/xforce/xfdb/64442"],"2012498":["http://www.securityfocus.com/bid/46842","http://packetstormsecurity.org/files/99204","http://exploit-db.com/exploits/16963/"],"2012499":["http://www.securityfocus.com/bid/46842","http://packetstormsecurity.org/files/99204","http://exploit-db.com/exploits/16963/"],"2012500":["http://www.securityfocus.com/bid/46842","http://packetstormsecurity.org/files/99204","http://exploit-db.com/exploits/16963/"],"2012501":["http://www.securityfocus.com/bid/46842","http://packetstormsecurity.org/files/99204","http://exploit-db.com/exploits/16963/"],"2012502":["http://www.securityfocus.com/bid/46842","http://packetstormsecurity.org/files/99204","http://exploit-db.com/exploits/16963/"],"2012508":["http://www.akamai.com/html/misc/akamai_client/netsession_interface_faq.html"],"2012509":["http://www.securityfocus.com/bid/40642","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1119"],"2012511":["http://www.exploit-db.com/exploits/16979/"],"2012522":["http://mashable.com/2011/03/19/xxx-tld-porn/","http://mashable.com/2010/06/24/dot-xxx-porn-domain/"],"2012533":["http://www.threatexpert.com/report.aspx?md5=199d9ea754f193194e251415a2f6dd46"],"2012535":["http://www.symantec.com/avcenter/reference/evolving.shell.code.pdf"],"2012555":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3aWin32%2fNeeris.BF","http://www.avira.com/en/support-threats-description/tid/6259/tlang/en"],"2012556":["http://packetstormsecurity.org/files/view/99467/shapewebsolutions-sql.txt"],"2012557":["http://packetstormsecurity.org/files/view/99467/shapewebsolutions-sql.txt"],"2012558":["http://packetstormsecurity.org/files/view/99467/shapewebsolutions-sql.txt"],"2012559":["http://packetstormsecurity.org/files/view/99467/shapewebsolutions-sql.txt"],"2012560":["http://packetstormsecurity.org/files/view/99467/shapewebsolutions-sql.txt"],"2012561":["http://exploit-db.com/exploits/12366"],"2012562":["http://exploit-db.com/exploits/12366"],"2012563":["http://exploit-db.com/exploits/12366"],"2012564":["http://exploit-db.com/exploits/12366"],"2012565":["http://exploit-db.com/exploits/12366"],"2012566":["http://exploit-db.com/exploits/8784/"],"2012567":["http://packetstormsecurity.org/files/view/98769/coredcms-sql.txt"],"2012568":["http://packetstormsecurity.org/files/view/98769/coredcms-sql.txt"],"2012569":["http://packetstormsecurity.org/files/view/98769/coredcms-sql.txt"],"2012570":["http://packetstormsecurity.org/files/view/98769/coredcms-sql.txt"],"2012571":["http://exploit-db.com/exploits/16250"],"2012572":["http://exploit-db.com/exploits/16912"],"2012573":["http://packetstormsecurity.org/files/view/99118/recordpress-xsrfxss.txt"],"2012574":["http://packetstormsecurity.org/files/view/99118/recordpress-xsrfxss.txt"],"2012575":["http://packetstormsecurity.org/files/view/98636/mySeatXT0.164-SQL.txt"],"2012577":["http://packetstormsecurity.org/files/view/98636/mySeatXT0.164-SQL.txt"],"2012579":["http://packetstormsecurity.org/files/view/98636/mySeatXT0.164-SQL.txt"],"2012581":["http://htbridge.ch/advisory/xss_in_lazyest_gallery_wordpress_plugin.html","http://secunia.com/advisories/43661/"],"2012585":["http://packetstormsecurity.org/files/view/98769/coredcms-sql.txt"],"2012587":["http://threatexpert.com/report.aspx?md5=85a9f25c9b6614a8ad16dd7f3363a247"],"2012595":["http://packetstormsecurity.org/files/view/98636/mySeatXT0.164-SQL.txt"],"2012596":["http://packetstormsecurity.org/files/view/98636/mySeatXT0.164-SQL.txt"],"2012597":["http://packetstormsecurity.org/files/view/98636/mySeatXT0.164-SQL.txt"],"2012598":["http://packetstormsecurity.org/files/view/98636/mySeatXT0.164-SQL.txt"],"2012599":["http://packetstormsecurity.org/files/view/98636/mySeatXT0.164-SQL.txt"],"2012600":["http://packetstormsecurity.org/files/view/98636/mySeatXT0.164-SQL.txt"],"2012601":["http://htbridge.ch/advisory/xss_in_lazyest_gallery_wordpress_plugin.html","http://secunia.com/advisories/43661/"],"2012603":["http://www.securityfocus.com/bid/46771","http://xforce.iss.net/xforce/xfdb/65942","http://packetstorm.linuxsecurity.com/1103-exploits/Interleave5.5.0.2-xss.txt"],"2012606":["http://itsecteam.com/en/projects/project1.htm"],"2012642":["http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FCycbot.B"],"2012647":["http://www.dropbox.com","http://dereknewton.com/2011/04/dropbox-authentication-static-host-ids/"],"2012651":["http://packetstormsecurity.org/files/view/100119/phpnukesurveys-sql.txt"],"2012652":["http://packetstormsecurity.org/files/view/100119/phpnukesurveys-sql.txt"],"2012653":["http://packetstormsecurity.org/files/view/100119/phpnukesurveys-sql.txt"],"2012654":["http://packetstormsecurity.org/files/view/100119/phpnukesurveys-sql.txt"],"2012655":["http://packetstormsecurity.org/files/view/100119/phpnukesurveys-sql.txt"],"2012656":["http://secunia.com/advisories/43818"],"2012657":["http://secunia.com/advisories/43818"],"2012658":["http://www.securityfocus.com/bid/47046"],"2012659":["http://packetstormsecurity.org/files/view/99278/joomladoqment-rfilfisql.txt"],"2012660":["http://packetstormsecurity.org/files/view/80053/portel-sql.txt"],"2012661":["http://www.securityfocus.com/bid/46635"],"2012662":["http://www.securityfocus.com/bid/46635"],"2012663":["http://www.securityfocus.com/bid/46635"],"2012664":["http://www.securityfocus.com/bid/46635"],"2012665":["http://www.securityfocus.com/bid/46635"],"2012666":["http://packetstormsecurity.org/files/view/95477/joomlasmartformer-rfi.txt"],"2012667":["http://packetstormsecurity.org/files/view/88439/joomlamediamallfactory-bsql.txt"],"2012668":["http://secunia.com/advisories/22484"],"2012669":["http://packetstormsecurity.org/files/view/99698/ClanSphere2010.3CKEditor-xss.txt"],"2012670":["http://packetstormsecurity.org/files/view/99089/photosmash-xss.txt"],"2012672":["http://exploit-db.com/exploits/17061/","http://vupen.com/english/advisories/2011/0823"],"2012673":["http://exploit-db.com/exploits/17061/","http://vupen.com/english/advisories/2011/0823"],"2012674":["http://exploit-db.com/exploits/17061/","http://vupen.com/english/advisories/2011/0823"],"2012675":["http://exploit-db.com/exploits/17061/","http://vupen.com/english/advisories/2011/0823"],"2012676":["http://exploit-db.com/exploits/17061/","http://vupen.com/english/advisories/2011/0823"],"2012677":["http://exploit-db.com/exploits/17061/","http://vupen.com/english/advisories/2011/0823"],"2012678":["http://www.securityfocus.com/bid/47047","http://packetstormsecurity.org/files/99790","http://exploit-db.com/exploits/17054/"],"2012679":["http://www.securityfocus.com/bid/47047","http://packetstormsecurity.org/files/99790","http://exploit-db.com/exploits/17054/"],"2012680":["http://www.securityfocus.com/bid/47047","http://packetstormsecurity.org/files/99790","http://exploit-db.com/exploits/17054/"],"2012681":["http://www.securityfocus.com/bid/47047","http://packetstormsecurity.org/files/99790","http://exploit-db.com/exploits/17054/"],"2012694":["http://en.wikipedia.org/wiki/.xxx"],"2012697":["http://exploit-db.com/exploits/17132"],"2012698":["http://securityreason.com/wlb_show/WLB-2011040052"],"2012699":["http://securityreason.com/wlb_show/WLB-2011040052"],"2012700":["http://securityreason.com/wlb_show/WLB-2011040052"],"2012701":["http://securityreason.com/wlb_show/WLB-2011040052"],"2012702":["http://securityreason.com/wlb_show/WLB-2011040052"],"2012703":["http://packetstormsecurity.org/files/view/100324"],"2012704":["http://packetstormsecurity.org/files/view/100325"],"2012705":["http://secunia.com/advisories/43067","http://securelist.com/en/advisories/43067"],"2012706":["http://packetstormsecurity.org/files/view/100183/vtigerCRM5.2.1-XSS.txt"],"2012709":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0540"],"2012710":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0540"],"2012711":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0540"],"2012712":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0540"],"2012713":["http://www.threatexpert.com/report.aspx?md5=7710686d03cd3174b6f644434750b22b"],"2012715":["http://exploit-db.com/exploits/10809"],"2012716":["http://exploit-db.com/exploits/10809"],"2012717":["http://exploit-db.com/exploits/10809"],"2012718":["http://exploit-db.com/exploits/10809"],"2012719":["http://exploit-db.com/exploits/10809"],"2012720":["http://exploit-db.com/exploits/16016"],"2012721":["http://secunia.com/advisories/39517"],"2012722":["http://secunia.com/advisories/44256","http://htbridge.ch/advisory/xss_in_socialgrid_wordpress_plugin.html"],"2012723":["http://packetstormsecurity.org/files/view/80992/mambozoom-sql.txt"],"2012724":["http://packetstormsecurity.org/files/view/100525/cituscms-rfi.txt"],"2012725":["http://www.threatexpert.com/report.aspx?md5=f0f750e8f195dcfc8623679ff2df1267","http://www.threatexpert.com/report.aspx?md5=e186e530ebf0aec07f0cd2afd706633c","http://www.threatexpert.com/report.aspx?md5=294a729bb6a8fc266990b4c94eb86359"],"2012726":["http://openvas.org"],"2012735":["http://www.threatexpert.com/report.aspx?md5=54e482d6c0344935115d04b411afdb27","http://www.threatexpert.com/report.aspx?md5=54dfd618401a573996b2b32bdd21b2d4","http://www.threatexpert.com/report.aspx?md5=546888f8a18ed849058a5325015c29ef","http://www.babylon.com"],"2012738":["http://isc.sans.edu/diary.html?storyid=6739","http://google.com/safebrowsing/diagnostic?site=8866.org/","http://www.mywot.com/en/scorecard/8866.org"],"2012739":["http://www.threatexpert.com/report.aspx?md5=9623efa133415d19c941ef92a4f921fc"],"2012740":["http://www.symantec.com/business/security_response/writeup.jsp?docid=2011-032315-2902-99&tabid=2"],"2012741":["http://exploit-db.com/exploits/17196"],"2012742":["http://exploit-db.com/exploits/17196"],"2012743":["http://packetstormsecurity.org/files/view/100461/sauruscms-rfi.txt"],"2012744":["http://packetstormsecurity.org/files/view/100822/publishingtechnology-sql.txt"],"2012745":["http://packetstormsecurity.org/files/view/96760/phprsmk-sql.txt"],"2012746":["http://packetstormsecurity.org/files/view/96760/phprsmk-sql.txt"],"2012747":["http://packetstormsecurity.org/files/view/96760/phprsmk-sql.txt"],"2012748":["http://packetstormsecurity.org/files/view/96760/phprsmk-sql.txt"],"2012749":["http://packetstormsecurity.org/files/view/96760/phprsmk-sql.txt"],"2012750":["http://packetstormsecurity.org/files/view/100823/OrangeHRM2.6.3-lfi.txt"],"2012754":["http://sqlmap.sourceforge.net","http://www.darknet.org.uk/2011/04/sqlmap-0-9-released-automatic-blind-sql-injection-tool/"],"2012760":["http://www.cisco.com/en/US/products/products_security_advisory09186a0080b79904.shtml","http://www.securityfocus.com/bid/47607","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1609"],"2012781":["http://blog.fortinet.com/hiloti-the-botmaster-of-disguise/"],"2012787":["http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdf","http://www.exploit-db.com/exploits/17240/"],"2012788":["http://packetstormsecurity.org/files/view/97186/klink-sql.txt"],"2012789":["http://packetstormsecurity.org/files/view/97186/klink-sql.txt"],"2012790":["http://packetstormsecurity.org/files/view/97186/klink-sql.txt"],"2012791":["http://packetstormsecurity.org/files/view/97186/klink-sql.txt"],"2012792":["http://packetstormsecurity.org/files/view/97186/klink-sql.txt"],"2012793":["http://exploit-db.com/exploits/15004"],"2012794":["http://www.securityfocus.com/bid/47636"],"2012795":["http://securityreason.com/exploitalert/7180"],"2012797":["http://packetstormsecurity.org/files/view/101056/WebAuction0.3.6-XSS.txt"],"2012799":["http://malwaresurvival.net/2011/04/21/media-site-pimping-malware/","http://community.websense.com/forums/p/10728/23862.aspx","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?ThreatID=146443","http://www9.dyndns-server.com%3a8080/pub/botnet-links.html"],"2012800":["http://malwaresurvival.net/2011/04/21/media-site-pimping-malware/","http://community.websense.com/forums/p/10728/23862.aspx","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?ThreatID=146443"],"2012801":["http://malwaresurvival.net/2011/04/21/media-site-pimping-malware/","http://community.websense.com/forums/p/10728/23862.aspx","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?ThreatID=146443"],"2012802":["http://malwaresurvival.net/2011/04/21/media-site-pimping-malware/","http://community.websense.com/forums/p/10728/23862.aspx","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?ThreatID=146443"],"2012805":["http://securelist.com/en/advisories/43589"],"2012806":["http://www.1337day.com/exploits/16077"],"2012808":["http://seclists.org/fulldisclosure/2011/May/322"],"2012809":["http://seclists.org/fulldisclosure/2011/May/322"],"2012813":["http://exploit-db.com/exploits/17278/","http://securitytracker.com/id/1025530"],"2012814":["http://exploit-db.com/exploits/17278/","http://securitytracker.com/id/1025530"],"2012816":["http://blog.spiderlabs.com/2011/05/analyzing-malware-hollow-processes.html","http://sans.org/reading_room/whitepapers/malicious/rss/_33649"],"2012818":["http://www.exploit-db.com/exploits/17304/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0960"],"2012819":["http://www.exploit-db.com/exploits/17304/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0959"],"2012820":["http://www.exploit-db.com/exploits/17304/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0959"],"2012821":["http://www.exploit-db.com/exploits/17304/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0959"],"2012822":["http://www.exploit-db.com/exploits/17304/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0959"],"2012823":["http://www.exploit-db.com/exploits/17304/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0959"],"2012824":["http://www.exploit-db.com/exploits/17304/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0962"],"2012825":["http://www.exploit-db.com/exploits/17304/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0961"],"2012829":["http://packetstormsecurity.org/files/view/101251/joomlahelo-sql.txt"],"2012830":["http://packetstormsecurity.org/files/view/101251/joomlahelo-sql.txt"],"2012831":["http://packetstormsecurity.org/files/view/101251/joomlahelo-sql.txt"],"2012832":["http://packetstormsecurity.org/files/view/101251/joomlahelo-sql.txt"],"2012833":["http://packetstormsecurity.org/files/view/101251/joomlahelo-sql.txt"],"2012834":["http://packetstormsecurity.org/files/view/89665/chillycms-sql.txt","http://exploit-db.com/exploits/12643"],"2012835":["http://packetstormsecurity.org/files/view/101212/ffileman-traversal.txt"],"2012836":["http://1337day.com/exploits/12148"],"2012837":["http://packetstormsecurity.org/files/view/94593/joomlamgm-rfi.txt","http://securityreason.com/wlb_show/WLB-2010100045"],"2012838":["http://exploit-db.com/exploits/17299"],"2012841":["http://blog.fireeye.com/research/2011/03/the-rise-of-incognito.html"],"2012842":["http://www.threatexpert.com/report.aspx?md5=bfbc0b106a440c111a42936906d36643","http://www.threatexpert.com/report.aspx?md5=2190a2c0a3775bc9c60629ec2eb6f3b9"],"2012860":["http://www.fortiguard.com/encyclopedia/virus/symbos_sagasi.a!tr.html"],"2012863":["http://www.fortiguard.com/encyclopedia/virus/adware_sslcrypt!symbos.html"],"2012872":["http://autosectools.com/Advisory/TCExam-11.1.029-SQL-Injection-201"],"2012873":["http://autosectools.com/Advisory/TCExam-11.1.029-SQL-Injection-201"],"2012874":["http://autosectools.com/Advisory/TCExam-11.1.029-SQL-Injection-201"],"2012875":["http://autosectools.com/Advisory/TCExam-11.1.029-SQL-Injection-201"],"2012876":["http://autosectools.com/Advisory/TCExam-11.1.029-SQL-Injection-201"],"2012877":["http://packetstormsecurity.org/files/view/100565/e1070725-xssrfi.txt"],"2012878":["http://packetstormsecurity.org/files/view/100565/e1070725-xssrfi.txt"],"2012879":["http://packetstormsecurity.org/files/view/100565/e1070725-xssrfi.txt"],"2012880":["http://packetstormsecurity.org/files/view/100565/e1070725-xssrfi.txt"],"2012881":["http://packetstormsecurity.org/files/view/100565/e1070725-xssrfi.txt"],"2012882":["http://www.threatexpert.com/report.aspx?md5=4b8adc7612e984d12b77f197c59827a2"],"2012892":["http://asert.arbornetworks.com/2011/03/jkddos-ddos-bot-with-an-interest-in-the-mining-industry/","http://www.threatexpert.com/report.aspx?md5=d6b3baae9fb476f0cf3196e556cab348"],"2012893":["http://asert.arbornetworks.com/2011/03/skunkx-ddos-bot-analysis/"],"2012894":["http://www.threatexpert.com/report.aspx?md5=02e447b347a90680e03c8b7d843a8e46","http://www.antivirus365.org/PCAntivirus/37128.html"],"2012895":["http://www.threatexpert.com/report.aspx?md5=48ad09c574a4bd3bb24d007005382e63","http://www.threatexpert.com/report.aspx?md5=a264690a775a4e1b3d91c2dbcd850ce9"],"2012905":["http://www.exploit-db.com/exploits/17328/"],"2012906":["http://www.symantec.com/connect/blogs/analysis-zero-day-exploit-adobe-flash-and-reader","http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/"],"2012907":["http://www.symantec.com/connect/blogs/analysis-zero-day-exploit-adobe-flash-and-reader","http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/"],"2012919":["http://www.securityfocus.com/bid/48087"],"2012924":["http://www.fortiguard.com/encyclopedia/virus/android_smspacem.a!tr.html"],"2012926":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0419","http://cxib.net/stuff/apr_fnmatch.txt","http://bugzilla.redhat.com/show_bug.cgi?id=703390"],"2012930":["http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=909","http://www.securityfocus.com/bid/48081","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-2039","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-2040"],"2012932":["http://www.symantec.com/security_response/writeup.jsp?docid=2004-071915-0829-99&tabid=2","http://www.threatexpert.com/report.aspx?md5=28110a8ea5c13859ddf026db5a8a864a"],"2012933":["http://www.smilebox.com/privacy-policy.html"],"2012935":["http://music.google.com/about"],"2012945":["http://packetstormsecurity.org/files/view/101786/nvisionix-lfi.txt"],"2012946":["http://www.securityfocus.com/bid/46781"],"2012947":["http://1337day.com/exploits/16237"],"2012948":["http://exploit-db.com/exploits/17338"],"2012949":["http://hack0wn.com/view.php?xroot=1440.0&cat=exploits"],"2012950":["http://packetstormsecurity.org/files/view/88613/openscrutin-rfilfi.txt"],"2012951":["http://packetstormsecurity.org/files/view/88613/openscrutin-rfilfi.txt"],"2012952":["http://packetstormsecurity.org/files/view/88613/openscrutin-rfilfi.txt"],"2012953":["http://packetstormsecurity.org/files/view/88613/openscrutin-rfilfi.txt"],"2012954":["http://packetstormsecurity.org/files/view/88613/openscrutin-rfilfi.txt"],"2012957":["http://www.threatexpert.com/report.aspx?md5=3b0299d72c853f56a1595c855776f89f","http://www.threatexpert.com/report.aspx?md5=adc3a35d1244c9129be6edd6ccfaec5b"],"2012959":["http://blog.spiderlabs.com/2011/06/analysis-and-evolution-of-macdefender-os-x-fake-av-scareware.html"],"2012960":["http://threatexpert.com/report.aspx?md5=47a6dd02ee197f82b28cee0ab2b9bd35","http://threatexpert.com/report.aspx?md5=81d8a235cb5f7345b5796483abe8145f","http://www.threatexpert.com/report.aspx?md5=9688d1d37a7ced200c53ec2b9332a0ad"],"2012966":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012967":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012968":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012969":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012970":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2012971":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_qakbot_in_detail.pdf","http://www.symantec.com/security_response/writeup.jsp?docid=2009-050707-0639-99"],"2012972":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_qakbot_in_detail.pdf","http://www.symantec.com/security_response/writeup.jsp?docid=2009-050707-0639-99"],"2012973":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_qakbot_in_detail.pdf","http://www.symantec.com/security_response/writeup.jsp?docid=2009-050707-0639-99"],"2012974":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_qakbot_in_detail.pdf","http://www.symantec.com/security_response/writeup.jsp?docid=2009-050707-0639-99"],"2012975":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_qakbot_in_detail.pdf","http://www.symantec.com/security_response/writeup.jsp?docid=2009-050707-0639-99"],"2012976":["http://www.securityfocus.com/bid/45420","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4111"],"2012977":["http://www.coresecurity.com/content/oracle-glassfish-server-administration-console-authentication-bypass","http://www.securityfocus.com/bid/47818","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1511"],"2012978":["http://www.coresecurity.com/content/Adobe-Audition-malformed-SES-file","http://www.securityfocus.com/bid/47838","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0615"],"2012979":["http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3272"],"2012980":["http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3274"],"2012987":["http://packetstormsecurity.org/files/view/101876/tedesimplificado-sql.txt"],"2012988":["http://packetstormsecurity.org/files/view/101876/tedesimplificado-sql.txt"],"2012989":["http://packetstormsecurity.org/files/view/101876/tedesimplificado-sql.txt"],"2012990":["http://packetstormsecurity.org/files/view/101876/tedesimplificado-sql.txt"],"2012991":["http://packetstormsecurity.org/files/view/101876/tedesimplificado-sql.txt"],"2012992":["http://autosectools.com/Advisory/Nakid-CMS-1.0.2-Reflected-Cross-site-Scripting-230"],"2012993":["http://packetstormsecurity.org/files/view/86292/pear-rfi.txt"],"2012994":["http://packetstormsecurity.org/files/view/86292/pear-rfi.txt"],"2012995":["http://exploit-db.com/exploits/16001"],"2012996":["http://packetstormsecurity.org/files/view/101698/awstatstotals_multisort.rb.txt"],"2012998":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2012999":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013000":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013001":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013002":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013003":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013004":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013005":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013006":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013007":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013008":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013009":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013014":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0953","http://diablohorn.wordpress.com/2010/01/16/interesting-local-file-inclusion-method/"],"2013017":["http://www.symantec.com/security_response/writeup.jsp?docid=2008-112613-5052-99&tabid=2","http://doc.emergingthreats.net/2009987"],"2013018":["http://mtc.sri.com/iPhone/"],"2013023":["http://extraexploit.blogspot.com/2011/06/droidkungfu-just-some-piece-of-code.html","http://www.redmondpie.com/droidkungfu-new-hard-to-detect-android-malware-threat-on-the-loose-steals-user-data-and-more/","http://www.fortiguard.com/encyclopedia/virus/android_droidkungfu.a!tr.html"],"2013026":["http://www.threatexpert.com/report.aspx?md5=c86923d90ef91653b0a61eb2fbfae202","http://www.threatexpert.com/report.aspx?md5=0a52131eebbee1df877767875ab32352"],"2013028":["http://www.useragentstring.com/pages/useragentstring.php"],"2013030":["http://www.useragentstring.com/pages/useragentstring.php"],"2013031":["http://www.useragentstring.com/pages/useragentstring.php"],"2013032":["http://www.useragentstring.com/pages/useragentstring.php"],"2013033":["http://www.useragentstring.com/pages/useragentstring.php"],"2013040":["http://www.symantec.com/security_response/writeup.jsp?docid=2011-061012-4545-99&tabid=2"],"2013042":["http://www.csc.ncsu.edu/faculty/jiang/Plankton/","http://www.symantec.com/security_response/writeup.jsp?docid=2011-060910-5804-99&tabid=2"],"2013043":["http://www.csc.ncsu.edu/faculty/jiang/Plankton/","http://www.symantec.com/security_response/writeup.jsp?docid=2011-060910-5804-99&tabid=2"],"2013044":["http://www.csc.ncsu.edu/faculty/jiang/Plankton/","http://www.symantec.com/security_response/writeup.jsp?docid=2011-060910-5804-99&tabid=2"],"2013045":["http://www.f-secure.com/v-descs/trojan-downloader_w32_kdv176347.shtml","http://about-threats.trendmicro.com/malware.aspx?language=us&name=TROJ_VBKRYPT.CB","http://www.threatexpert.com/report.aspx?md5=3310259795b787210dd6825e7b6d6d28","http://www.threatexpert.com/report.aspx?md5=12554e7f2e78daf26e73a2f92d01e7a7","http://www.threatexpert.com/report.aspx?md5=7af2097d75869aa5aa656cd6e523c8b3"],"2013047":["http://labs.m86security.com/2011/06/new-bots-old-bots-ii-donbot/"],"2013049":["http://www.bin-co.com/php/scripts/load/","http://www.useragentstring.com/pages/useragentstring.php"],"2013050":["http://www.bin-co.com/php/scripts/load/","http://www.useragentstring.com/pages/useragentstring.php"],"2013051":["http://www.useragentstring.com/pages/useragentstring.php"],"2013052":["http://www.useragentstring.com/pages/useragentstring.php"],"2013053":["http://www.useragentstring.com/pages/useragentstring.php"],"2013054":["http://www.useragentstring.com/pages/useragentstring.php"],"2013055":["http://www.useragentstring.com/pages/useragentstring.php","http://www.useragentstring.com/Peach1.01_id_12276.php"],"2013056":["http://www.useragentstring.com/pages/useragentstring.php","http://www.useragentstring.com/Peach1.01_id_12276.php"],"2013057":["http://www.useragentstring.com/pages/useragentstring.php"],"2013058":["http://www.useragentstring.com/pages/useragentstring.php"],"2013064":["http://xml.ssdsandbox.net/view/d2afc3be7357f96834ec684ab329d7e2"],"2013070":["http://www.exploit-db.com/moaub-22-adobe-shockwave-director-tsac-chunk-memory-corruption/"],"2013072":["http://www.fortiguard.com/encyclopedia/virus/android_hongtoutou.a!tr.html"],"2013073":["http://www.virustotal.com/file-scan/report.html?id=14c8e9f054d6f7ff4d59b71b65933d73027fe39a2a62729257712170e36f32c5-1308250070"],"2013074":["http://exploit-db.com/exploits/17417/"],"2013076":["http://www.secureworks.com/research/threats/zeus/?threat=zeus","http://lists.emergingthreats.net/pipermail/emerging-sigs/2010-October/009807.html"],"2013078":["http://www.fortiguard.com/encyclopedia/virus/android_yzhcsms.a!tr.html"],"2013079":["http://www.fortiguard.com/encyclopedia/virus/android_yzhcsms.a!tr.html"],"2013080":["http://www.securityfocus.com/bid/46048"],"2013081":["http://www.securityfocus.com/bid/46048"],"2013082":["http://www.securityfocus.com/bid/46048"],"2013083":["http://www.securityfocus.com/bid/46048"],"2013084":["http://www.securityfocus.com/bid/46048"],"2013085":["http://seclists.org/bugtraq/2011/Jun/59"],"2013086":["http://packetstormsecurity.org/files/view/102001/xperience-xss.txt"],"2013087":["http://1337day.com/exploits/16001"],"2013088":["http://1337day.com/exploits/16001"],"2013089":["http://1337day.com/exploits/16001"],"2013090":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3aWin32%2fFynloski.A&ThreatID=-2147327112","http://www.contextis.com/research/blog/darkcometrat/","http://www.eff.org/deeplinks/2012/08/syrian-malware-post","http://www.threatexpert.com/report.aspx?md5=a2f58a4215441276706f18519dae9102"],"2013091":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3aWin32%2fFynloski.A&ThreatID=-2147327112","http://www.contextis.com/research/blog/darkcometrat/"],"2013095":["http://www.securityfocus.com/bid/48087","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-2179"],"2013099":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013100":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013101":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013102":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013103":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013104":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013107":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013108":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013109":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013110":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013111":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013112":["http://packetstormsecurity.org/files/view/101797/apachearchivapoc-xss.txt"],"2013114":["http://www.malware-control.com/statics-pages/5de2e2f56e5277cfe3d44299ab496648.php","http://www.malware-control.com/statics-pages/87290c3019b7dbac0d7d2e15f03572ba.php"],"2013117":["http://www.securityfocus.com/bid/45015","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4172"],"2013118":["http://www.securityfocus.com/bid/45015","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4172"],"2013119":["http://www.securityfocus.com/bid/48393"],"2013120":["http://packetstormsecurity.org/files/view/102579/factorylink_csservice.rb.txt"],"2013125":["http://exploit-db.com/exploits/17209"],"2013126":["http://exploit-db.com/exploits/17209"],"2013127":["http://exploit-db.com/exploits/17209"],"2013128":["http://exploit-db.com/exploits/17209"],"2013129":["http://exploit-db.com/exploits/17209"],"2013133":["http://packetstormsecurity.org/files/view/102238/vbtube129-xss.txt"],"2013134":["http://packetstormsecurity.org/files/view/102238/vbtube129-xss.txt"],"2013138":["http://www.met.police.uk/mobilephone/imei.htm"],"2013139":["http://www.learntelecom.com/telephony/gsm/international-mobile-subscriber-identity-imsi"],"2013144":["http://www.securityfocus.com/bid/41853","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2753"],"2013149":["http://www.threatexpert.com/report.aspx?md5=8d1b47452307259f1e191e16ed23cd35"],"2013150":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-2466"],"2013152":["http://www.coresecurity.com/content/adobe-reader-buffer-overflow","http://www.securityfocus.com/bid/30035","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-2992"],"2013153":["http://www.fortiguard.com/analysis/pdfanalysis.html","http://www.securityfocus.com/bid/36600","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3459"],"2013155":["http://htbridge.ch/advisory/sql_injection_in_grand_flash_album_gallery_wordpress_plugin.html"],"2013156":["http://htbridge.ch/advisory/sql_injection_in_grand_flash_album_gallery_wordpress_plugin.html"],"2013157":["http://htbridge.ch/advisory/sql_injection_in_grand_flash_album_gallery_wordpress_plugin.html"],"2013158":["http://htbridge.ch/advisory/sql_injection_in_grand_flash_album_gallery_wordpress_plugin.html"],"2013159":["http://htbridge.ch/advisory/sql_injection_in_grand_flash_album_gallery_wordpress_plugin.html"],"2013160":["http://www.securityfocus.com/bid/48483"],"2013161":["http://secunia.com/advisories/45044"],"2013162":["http://secunia.com/advisories/45044"],"2013163":["http://www.securityfocus.com/bid/48408"],"2013164":["http://exploit-db.com/exploits/17444"],"2013168":["http://www.threatexpert.com/report.aspx?md5=be3aed34928cb826030b462279a1c453"],"2013171":["http://packetstormsecurity.org/files/31653/DominoHunter-0.92.zip.html"],"2013173":["http://www.useragentstring.com/pages/useragentstring.php"],"2013174":["http://www.useragentstring.com/pages/useragentstring.php"],"2013176":["http://www.kahusecurity.com/2011/new-exploit-kit-egypack/","http://www.vbulletin.com/forum/forum/vbulletin-3-8/vbulletin-3-8-questions-problems-and-troubleshooting/346989-vbulletin-footer-sql-injection-hack","http://blog.webroot.com/2013/03/29/a-peek-inside-the-egypack-web-malware-exploitation-kit/"],"2013181":["http://www9.dyndns-server.com%3a8080/pub/botnet-links.html"],"2013184":["http://www.securelist.com/en/analysis/204792172/The_Advertising_Botnet"],"2013185":["http://www.sunbeltsecurity.com/partnerresources/cwsandbox/md5.aspx?id=1bcc87209703cf73c80f9772935e47b0","http://www.threatexpert.com/report.aspx?md5=c8b3d2bc407b0260b40b7f97e504faa5"],"2013186":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=TROJANDOWNLOADER%3aWIN32/RENOS.MJ","http://www.securelist.com/en/analysis/204792172/The_Advertising_Botnet","http://www.threatexpert.com/report.aspx?md5=01ca25570659c2e1b8b887a3229ef421"],"2013193":["http://www.fortiguard.com/encyclopedia/virus/android_crusewin.a!tr.html"],"2013194":["http://www.fortiguard.com/encyclopedia/virus/android_crusewin.a!tr.html"],"2013195":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Adware%3AWin32%2FEzula.F"],"2013202":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AWin32%2FFosniw.B"],"2013203":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AWin32%2FFosniw.B"],"2013209":["http://us.norton.com/security_response/writeup.jsp?docid=2011-033008-4831-99&tabid=2","http://blog.avast.com/2011/03/21/android-is-calling-walk-and-text-and-be-malicious/"],"2013210":["http://us.norton.com/security_response/writeup.jsp?docid=2011-031005-2918-99&tabid=2"],"2013211":["http://us.norton.com/security_response/writeup.jsp?docid=2011-052510-1535-99&tabid=2"],"2013212":["http://us.norton.com/security_response/writeup.jsp?docid=2011-070516-5325-99&tabid=2","http://www.secureworks.com/research/threats/sindigoo/"],"2013214":["http://www.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a-Cyber-Espionage-Network","http://www.symantec.com/connect/blogs/inside-back-door-attack"],"2013220":["http://www.mywot.com/en/scorecard/8866.org"],"2013226":["http://www.securityfocus.com/bid/48341"],"2013227":["http://www.securityfocus.com/bid/48341"],"2013228":["http://www.securityfocus.com/bid/48341"],"2013229":["http://www.securityfocus.com/bid/48341"],"2013230":["http://www.securityfocus.com/bid/48341"],"2013231":["http://www.securityfocus.com/bid/48341"],"2013232":["http://htbridge.ch/advisory/idrive_online_backup_activex_control_insecure_method.html"],"2013233":["http://www.securityfocus.com/bid/48585"],"2013234":["http://packetstormsecurity.org/files/view/102537/activdesk-sqlxss.txt"],"2013235":["http://www.securityfocus.com/bid/45957"],"2013238":["http://www.fortiguard.com/encyclopedia/virus/android_golddream.a!tr.spy.html"],"2013240":["http://www.fortiguard.com/encyclopedia/virus/android_golddream.a!tr.spy.html"],"2013241":["http://www.fortiguard.com/encyclopedia/virus/android_golddream.a!tr.spy.html"],"2013245":["http://www.threatexpert.com/report.aspx?md5=2d69d8d243499ab53b840c64f68cc830","http://sebdraven.tumblr.com/post/6769853139/palevo-analysises"],"2013246":["http://ore.carnivore.it/malware/hash/d4dc8459a34ea14d856e529d3a9e0362","http://sebdraven.tumblr.com/post/6769853139/palevo-analysises"],"2013247":["http://ore.carnivore.it/malware/hash/d4dc8459a34ea14d856e529d3a9e0362","http://sebdraven.tumblr.com/post/6769853139/palevo-analysises"],"2013249":["http://www.subgraph.com/products.html","http://www.darknet.org.uk/2011/07/vega-open-source-cross-platform-web-application-security-assessment-platform/"],"2013250":["http://labs.m86security.com/2011/07/resurrection-of-cve-2010-3333-in-the-wild/","http://www.securityfocus.com/bid/44652","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3333"],"2013251":["http://labs.m86security.com/2011/06/0-day-exploit-used-in-a-targeted-attack-cve-2011-1255/","http://www.securityfocus.com/bid/48206","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1255"],"2013252":["http://labs.m86security.com/2011/06/0-day-exploit-used-in-a-targeted-attack-cve-2011-1255/","http://www.securityfocus.com/bid/48206","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1255"],"2013258":["http://asert.arbornetworks.com/2010/09/another-family-of-ddos-bots-avzhan/","http://blog.fireeye.com/research/2010/10/avzhan-botnet-the-story-of-evolution.html"],"2013263":["http://www.nessus.org/plugins/index.php?view=single&id=10079","http://osvdb.org/show/osvdb/69"],"2013264":["http://www.nessus.org/plugins/index.php?view=single&id=19782","http://osvdb.org/show/osvdb/76"],"2013267":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013268":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013269":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013270":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013271":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013274":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013275":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013276":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013277":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013278":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013279":["http://www.darkreading.com/security/vulnerabilities/221901428/index.html"],"2013280":["http://labs.m86security.com/2011/07/resurrection-of-cve-2010-3333-in-the-wild/","http://www.securityfocus.com/bid/44652","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3333"],"2013281":["http://www.exploit-db.com/adobe-acrobat-newclass-invalid-pointer-vulnerability/","http://www.securityfocus.com/bid/40586","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1297"],"2013282":["http://www.securityfocus.com/bid/44504","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3654"],"2013283":["http://www.darkcomet-rat.com","http://anubis.iseclab.org/?action=result&task_id=1a7326f61fef1ecb4ed4fbf3de3f3b8cb&format=txt"],"2013284":["http://www.darkcomet-rat.com","http://anubis.iseclab.org/?action=result&task_id=1a7326f61fef1ecb4ed4fbf3de3f3b8cb&format=txt"],"2013285":["http://www.darkcomet-rat.com"],"2013287":["http://www.threatexpert.com/report.aspx?md5=85d82c840f4b90fcb6d5311f501374ca"],"2013290":["http://www.innerfence.com/howto/find-iphone-unique-device-identifier-udid","http://support.apple.com/kb/HT4061"],"2013293":["http://blog.eset.com/2011/03/02/tdl4-and-glubteba-piggyback-piggybugs"],"2013299":["http://www.fortiguard.com/encyclopedia/virus/android_hipposms.a!tr.html"],"2013303":["http://packetstormsecurity.org/files/view/101249/nukeevolution-sql.txt"],"2013304":["http://packetstormsecurity.org/files/view/101249/nukeevolution-sql.txt"],"2013305":["http://packetstormsecurity.org/files/view/101249/nukeevolution-sql.txt"],"2013306":["http://packetstormsecurity.org/files/view/101249/nukeevolution-sql.txt"],"2013307":["http://packetstormsecurity.org/files/view/101249/nukeevolution-sql.txt"],"2013308":["http://secunia.com/advisories/43652"],"2013309":["http://secunia.com/advisories/43652"],"2013310":["http://secunia.com/advisories/43652"],"2013312":["http://www9.dyndns-server.com%3a8080/pub/botnet/r-cgi_malware_analyse.txt"],"2013316":["http://www.fortiguard.com/encyclopedia/virus/android_adsms.a!tr.html"],"2013317":["http://www.fortiguard.com/encyclopedia/virus/android_adsms.a!tr.html"],"2013322":["http://tools.cisco.com/security/center/viewAlert.x?alertId=23601","http://www.microsoft.com/technet/security/bulletin/MS11-055.mspx","http://www.securityfocus.com/bid/42681","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3148"],"2013327":["http://blog.fortinet.com/zitmo-hits-android/"],"2013332":["http://www.symantec.com/business/security_response/attacksignatures/detail.jsp?asid=23514"],"2013333":["http://www.zugo.com/faq/","http://plus.google.com/109412257237874861202/posts/FXL1y8qG7YF"],"2013336":["http://support.apple.com/kb/HT1222","http://support.apple.com/kb/HT4825","http://en.wikipedia.org/wiki/IOS_version_history"],"2013337":["http://www.threatexpert.com/report.aspx?md5=fc414168a5b4ca074ea6e03f770659ef"],"2013339":["http://www.threatexpert.com/report.aspx?md5=0a998a070beb287524f9be6dd650c959"],"2013342":["http://www.sunbeltsecurity.com/partnerresources/cwsandbox/md5.aspx?id=04dc87d4dcf12f9c05a22ab9890a6323","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3AWin32%2FSisproc&ThreatID=-2147342628"],"2013361":["http://www.secureworks.com/research/threats/htran/","http://www.symantec.com/connect/blogs/truth-behind-shady-rat","http://www.symantec.com/security_response/writeup.jsp?docid=2010-120716-4344-99&tabid=2","http://www.securelist.com/en/descriptions/10120120/Trojan-Spy.Win32.Agent.bptu"],"2013367":["http://threatexpert.com/report.aspx?md5=06b783d348a4f9d72bf743c8262778ef"],"2013368":["http://threatexpert.com/report.aspx?md5=06b783d348a4f9d72bf743c8262778ef"],"2013369":["http://threatexpert.com/report.aspx?md5=06b783d348a4f9d72bf743c8262778ef"],"2013379":["http://www.symantec.com/connect/blogs/truth-behind-shady-rat"],"2013381":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/sality_peer_to_peer_viral_network.pdf"],"2013382":["http://www.malware-control.com/statics-pages/24b9c5f59a4706689d4f9bb5f510ec35.php"],"2013386":["http://threatexpert.com/reports.aspx?find=03abdc31d0f864c7b69b09d6481d3ff7"],"2013398":["http://hypersecurity.blogspot.com/2011/08/uncovering-win32momibot-communication.html"],"2013399":["http://hypersecurity.blogspot.com/2011/08/uncovering-win32momibot-communication.html"],"2013408":["http://support.apple.com/kb/HT1222","http://support.apple.com/kb/HT4825","http://en.wikipedia.org/wiki/IOS_version_history","http://github.com/jan0/isslfix","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0228"],"2013414":["http://blog.trendmicro.com/cybercriminals-using-amazon-web-services-aws-to-host-malware/","http://www.securelist.com/en/blog/208188099/Financial_data_stealing_Malware_now_on_Amazon_Web_Services_Cloud"],"2013417":["http://www.mozilla.org/security/announce/2011/mfsa2011-13.html","http://www.securityfocus.com/bid/47635","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0065"],"2013422":["http://www.mywot.com/en/scorecard/go2000.cn"],"2013425":["http://secunia.com/advisories/45553"],"2013426":["http://secunia.com/advisories/45553"],"2013427":["http://secunia.com/advisories/45553"],"2013428":["http://packetstormsecurity.org/files/view/103964/teechart_pro.rb.txt"],"2013429":["http://packetstormsecurity.org/files/view/103964/teechart_pro.rb.txt"],"2013430":["http://packetstormsecurity.org/files/view/103964/teechart_pro.rb.txt"],"2013431":["http://packetstormsecurity.org/files/view/103964/teechart_pro.rb.txt"],"2013432":["http://packetstormsecurity.org/files/view/103964/teechart_pro.rb.txt"],"2013433":["http://xforce.iss.net/xforce/xfdb/57654"],"2013434":["http://packetstormsecurity.org/files/view/103179/tikiwiki7-xss.txt"],"2013439":["http://www.threatexpert.com/report.aspx?md5=10e7af7057833a19097cb22ba0bd1b99","http://asert.arbornetworks.com/2011/08/dirt-jumper-caught/","http://www.deependresearch.org/2011/10/dirt-jumper-ddos-bot-new-versions-new.html"],"2013450":["http://www.threatexpert.com/report.aspx?md5=c936b15a8f7a3732bc16ee36693831ec"],"2013451":["http://stopmalvertising.com/rootkits/analysis-of-ngrbot.html"],"2013452":["http://pcthreat.com/parasitebyid-8835en.html"],"2013453":["http://www.extremetech.com/computing/93504-download-com-wraps-downloads-in-bloatware-lies-about-motivations"],"2013454":["http://www.cnet.com/techtracker-free/"],"2013455":["http://threatexpert.com/report.aspx?md5=7a8807f4de0999dba66a8749b2366def"],"2013457":["http://isc.sans.edu/diary.html?storyid=11059"],"2013464":["http://packetstormsecurity.org/files/view/99004/RhinOS3.0r1113-lfi.txt"],"2013465":["http://packetstormsecurity.org/files/view/104292/easysiteedit-rfi.txt"],"2013466":["http://packetstormsecurity.org/files/view/93285/diycms-rfi.txt"],"2013467":["http://packetstormsecurity.org/files/view/103680/joomlacommunity-sql.txt"],"2013468":["http://exploit-db.com/exploits/12644"],"2013469":["http://exploit-db.com/exploits/12644"],"2013470":["http://exploit-db.com/exploits/12644"],"2013471":["http://exploit-db.com/exploits/12644"],"2013472":["http://seclists.org/fulldisclosure/2011/Aug/175"],"2013473":["http://seclists.org/fulldisclosure/2011/Aug/175"],"2013479":["http://threatpost.com/en_us/blogs/new-worm-morto-using-rdp-infect-windows-pcs-082811"],"2013480":["http://www.f-secure.com/weblog/archives/00002227.html"],"2013481":["http://www.f-secure.com/weblog/archives/00002227.html"],"2013482":["http://www.f-secure.com/weblog/archives/00002227.html"],"2013483":["http://www.f-secure.com/weblog/archives/00002227.html"],"2013488":["http://www.secureworks.com/research/threats/zeus/?threat=zeus","http://lists.emergingthreats.net/pipermail/emerging-sigs/2010-October/009807.html"],"2013492":["http://www.mcafee.com/us/products/vulnerability-manager.aspx"],"2013493":["http://contagiodump.blogspot.com/2011/08/aug-28-morto-tsclient-rdp-worm-with.html"],"2013494":["http://contagiodump.blogspot.com/2011/08/aug-28-morto-tsclient-rdp-worm-with.html"],"2013495":["http://contagiodump.blogspot.com/2011/08/aug-28-morto-tsclient-rdp-worm-with.html"],"2013496":["http://contagiodump.blogspot.com/2011/08/aug-28-morto-tsclient-rdp-worm-with.html"],"2013498":["http://netflix.com"],"2013499":["http://www.incredimail.com"],"2013503":["http://www.apple.com/softwareupdate/"],"2013504":["http://help.ubuntu.com/community/AptGet/Howto"],"2013505":["http://www.phy.duke.edu/~rgb/General/yum_HOWTO/yum_HOWTO/"],"2013506":["http://blog.eset.com/2011/08/03/win32delf-qcztrust-me-i%E2%80%99m-your-anti-virus","http://www.eset.com/about/blog/blog/article/win32delf-qcz-additional-details"],"2013507":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3AWin32%2FDynamer!dtc"],"2013516":["http://anubis.iseclab.org/?action=result&task_id=1623d5fd288be7024e56c5bd38359c33c","http://mwanalysis.org/?page=report&analysisid=430235&password=wwgcvyheon","http://www.threatexpert.com/report.aspx?md5=2519bdb5459bc9f59f59cd7ccb147d23"],"2013533":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3aWin32%2fFynloski.A&ThreatID=-2147327112","http://home.mcafee.com/virusinfo/virusprofile.aspx?key=570863"],"2013534":["http://microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=VirTool%3aWin32/VBInject.gen!DM"],"2013536":["http://about-threats.trendmicro.com/malware.aspx?language=us&name=BKDR_BTMINE.MNR"],"2013537":["http://about-threats.trendmicro.com/malware.aspx?language=us&name=BKDR_BTMINE.MNR"],"2013538":["http://about-threats.trendmicro.com/malware.aspx?language=us&name=BKDR_BTMINE.MNR"],"2013539":["http://about-threats.trendmicro.com/malware.aspx?language=us&name=BKDR_BTMINE.MNR"],"2013542":["http://threatexpert.com/report.aspx?md5=1431f4ab4bbe3ad1087eb14cf4d7dff9"],"2013556":["http://www.threatexpert.com/report.aspx?md5=81a119f7f47663c03053e76146f54fe9"],"2013653":["http://www.symantec.com/connect/blogs/truth-behind-shady-rat"],"2013654":["http://www.symantec.com/connect/blogs/truth-behind-shady-rat"],"2013655":["http://www.symantec.com/connect/blogs/truth-behind-shady-rat"],"2013656":["http://www.symantec.com/connect/blogs/truth-behind-shady-rat"],"2013657":["http://www.symantec.com/connect/blogs/truth-behind-shady-rat"],"2013668":["http://www.threatexpert.com/report.aspx?md5=c55fe941b80b3e5e77be8728642d138e"],"2013669":["http://www.threatexpert.com/report.aspx?md5=c55fe941b80b3e5e77be8728642d138e"],"2013670":["http://www.threatexpert.com/report.aspx?md5=c55fe941b80b3e5e77be8728642d138e"],"2013671":["http://www.threatexpert.com/report.aspx?md5=c55fe941b80b3e5e77be8728642d138e"],"2013672":["http://www.threatexpert.com/report.aspx?md5=c55fe941b80b3e5e77be8728642d138e"],"2013673":["http://www.securityfocus.com/bid/49553"],"2013674":["http://www.securityfocus.com/bid/49553"],"2013675":["http://www.securityfocus.com/bid/49553"],"2013676":["http://www.securityfocus.com/bid/49553"],"2013677":["http://www.securityfocus.com/bid/49553"],"2013678":["http://packetstormsecurity.org/files/view/102784/joomlajrqn-traversal.txt"],"2013679":["http://exploit-db.com/exploits/17495"],"2013680":["http://packetstormsecurity.org/files/view/104017/joomlarealestate-sql.txt"],"2013681":["http://packetstormsecurity.org/files/view/103855/aba-xss.txt"],"2013682":["http://packetstormsecurity.org/files/view/99797/simpliscms-disclose.txt"],"2013683":["http://www.threatexpert.com/report.aspx?md5=19441bc629e6c1dcb54cb5febdf9a22d"],"2013685":["http://resources.infosecinstitute.com/step-by-step-tutorial-on-reverse-engineering-malware-the-zeroaccessmaxsmiscer-crimeware-rootkit/","http://www.symantec.com/security_response/writeup.jsp?docid=2011-071314-0410-99&tabid=2","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDropper%3aWin32%2fSirefef.B"],"2013687":["http://anubis.iseclab.org/index.php?action=result&task_id=86c6da9437e65c94990ddd85d87299f1","http://www.threatexpert.com/report.aspx?md5=4fda5e7e8e682870e993f97ad26ba6b2"],"2013688":["http://anubis.iseclab.org/index.php?action=result&task_id=86c6da9437e65c94990ddd85d87299f1","http://www.threatexpert.com/report.aspx?md5=4fda5e7e8e682870e993f97ad26ba6b2"],"2013694":["http://www.fortiguard.com/latest/mobile/2959807"],"2013702":["http://support.clean-mx.de/clean-mx/view_joebox.php?md5=b0b7c391d084974b2666c1c57b349b62&id=711369","http://www.virustotal.com/file-scan/report.html?id=54dcad20b326a409c09f1b059925ba4ba260ef58297cda1421ffca79942a96a5-1305296734"],"2013704":["http://packetstormsecurity.org/files/view/104706/mambonmyndir-sql.txt"],"2013705":["http://packetstormsecurity.org/files/view/104706/mambonmyndir-sql.txt"],"2013706":["http://packetstormsecurity.org/files/view/104706/mambonmyndir-sql.txt"],"2013707":["http://packetstormsecurity.org/files/view/104706/mambonmyndir-sql.txt"],"2013708":["http://packetstormsecurity.org/files/view/104706/mambonmyndir-sql.txt"],"2013709":["http://packetstormsecurity.org/files/view/105224/wpannonces-rfi.txt"],"2013710":["http://forums.comodo.com/av-false-positivenegative-detection-reporting/trojwarewin32trojanagentgen-t55152.0.html"],"2013711":["http://packetstormsecurity.org/files/view/104631/tinywebgallery-lfishellsql.txt"],"2013712":["http://packetstormsecurity.org/files/view/104631/tinywebgallery-lfishellsql.txt"],"2013713":["http://packetstormsecurity.org/files/view/100853/joostinausers-sql.txt"],"2013730":["http://exploit-db.com/exploits/17896"],"2013731":["http://exploit-db.com/exploits/17896"],"2013732":["http://exploit-db.com/exploits/17896"],"2013733":["http://exploit-db.com/exploits/17896"],"2013734":["http://exploit-db.com/exploits/17896"],"2013735":["http://www.securityfocus.com/bid/49747"],"2013736":["http://www.securityfocus.com/bid/49747"],"2013738":["http://packetstormsecurity.org/files/view/96804/joomlarokquickcart-lfi.txt"],"2013741":["http://www.threatexpert.com/report.aspx?md5=7d2eb4b364e15e90cec1ddd7dcb97f64","http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/","http://threatexpert.com/report.aspx?md5=b3106dbfb3ab114755af311883f33697%20"],"2013747":["http://www.asert.arbornetworks.com/2011/10/ddos-aldi-bot","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3aWin32%2fAbot.gen!A"],"2013748":["http://www.asert.arbornetworks.com/2011/10/ddos-aldi-bot/","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3aWin32%2fAbot.gen!A"],"2013749":["http://www.vmware.com"],"2013751":["http://ccc.de/en/updates/2011/staatstrojaner"],"2013752":["http://ccc.de/en/updates/2011/staatstrojaner"],"2013757":["http://packetstormsecurity.org/files/105196"],"2013758":["http://packetstormsecurity.org/files/view/105237/wpzingiri-rfi.txt"],"2013759":["http://packetstormsecurity.org/files/view/104695/mamboahsshopf-sql.txt"],"2013760":["http://packetstormsecurity.org/files/view/104695/mamboahsshopf-sql.txt"],"2013761":["http://packetstormsecurity.org/files/view/104695/mamboahsshopf-sql.txt"],"2013762":["http://packetstormsecurity.org/files/view/104695/mamboahsshopf-sql.txt"],"2013763":["http://packetstormsecurity.org/files/view/104695/mamboahsshopf-sql.txt"],"2013764":["http://packetstormsecurity.org/files/view/96608/joomlaredirect-lfi.txt"],"2013765":["http://packetstormsecurity.org/files/105196"],"2013771":["http://www.threatexpert.com/report.aspx?md5=76e084e9420bfaa31c0f0bf000f1c301"],"2013772":["http://www.threatexpert.com/report.aspx?md5=76e084e9420bfaa31c0f0bf000f1c301"],"2013773":["http://www.threatexpert.com/report.aspx?md5=76e084e9420bfaa31c0f0bf000f1c301"],"2013774":["http://www.threatexpert.com/report.aspx?md5=76e084e9420bfaa31c0f0bf000f1c301"],"2013778":["http://nmap.org/nsedoc/scripts/sql-injection.html"],"2013779":["http://www.securitylab.ru/forum/forum16/topic26800/"],"2013791":["http://www.contextis.com/research/blog/reverseproxybypass/","http://mail-archives.apache.org/mod_mbox/httpd-announce/201110.mbox/%3C20111005141541.GA7696@redhat.com%3E"],"2013792":["http://www.contextis.com/research/blog/reverseproxybypass/","http://mail-archives.apache.org/mod_mbox/httpd-announce/201110.mbox/%3C20111005141541.GA7696@redhat.com%3E"],"2013797":["http://www.threatexpert.com/report.aspx?md5=2700d3fcdd4b8a7c22788db1658d9163","http://www.threatcenter.crdf.fr/?More&ID=46606&D=CRDF.Malware.Win32.PEx.Delphi.307674628"],"2013798":["http://www.threatexpert.com/report.aspx?md5=b58485c9a221e8bd5b4725e7e19988b0","http://www.threatcenter.crdf.fr/?More&ID=49992&D=CRDF.Malware.Win32.PEx.Delphi.1151005043"],"2013800":["http://xinn.org/Chromoting.html"],"2013801":["http://xinn.org/Chromoting.html"],"2013802":["http://www.threatexpert.com/report.aspx?md5=1f04bd1b4eceb42e6d5859b6330fc7d7","http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Cycbot-O/detailed-analysis.aspx"],"2013808":["http://blog.eset.com/2012/03/17/drive-by-ftp-a-new-view-of-cve-2011-3544"],"2013809":["http://exploit-db.com/exploits/18016"],"2013810":["http://exploit-db.com/exploits/18016"],"2013811":["http://packetstormsecurity.org/files/106064/9sg_autovueii.tgz"],"2013812":["http://packetstormsecurity.org/files/106064/9sg_autovueii.tgz"],"2013813":["http://packetstormsecurity.org/files/106065/9sg_autovueiii.tgz"],"2013814":["http://packetstormsecurity.org/files/106065/9sg_autovueiii.tgz"],"2013815":["http://packetstormsecurity.org/files/106073/sportsphool-rfi.txt"],"2013816":["http://packetstormsecurity.org/files/106222/joomlayjcontact-lfi.txt"],"2013817":["http://secunia.com/advisories/46069","http://spareclockcycles.org/2011/09/18/exploitring-the-wordpress-extension-repos"],"2013818":["http://dl.packetstormsecurity.net/1110-exploits/whmcompletesolution-disclose.txt"],"2013819":["http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html"],"2013867":["http://www.bomgar.com"],"2013870":["http://exploit-db.com/exploits/17736"],"2013871":["http://www.securityfocus.com/bid/50468"],"2013872":["http://exploit-db.com/exploits/7626"],"2013873":["http://1337day.com/exploits/17138"],"2013874":["http://1337day.com/exploits/17138"],"2013875":["http://1337day.com/exploits/17138"],"2013876":["http://1337day.com/exploits/17138"],"2013877":["http://1337day.com/exploits/17138"],"2013878":["http://aluigi.altervista.org/adv/promotic_1-adv.txt"],"2013879":["http://aluigi.altervista.org/adv/promotic_1-adv.txt"],"2013880":["http://threatexpert.com/reports.aspx?find=mrb.mail.ru"],"2013882":["http://threatexpert.com/reports.aspx?find=stats.norton.com"],"2013883":["http://threatexpert.com/reports.aspx?find=upsh.playmusic.co.kr"],"2013884":["http://threatexpert.com/reports.aspx?find=clients.mydealassistant.com"],"2013885":["http://exploit-db.com/exploits/18000"],"2013886":["http://exploit-db.com/exploits/17865"],"2013891":["http://www.threatexpert.com/report.aspx?md5=c929e8c75901c7e50685df0445a38bd0"],"2013894":["http://www.securelist.com/en/blog/208193214/Massive_DNS_poisoning_attacks_in_Brazil","http://www.zdnet.com/blog/security/massive-dns-poisoning-attack-in-brazil-serving-exploits-and-malware/9780"],"2013910":["http://en.wikifur.com/wiki/Second_Life","http://wiki.secondlife.com/wiki/Furry"],"2013911":["http://www.abuse.ch/?p=3499","http://www.kindsight.net/sites/default/files/Kindsight_Malware_Analysis-ZeroAcess-Botnet-final.pdf"],"2013913":["http://www.threatexpert.com/report.aspx?md5=6fd8cdee653c0fde769e6c48d65e28bd"],"2013914":["http://www.backtrack-linux.org"],"2013917":["http://www.threatexpert.com/report.aspx?md5=47f2b8fcc2873f4dfd573b0e8a77aaa9","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AWin32%2FDofoil.L&ThreatID=-2147317615"],"2013922":["http://www.mcafee.com/threat-intelligence/malware/default.aspx?id=541210"],"2013934":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=PWS%3aWin32%2fFareit.A","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=PWS%3aWin32%2fFareit","http://www.threatexpert.com/report.aspx?md5=99fab94fd824737393f5184685e8edf2","http://www.threatexpert.com/report.aspx?md5=9544c681ae5c4fe3fdbd4d5c6c90e38e","http://www.threatexpert.com/report.aspx?md5=d50c39753ba88daa00bc40848f174168","http://www.threatexpert.com/report.aspx?md5=bf422f3aa215d896f55bbe2ebcd25d17"],"2013937":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2013938":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2013939":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2013940":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2013941":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2013942":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2013943":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2013944":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2013945":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2013946":["http://www.virustotal.com/file-scan/report.html?id=458ec5d5b3c1c02b6c64b360f82bcbf529f580c2d646b2ae161fc7dd2ea9927d-1321069787"],"2013965":["http://www.fortiguard.com/latest/mobile/3302891"],"2013966":["http://www.fortiguard.com/latest/mobile/3302951"],"2013967":["http://blog.trendmicro.com/connections-between-droiddreamlight-and-droidkungfu/"],"2013968":["http://blog.trendmicro.com/connections-between-droiddreamlight-and-droidkungfu/"],"2013980":["http://packetstorm.codar.com.br/1111-exploits/tinderbox-xss.txt"],"2013981":["http://autosectools.com/Advisory/Orbis-1.0.2-Reflected-Cross-site-Scripting-4"],"2013982":["http://exploit-db.com/exploits/18070/"],"2013983":["http://threatexpert.com/report.aspx?md5=b5708efc8b478274df4b03d8b7dbbb26"],"2013984":["http://1337day.com/exploits/17081"],"2013985":["http://1337day.com/exploits/17081"],"2013986":["http://1337day.com/exploits/17081"],"2013987":["http://1337day.com/exploits/17081"],"2013988":["http://1337day.com/exploits/17081"],"2013989":["http://packetstormsecurity.org/files/95683/joomlaimg-lfi.txt"],"2013995":["http://www.adobe.com/support/security/advisories/apsa11-04.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-4989","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-4987"],"2014004":["http://www.threatexpert.com/report.aspx?md5=0f90568d86557d62f7d4e1c0f7167431"],"2014006":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2462","http://blog.9bplus.com/analyzing-cve-2011-2462","http://contagiodump.blogspot.com/2011/12/adobe-zero-day-cve-2011-2462.html"],"2014007":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2462","http://blog.9bplus.com/analyzing-cve-2011-2462","http://contagiodump.blogspot.com/2011/12/adobe-zero-day-cve-2011-2462.html"],"2014008":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2462","http://contagiodump.blogspot.com/2011/12/adobe-zero-day-cve-2011-2462.html","http://blog.9bplus.com/analyzing-cve-2011-2462"],"2014012":["http://sophosnews.files.wordpress.com/2013/07/sophosszappanosplugxrevisitedintroducingsmoaler-rev1.pdf","http://symantec.com/security_response/writeup.jsp?docid=2011-100515-1838-99&tabid=2"],"2014017":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0738"],"2014018":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0738"],"2014030":["http://www.rebategiant.com"],"2014056":["http://www.threatexpert.com/report.aspx?md5=d8edad03f5524369e60c69a7483f8365"],"2014057":["http://www.threatexpert.com/report.aspx?md5=d8edad03f5524369e60c69a7483f8365"],"2014059":["http://securelist.com/en/descriptions/17601150/Trojan-Dropper.Win32.Agent.elbb?print_mode=1","http://www.threatexpert.com/report.aspx?md5=c2b4f8abc742bf048f3856525c1b2800","http://www.threatexpert.com/report.aspx?md5=4937dc6e111996dbe331327e7e9a4a12","http://www.amada.abuse.ch/?search=download.lava.cn"],"2014060":["http://virustotal.com/file-scan/report.html?id=1439d4061659a8534435352274b72dc2fe03c3deeb84e32fc90d40380c35cab1-1322189076"],"2014061":["http://www.securityfocus.com/bid/51116"],"2014062":["http://www.securityfocus.com/bid/51116"],"2014063":["http://www.securityfocus.com/bid/51116"],"2014064":["http://www.securityfocus.com/bid/51116"],"2014065":["http://www.securityfocus.com/bid/51116"],"2014067":["http://packetstormsecurity.org/files/107995"],"2014068":["http://exploit-db.com/exploits/18262"],"2014070":["http://symantec.com/security_response/writeup.jsp?docid=2006-061110-0512-99"],"2014071":["http://threatexpert.com/report.aspx?md5=90410d783f6321c8684ccb9ff0613a51"],"2014072":["http://packetstorm.foofus.com/1112-exploits/petlisting-xss.txt"],"2014073":["http://dl.packetstormsecurity.net/1112-exploits/wpthewelcomizer-xss.txt"],"2014074":["http://exploit-db.com/exploits/18056/"],"2014075":["http://exploit-db.com/exploits/18056/"],"2014076":["http://exploit-db.com/exploits/18056/"],"2014077":["http://exploit-db.com/exploits/18056/"],"2014078":["http://exploit-db.com/exploits/18056/"],"2014080":["http://dl.packetstormsecurity.net/1111-exploits/zorder-sql.txt"],"2014081":["http://dl.packetstormsecurity.net/1111-exploits/zorder-sql.txt"],"2014082":["http://dl.packetstormsecurity.net/1112-exploits/sourcebans-lfisql.txt"],"2014083":["http://securelist.com/en/descriptions/24405309/Trojan.Win32.FakeAV.dlbc","http://www.threatexpert.com/report.aspx?md5=ac0ba9e186aee9cf9889d71158485715"],"2014085":["http://threatexpert.com/report.aspx?md5=971e560b80e335ab88ef518b416d415a"],"2014086":["http://exploit-db.com/exploits/17114"],"2014087":["http://dl.packetstormsecurity.net/1111-exploits/zorder-sql.txt"],"2014088":["http://dl.packetstormsecurity.net/1111-exploits/zorder-sql.txt"],"2014095":["http://www.amazon.com/gp/product/B0051VVOB2%23silk"],"2014096":["http://www.kahusecurity.com/2011/elaborate-black-hole-infection/"],"2014100":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-3416"],"2014103":["http://community.qualys.com/blogs/securitylabs/2012/01/05/slow-read"],"2014111":["http://www.threatexpert.com/report.aspx?md5=a251ef38f048d695eae52626e57d617d"],"2014112":["http://blog.eset.com/2012/03/17/drive-by-ftp-a-new-view-of-cve-2011-3544"],"2014113":["http://microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Trojan%3aWin32/Dynamer!dtc","http://www.threatexpert.com/report.aspx?md5=989ba48e0a9e39b4b6fc5c6bf400c41b"],"2014116":["http://www.threatexpert.com/report.aspx?md5=3d18363a20882bd74ae7e0f68d3ed8ef"],"2014118":["http://blog.webroot.com/2012/01/09/a-peek-inside-the-cythosia-v2-ddos-bot/"],"2014119":["http://www.threatexpert.com/report.aspx?md5=2f4d35e797249e837159ff60b827c601"],"2014121":["http://www.threatexpert.com/report.aspx?md5=bd4af162f583899eeb6ce574863b4db6"],"2014127":["http://www.splashtop.com"],"2014128":["http://www.splashtop.com"],"2014129":["http://www.splashtop.com"],"2014130":["http://www.splashtop.com"],"2014132":["http://www.securityfocus.com/bid/51396","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-4786"],"2014133":["http://www.threatexpert.com/report.aspx?md5=0e47c711d9edee337575b6dbef850514"],"2014137":["http://www.dateiliste.com/d3files/tools/mphider/isxdl.htm"],"2014139":["http://www.threatexpert.com/report.aspx?md5=89332c92d0360095e2dda8385d400258"],"2014140":["http://isc.sans.org/diary/Javascript+DDoS+Tool+Analysis/12442","http://www.wired.com/threatlevel/2012/01/anons-rickroll-botnet"],"2014141":["http://isc.sans.org/diary/Javascript+DDoS+Tool+Analysis/12442","http://www.wired.com/threatlevel/2012/01/anons-rickroll-botnet"],"2014145":["http://www.threatexpert.com/report.aspx?md5=d2311b7208d563ac59c9114f5d422441"],"2014147":["http://xylibox.blogspot.com/2012/01/sakura-exploit-pack-10.html"],"2014153":["http://blog.spiderlabs.com/2012/01/hoic-ddos-analysis-and-detection.html"],"2014154":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-2962"],"2014156":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0003"],"2014161":["http://about-threats.trendmicro.com/Malware.aspx?language=uk&name=ANDROIDOS_FAKETIMER.A","http://anubis.iseclab.org/?action=result&task_id=1ba82b938005acea4ddefc8eff1f4db06","http://www.threatexpert.com/report.aspx?md5=cf9ba4996531d40402efe268c7efda91","http://www.threatexpert.com/report.aspx?md5=537f190d3d469ad1f178024940affcb5"],"2014162":["http://about-threats.trendmicro.com/Malware.aspx?language=uk&name=ANDROIDOS_SNDAPPS.SM"],"2014163":["http://www.threatexpert.com/report.aspx?md5=8c4f90bb59c05269c6c6990ec434eab6"],"2014164":["http://www.threatexpert.com/report.aspx?md5=d8c2f31493692895c45d620723e9a8c3"],"2014165":["http://www.threatexpert.com/report.aspx?md5=75c2f3168eca26e10bd5b2f3f0e2a8c5"],"2014166":["http://www.threatexpert.com/report.aspx?md5=6724bb601611dcc0140960c59c7b3393"],"2014167":["http://www.threatexpert.com/report.aspx?md5=6724bb601611dcc0140960c59c7b3393"],"2014169":["http://www.abuse.ch/?p=3581"],"2014170":["http://www.abuse.ch/?p=3581"],"2014173":["http://blog.9bplus.com/kim-jong-il-pdf-malware"],"2014174":["http://blog.9bplus.com/kim-jong-il-pdf-malware","http://www.seculert.com/reports/MSUpdaterTrojanWhitepaper.pdf","http://research.zscaler.com/2012/01/msupdater-trojan-and-link-to-targeted.html","http://blog.seculert.com/2012/01/msupdater-trojan-and-conference-invite.html"],"2014175":["http://www.seculert.com/reports/MSUpdaterTrojanWhitepaper.pdf","http://research.zscaler.com/2012/01/msupdater-trojan-and-link-to-targeted.html","http://blog.seculert.com/2012/01/msupdater-trojan-and-conference-invite.html"],"2014179":["http://packetstormsecurity.org/files/109337/Joomla-Currency-Converter-Cross-Site-Scripting.html"],"2014180":["http://packetstormsecurity.org/files/108488/sapidstable-rfi.txt"],"2014184":["http://packetstormsecurity.org/files/109169/IBBY-SQL-Injection.html"],"2014185":["http://packetstormsecurity.org/files/109169/IBBY-SQL-Injection.html"],"2014186":["http://packetstormsecurity.org/files/109169/IBBY-SQL-Injection.html"],"2014187":["http://packetstormsecurity.org/files/109169/IBBY-SQL-Injection.html"],"2014188":["http://packetstormsecurity.org/files/109169/IBBY-SQL-Injection.html"],"2014199":["http://www.kahusecurity.com/2011/cve-2011-2140-caught-in-the-wild/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0806"],"2014207":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0003"],"2014209":["http://labs.alienvault.com/labs/index.php/2011/are-the-sykipots-authors-obsessed-with-next-generation-us-drones/"],"2014210":["http://labs.alienvault.com/labs/index.php/2011/are-the-sykipots-authors-obsessed-with-next-generation-us-drones/"],"2014211":["http://research.zscaler.com/2012/01/msupdater-trojan-and-link-to-targeted.html","http://blog.seculert.com/2012/01/msupdater-trojan-and-conference-invite.html"],"2014212":["http://research.zscaler.com/2012/01/msupdater-trojan-and-link-to-targeted.html","http://blog.seculert.com/2012/01/msupdater-trojan-and-conference-invite.html"],"2014213":["http://research.zscaler.com/2012/01/msupdater-trojan-and-link-to-targeted.html","http://blog.seculert.com/2012/01/msupdater-trojan-and-conference-invite.html"],"2014215":["http://about-threats.trendmicro.com/Malware.aspx?language=uk&name=ANDROIDOS_PLANKTON.P"],"2014225":["http://www.commandfive.com/papers/C5_APT_C2InTheFifthDomain.pdf"],"2014226":["http://www.commandfive.com/papers/C5_APT_C2InTheFifthDomain.pdf"],"2014227":["http://www.commandfive.com/papers/C5_APT_C2InTheFifthDomain.pdf"],"2014228":["http://www.commandfive.com/papers/C5_APT_C2InTheFifthDomain.pdf"],"2014233":["http://asafaweb.com"],"2014234":["http://www.threatexpert.com/report.aspx?md5=dcc2c110e509fa777ab1460f665bd137","http://www.threatexpert.com/report.aspx?md5=9544c681ae5c4fe3fdbd4d5c6c90e38e","http://www.threatexpert.com/report.aspx?md5=d50c39753ba88daa00bc40848f174168","http://www.threatexpert.com/report.aspx?md5=bf422f3aa215d896f55bbe2ebcd25d17"],"2014250":["http://packetstormsecurity.org/files/95431/Joomla-Jreactions-Remote-File-Inclusion.html"],"2014251":["http://packetstormsecurity.org/files/109814/Grady-Levkov-Cross-Site-Scripting.html"],"2014252":["http://packetstormsecurity.org/files/108687/PHP-Membership-Site-Manager-Script-Cross-Site-Scripting.html"],"2014253":["http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html"],"2014254":["http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html"],"2014255":["http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html"],"2014256":["http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html"],"2014257":["http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html"],"2014258":["http://packetstormsecurity.org/files/109214/Joomla-Visa-SQL-Injection-Local-File-Inclusion.html"],"2014259":["http://packetstormsecurity.org/files/94983/Joomla-Eventcal-Remote-File-Inclusion.html"],"2014260":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0209"],"2014261":["http://www.threatexpert.com/report.aspx?md5=039815a7cb0b7ee52b753a9b79006f97"],"2014262":["http://www.threatexpert.com/report.aspx?md5=3aad2075e00d5169299a0a8889afa30b","http://www.securelist.com/en/descriptions/24412036/not-a-virus%3aAdWare.Win32.Sushi.au"],"2014264":["http://www.threatexpert.com/report.aspx?md5=0e2c46dc89dceb14e7add66cbfe8a2f8"],"2014265":["http://www.threatexpert.com/report.aspx?md5=0e2c46dc89dceb14e7add66cbfe8a2f8"],"2014267":["http://www.sans.org/reading_room/whitepapers/malicious/detailed-analysis-advanced-persistent-threat-malware_33814","http://www.threatexpert.com/report.aspx?md5=e4afcee06ddaf093982f80dafbf9c447"],"2014268":["http://www.threatexpert.com/report.aspx?md5=c0aadd5594d340d8a4909d172017e5d0"],"2014269":["http://www.threatexpert.com/report.aspx?md5=c0aadd5594d340d8a4909d172017e5d0"],"2014270":["http://www.threatexpert.com/report.aspx?md5=34477e29f7408966d2703f3471741618","http://www.threatexpert.com/report.aspx?md5=adf4c3a16f5f6d4baa634b2c50bf7454"],"2014271":["http://www.threatexpert.com/report.aspx?md5=4352407efc8891215b514a54db5b8a1d","http://www.threatexpert.com/report.aspx?md5=45ab3554f3d60d07fc5228faff7784e1"],"2014272":["http://www.threatexpert.com/report.aspx?md5=c6d256edcc8879717539f348706061f2","http://www.threatexpert.com/report.aspx?md5=8f17e2a9e7c6cbec772ae56dfffb13cb"],"2014275":["http://blog.eset.com/2012/02/22/rovnix-reloaded-new-step-of-evolution"],"2014277":["http://cert.xmco.fr/blog/index.php?post/2012/02/23/Try2check.me%2C-le-maillon-fort"],"2014283":["http://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=417"],"2014285":["http://google.com/safebrowsing/diagnostic?site=ch.vu"],"2014290":["http://www.threatexpert.com/report.aspx?md5=25e9e3652e567e70fba00c53738bdf74","http://threatcenter.crdf.fr/?More&ID=74977&D=CRDF.Backdoor.Win32.PEx.942728546"],"2014293":["http://www.threatexpert.com/report.aspx?md5=fa20c17e5f58e7419b4f0eed318fa95a","http://support.kaspersky.com/viruses/rogue/description?qid=208286259"],"2014297":["http://www.oracle.com/technetwork/java/javase/documentation/javase7supportreleasenotes-1601161.html"],"2014302":["http://www.threatexpert.com/report.aspx?md5=8ef81f2555725f7eeae00b3e31229e0e"],"2014303":["http://www.threatexpert.com/report.aspx?md5=62aa9e798746e586fb1f03459a970104"],"2014304":["http://www.threatexpert.com/report.aspx?md5=b318988249cd8e8629b4ef8a52760b65"],"2014305":["http://www.threatexpert.com/report.aspx?md5=4cfe5674d9f33804572ae0d14f0c941b"],"2014306":["http://www.threatexpert.com/report.aspx?md5=4a203e37caa2e04671388341419bda69"],"2014310":["http://www.secureworks.com/research/threats/sindigoo/"],"2014312":["http://www.threatexpert.com/report.aspx?md5=3ce5da32903b52394cff2517df51f599"],"2014320":["http://packetstormsecurity.org/files/109852/ButorWiki-Cross-Site-Scripting.html"],"2014321":["http://packetstormsecurity.org/files/100798/b2evolution-4.0.5-Remote-File-Inclusion.html"],"2014322":["http://packetstormsecurity.org/files/100798/b2evolution-4.0.5-Remote-File-Inclusion.html"],"2014323":["http://packetstormsecurity.org/files/109025/Joomla-BCH-Local-File-Inclusion.html"],"2014324":["http://packetstormsecurity.org/files/109709/Fork-CMS-3.2.4-Cross-Site-Scripting-Local-File-Inclusion.html"],"2014325":["http://packetstormsecurity.org/files/110296/ASUS-Net4Switch-ipswcom.dll-ActiveX-Stack-Buffer-Overflow.html"],"2014326":["http://packetstormsecurity.org/files/110296/ASUS-Net4Switch-ipswcom.dll-ActiveX-Stack-Buffer-Overflow.html"],"2014327":["http://packetstormsecurity.org/files/110376/starCMS-Cross-Site-Scripting.html"],"2014328":["http://packetstormsecurity.org/files/108905/Joomla-Boss-Local-File-Inclusion.html"],"2014329":["http://packetstormsecurity.org/files/109543/Snipsnap-Cross-Site-Scripting.html"],"2014330":["http://www.abuse.ch/?p=3658"],"2014331":["http://www.threatexpert.com/report.aspx?md5=700b7a81d1460a652e5f9f06fc54dcd6"],"2014332":["http://en.wikipedia.org/wiki/Coral_Content_Distribution_Network"],"2014334":["http://community.websense.com/blogs/securitylabs/archive/2012/03/02/mass-injection-of-wordpress-sites.aspx"],"2014335":["http://contagiodump.blogspot.com/2012/03/mar-2-cve-2012-0754-irans-oil-and.html","http://www.securityfocus.com/bid/52034","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0754"],"2014336":["http://contagiodump.blogspot.com/2012/03/mar-2-cve-2012-0754-irans-oil-and.html"],"2014337":["http://community.websense.com/blogs/securitylabs/archive/2012/03/05/mass-injection-of-wordpress-sites.aspx"],"2014338":["http://community.websense.com/blogs/securitylabs/archive/2012/03/05/mass-injection-of-wordpress-sites.aspx"],"2014339":["http://www.threatexpert.com/report.aspx?md5=2609c78efbc325d1834e49553a9a9f89","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Adware%3aWin32/GameVance"],"2014340":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Adware%3aWin32/GameVance"],"2014341":["http://www.threatexpert.com/report.aspx?md5=6b712c6dbc3cd87bbaeb955ea1d2d24f"],"2014342":["http://www.threatexpert.com/report.aspx?md5=26a813eadbf11a1dfc2e63dc7dc87480"],"2014343":["http://www.threatexpert.com/report.aspx?md5=24e937b9f3fd6a04dde46a2bc75d4b18"],"2014344":["http://www.threatexpert.com/report.aspx?md5=24e937b9f3fd6a04dde46a2bc75d4b18"],"2014345":["http://www.threatexpert.com/report.aspx?md5=254efc77c18eb2f427d2a3920e07c2e8"],"2014353":["http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=860182","http://www.threatexpert.com/report.aspx?md5=39c1769c39f61dd2ec009de8374352c6"],"2014354":["http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=910563","http://www.threatexpert.com/report.aspx?md5=cc439073eeb244e6bcecee8b6774b672"],"2014355":["http://www.threatexpert.com/report.aspx?md5=1047b186bb2822dbb5907cd743069261"],"2014360":["http://www.threatexpert.com/report.aspx?md5=53105ecf3cf6040039e16abb382fb836"],"2014365":["http://www.threatexpert.com/report.aspx?md5=0fd68129ecbf68ad1290a41429ee3e73","http://www.threatexpert.com/report.aspx?md5=11353f5bdbccdd59d241644701e858e6"],"2014380":["http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html"],"2014381":["http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html"],"2014382":["http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html"],"2014385":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0152"],"2014386":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0152"],"2014388":["http://packetstormsecurity.org/files/100406/Joomla-Phocadownload-Remote-File-Inclusion.html"],"2014389":["http://packetstorm.foofus.com/1012-exploits/joomlaadsmanager-rfi.txt"],"2014390":["http://packetstormsecurity.org/files/109298/EdrawSoft-Office-Viewer-Component-ActiveX-5.6-Buffer-Overflow.html"],"2014391":["http://packetstormsecurity.org/files/109298/EdrawSoft-Office-Viewer-Component-ActiveX-5.6-Buffer-Overflow.html"],"2014392":["http://packetstormsecurity.org/files/109023/Joomla-Fundhelp-Local-File-Inclusion.html"],"2014393":["http://packetstormsecurity.org/files/109026/Joomla-Rule-Local-File-Inclusion.html"],"2014394":["http://packetstormsecurity.org/files/108917/Joomla-KP-Local-File-Inclusion.html"],"2014395":["http://packetstormsecurity.org/files/110667/PHP-Address-Book-6.2.12-SQL-Injection-Cross-Site-Scripting.html"],"2014396":["http://packetstormsecurity.org/files/110811/Volusion-Chat-Cross-Site-Scripting.html"],"2014397":["http://packetstormsecurity.org/files/110683/EJBCA-4.0.7-Cross-Site-Scripting-User-Enumeration.html"],"2014400":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Adware%3AWin32%2FLoudmo","http://www.threatexpert.com/report.aspx?md5=fc06c613e83f0d3271beba4fdcda987f"],"2014402":["http://www.threatexpert.com/report.aspx?md5=a89f7289d5cce821a194542e90026082","http://www.threatexpert.com/report.aspx?md5=fd56ce176889d4fbe588760a1da6462b","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3AWin32%2FRimecud"],"2014407":["http://www.kahusecurity.com/2011/new-exploit-kit-egypack/","http://www.vbulletin.com/forum/forum/vbulletin-3-8/vbulletin-3-8-questions-problems-and-troubleshooting/346989-vbulletin-footer-sql-injection-hack","http://blog.webroot.com/2013/03/29/a-peek-inside-the-egypack-web-malware-exploitation-kit/"],"2014408":["http://www.kahusecurity.com/2011/new-exploit-kit-egypack/","http://www.vbulletin.com/forum/forum/vbulletin-3-8/vbulletin-3-8-questions-problems-and-troubleshooting/346989-vbulletin-footer-sql-injection-hack","http://blog.webroot.com/2013/03/29/a-peek-inside-the-egypack-web-malware-exploitation-kit/"],"2014409":["http://www.threatexpert.com/report.aspx?md5=fe1e735ec10fb8836691fe2f2ac7ea44"],"2014410":["http://blog.spiderlabs.com/2012/03/dirty-rat.html"],"2014411":["http://www.threatexpert.com/report.aspx?md5=99FAB94FD824737393F5184685E8EDF2","http://www.threatexpert.com/report.aspx?md5=9544c681ae5c4fe3fdbd4d5c6c90e38e","http://www.threatexpert.com/report.aspx?md5=d50c39753ba88daa00bc40848f174168","http://www.threatexpert.com/report.aspx?md5=bf422f3aa215d896f55bbe2ebcd25d17"],"2014416":["http://retrogod.altervista.org/9sg_linksys_playerpt.htm"],"2014417":["http://retrogod.altervista.org/9sg_linksys_playerpt.htm"],"2014418":["http://www.exploit-db.com/exploits/18625/"],"2014419":["http://www.exploit-db.com/exploits/18625/"],"2014420":["http://www.exploit-db.com/exploits/18625/"],"2014421":["http://www.exploit-db.com/exploits/18625/"],"2014422":["http://www.exploit-db.com/exploits/18624/"],"2014423":["http://www.exploit-db.com/exploits/18624/"],"2014424":["http://packetstormsecurity.org/files/111075/Vtiger-5.1.0-Local-File-Inclusion.html"],"2014425":["http://packetstormsecurity.org/files/110906/OneFileCMS-1.1.5-Local-File-Inclusion.html"],"2014426":["http://packetstormsecurity.org/files/110863/WikyBlog-1.7.3RC2-Cross-Site-Scripting.html"],"2014427":["http://packetstormsecurity.org/files/110989/Greenpeace.fr-Cross-Site-Scripting.html"],"2014435":["http://www.threatexpert.com/report.aspx?md5=3baae632d2476cbd3646c5e1b245d9be","http://www.threatexpert.com/report.aspx?md5=ace343a70fbd26e79358db4c27de73db"],"2014439":["http://www.threatexpert.com/report.aspx?md5=fa6ae89b101a0367cc98798c7333e3a4"],"2014448":["http://packetstormsecurity.org/files/107260/WordPress-Enable-Latex-Remote-File-Inclusion.html"],"2014449":["http://packetstormsecurity.org/files/111161/Event-Calendar-PHP-Cross-Site-Scripting.html"],"2014450":["http://packetstormsecurity.org/files/105238/WordPress-Mini-Mail-Dashboard-Widget-1.36-Remote-File-Inclusion.html"],"2014451":["http://packetstormsecurity.org/files/111077/Dell-Webcam-CrazyTalk-ActiveX-BackImage-Vulnerability.html"],"2014452":["http://packetstormsecurity.org/files/111077/Dell-Webcam-CrazyTalk-ActiveX-BackImage-Vulnerability.html"],"2014453":["http://www.exploit-db.com/exploits/18674/"],"2014454":["http://www.exploit-db.com/exploits/18674/"],"2014455":["http://www.exploit-db.com/exploits/18675/"],"2014456":["http://www.exploit-db.com/exploits/18675/"],"2014461":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0507","http://www.metasploit.com/modules/exploit/multi/browser/java_atomicreferencearray"],"2014462":["http://blog.trendmicro.com/luckycat-redux-inside-an-apt-campaign/","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf"],"2014463":["http://dvlabs.tippingpoint.com/blog/2012/03/15/pwn2own-2012-challenge-writeup","http://technet.microsoft.com/en-us/security/bulletin/MS10-002","http://www.securityfocus.com/bid/37894","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0248"],"2014468":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AWin32%2FDatamaikon.gen!A&ThreatID=-2147312276","http://www.threatexpert.com/report.aspx?md5=a51933ee0f2ade7df98feb7207a2ffaf"],"2014513":["http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~MDrop-EAB/detailed-analysis.aspx"],"2014522":["http://f-secure.com/v-descs/trojan-downloader_osx_flashback_k.shtml","http://f-secure.com/v-descs/trojan-downloader_osx_flashback_i.shtml","http://vms.drweb.com/virus/?i=1816029"],"2014523":["http://f-secure.com/v-descs/trojan-downloader_osx_flashback_k.shtml","http://f-secure.com/v-descs/trojan-downloader_osx_flashback_i.shtml","http://vms.drweb.com/virus/?i=1816029"],"2014524":["http://f-secure.com/v-descs/trojan-downloader_osx_flashback_k.shtml","http://f-secure.com/v-descs/trojan-downloader_osx_flashback_i.shtml","http://vms.drweb.com/virus/?i=1816029"],"2014525":["http://f-secure.com/v-descs/trojan-downloader_osx_flashback_k.shtml","http://vms.drweb.com/virus/?i=1816029"],"2014529":["http://www.symantec.com/connect/blogs/trojantaidoor-takes-aim-policy-think-tanks"],"2014534":["http://f-secure.com/v-descs/trojan-downloader_osx_flashback_k.shtml","http://vms.drweb.com/virus/?i=1816029","http://f-secure.com/v-descs/trojan-downloader_osx_flashback_i.shtml"],"2014535":["http://www.bitcoinplus.com/miner/embeddable","http://www.bitcoinplus.com/miner/whatsthis"],"2014541":["http://www.tarasco.org/security/FHScan_Fast_HTTP_Vulnerability_Scanner/index.html"],"2014550":["http://packetstormsecurity.org/files/111680/IBM-Tivoli-Provisioning-Manager-Express-Overflow.html"],"2014551":["http://packetstormsecurity.org/files/111680/IBM-Tivoli-Provisioning-Manager-Express-Overflow.html"],"2014552":["http://exploit-db.com/exploits/17557/"],"2014553":["http://exploit-db.com/exploits/17557/"],"2014554":["http://packetstormsecurity.org/files/107551/WordPress-Pretty-Link-1.5.2-Cross-Site-Scripting.html"],"2014555":["http://packetstormsecurity.org/files/107424/WordPress-Flash-Album-Gallery-Cross-Site-Scripting.html"],"2014556":["http://1337day.com/exploits/18018"],"2014557":["http://packetstormsecurity.org/files/108913/Joomla-Bulkenquery-Local-File-Inclusion.html"],"2014558":["http://packetstormsecurity.org/files/108948/Joomla-BR-Local-File-Inclusion.html"],"2014559":["http://packetstormsecurity.org/files/92079/Free-PHP-Photo-Gallery-Script-Remote-File-Inclusion.html"],"2014564":["http://www.securelist.com/en/blog/208193467/SabPub_Mac_OS_X_Backdoor_Java_Exploits_Targeted_Attacks_and_Possible_APT_link"],"2014566":["http://www.threatexpert.com/report.aspx?md5=cec40236236466a1acb33aca3220eebe"],"2014567":["http://www.threatexpert.com/report.aspx?md5=d51218653323e48672023806f6ace26b"],"2014570":["http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Coswid-C/detailed-analysis.aspx"],"2014572":["http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Coswid-C/detailed-analysis.aspx"],"2014573":["http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Coswid-C/detailed-analysis.aspx"],"2014574":["http://www.cnet.com/techtracker-free/"],"2014575":["http://blog.didierstevens.com/2009/07/01/embedding-and-hiding-files-in-pdf-documents/"],"2014576":["http://malwr.com/analysis/a04b28e21adc70837eb7de811556ff4e/","http://www.ebookgenerator.com/"],"2014581":["http://malwr.com/analysis/5ee02601d265a9a88f03a5465a99b190/"],"2014583":["http://www.scumware.org/report/update.best-pc.co.kr"],"2014585":["http://exploit-db.com/exploits/18461/"],"2014586":["http://exploit-db.com/exploits/18461/"],"2014587":["http://exploit-db.com/exploits/18704/"],"2014588":["http://exploit-db.com/exploits/18704/"],"2014589":["http://packetstormsecurity.org/files/108470/wpystap-xss.txt"],"2014590":["http://packetstormsecurity.org/files/94991/Joomla-Pinboard-Remote-File-Inclusion.html"],"2014591":["http://packetstormsecurity.org/files/108271/WordPress-Whois-Search-Cross-Site-Scripting.html"],"2014592":["http://packetstormsecurity.org/files/108238/WordPress-Facebook-Page-Promoter-Lightbox-Cross-Site-Scripting.html"],"2014593":["http://securityfocus.com/archive/1/520353"],"2014594":["http://securityfocus.com/archive/1/520353"],"2014596":["http://blog.intego.com/flashback-mac-trojan-horse-infections-increasing-with-new-variant/"],"2014604":["http://www.threatexpert.com/report.aspx?md5=d40927e8c4b59a1c2af4f981ef295321"],"2014610":["http://www.fortiguard.com/av/VID3309956"],"2014613":["http://lab.onsec.ru/2012/04/find-new-web-bot-jembot.html?m=1"],"2014614":["http://lab.onsec.ru/2012/04/find-new-web-bot-jembot.html?m=1"],"2014616":["http://www.threatexpert.com/report.aspx?md5=3155b146bee46723acc5637617e3703a","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanSpy%3AWin32%2FUsteal.B&ThreatID=-2147320862"],"2014621":["http://packetstormsecurity.org/files/111939/DocuWiki-2012-01-25-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"],"2014622":["http://packetstormsecurity.org/files/107423/WordPress-1-JQuery-Photo-Gallery-Slideshow-Flash-Cross-Site-Scripting.html"],"2014623":["http://1337day.com/exploits/15795"],"2014624":["http://1337day.com/exploits/15795"],"2014625":["http://1337day.com/exploits/15795"],"2014626":["http://1337day.com/exploits/15795"],"2014627":["http://1337day.com/exploits/15795"],"2014628":["http://1337day.com/exploits/15795"],"2014630":["http://www.threatexpert.com/report.aspx?md5=4a17e9bd99f496c518ddfaaef93384b0"],"2014633":["http://blog.spiderlabs.com/2012/04/honeypot-alert-phpmyadmin-setupphp-rfi-attacks-detected.html","http://phpmyadmin.net/home_page/security/PMASA-2010-4.php","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3055"],"2014634":["http://www.threatexpert.com/report.aspx?md5=a01d75158cf4618677f494f9626b1c4c"],"2014635":["http://www.threatexpert.com/report.aspx?md5=a01d75158cf4618677f494f9626b1c4c"],"2014636":["http://www.threatexpert.com/report.aspx?md5=3e008471eaa5e788c41c2a0dff3d1a89"],"2014643":["http://www.threatexpert.com/report.aspx?md5=3305ad96bcfd3a406dc9daa31e538902"],"2014645":["http://www.exploit-db.com/exploits/18779/","http://arstechnica.com/business/news/2012/04/backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systems.ars"],"2014647":["http://packetstormsecurity.org/files/112219/PHP-Volunteer-Management-1.0.2-Cross-Site-Scripting-SQL-Injection.html"],"2014648":["http://exploit-db.com/exploits/18427/"],"2014649":["http://exploit-db.com/exploits/18427/"],"2014650":["http://exploit-db.com/exploits/18427/"],"2014651":["http://exploit-db.com/exploits/18427/"],"2014652":["http://secunia.com/advisories/48681/"],"2014653":["http://secunia.com/advisories/48681/"],"2014654":["http://packetstormsecurity.org/files/112161/Joomla-Video-Gallery-Local-File-Inclusion-SQL-Injection.html"],"2014655":["http://packetstormsecurity.org/files/108906/Joomla-Some-Local-File-Inclusion.html"],"2014656":["http://packetstormsecurity.org/files/107342/WordPress-Skysa-Official-1.01-1.02-1.03-Cross-Site-Scripting.html"],"2014660":["http://www.threatexpert.com/report.aspx?md5=97a1acc085849c0b9af19adcf44607a7"],"2014667":["http://microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AWin32%2FDluca.AN&ThreatID=-2147365813","http://www.threatexpert.com/report.aspx?md5=fd2c949dc20b651a53326a3d571641ec"],"2014701":["http://www.threatexpert.com/report.aspx?md5=a56ec0f9bd46f921f65e4f6e598e5ed0","http://vrt-blog.snort.org/2008/08/checking-multiple-bits-in-flag-field_29.html"],"2014702":["http://www.threatexpert.com/report.aspx?md5=a56ec0f9bd46f921f65e4f6e598e5ed0","http://vrt-blog.snort.org/2008/08/checking-multiple-bits-in-flag-field_29.html"],"2014703":["http://www.threatexpert.com/report.aspx?md5=a56ec0f9bd46f921f65e4f6e598e5ed0","http://vrt-blog.snort.org/2008/08/checking-multiple-bits-in-flag-field_29.html"],"2014704":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-1823","http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/","http://varanoid.com/research-alerts/us-cert/vu520827-php-cgi-query-string-parameter-vulnerability/"],"2014708":["http://exploit-db.com/exploits/18805/"],"2014709":["http://exploit-db.com/exploits/18805/"],"2014711":["http://packetstormsecurity.org/files/112289/Maxxweb-CMS-Cross-Site-Scripting.html"],"2014712":["http://packetstormsecurity.org/files/112324/WordPress-WPsc-MijnPress-Cross-Site-Scripting.html"],"2014713":["http://exploit-db.com/exploits/16604/"],"2014714":["http://exploit-db.com/exploits/16604/"],"2014715":["http://packetstormsecurity.org/files/103598/Joomla-obSuggest-Local-File-Inclusion.html"],"2014716":["http://packetstormsecurity.org/files/104112/Joomla-JoomTouch-1.0.2-Local-File-Inclusion.html"],"2014717":["http://packetstormsecurity.org/files/100047/WordPress-WP-Custom-Pages-0.5.0.1-Local-File-Inclusion.html"],"2014718":["http://www.useragentstring.com/pages/Opera/"],"2014722":["http://www.threatexpert.com/report.aspx?md5=00da8acc14d0e827dbb1326c023fc720","http://www.threatexpert.com/report.aspx?md5=8f561f46fb262cac6bb4cacf3e4e78a6","http://www.threatexpert.com/report.aspx?md5=63491dcc8e897bf442599febe48b824d"],"2014726":["http://www.adobe.com/software/flash/about/"],"2014728":["http://www.threatexpert.com/report.aspx?md5=7ef1e61d9b394a972516cc453bf0ec06"],"2014736":["http://packetstormsecurity.org/files/112549/Andromeda-Streaming-MP3-Server-1.9.3.6-Cross-Site-Scripting.html"],"2014737":["http://secunia.com/advisories/45511"],"2014738":["http://secunia.com/advisories/45511"],"2014739":["http://secunia.com/advisories/45511"],"2014740":["http://secunia.com/advisories/45511"],"2014741":["http://secunia.com/advisories/45511"],"2014742":["http://secunia.com/advisories/45511"],"2014743":["http://secunia.com/advisories/45511"],"2014744":["http://secunia.com/advisories/45511"],"2014752":["http://news.drweb.com/show/?i=2440&lng=en&c=5"],"2014754":["http://home.mcafee.com/virusinfo/virusprofile.aspx?key=1072862","http://www.threatexpert.com/report.aspx?md5=8af17164500aac1c0965b842aca3fed7"],"2014757":["http://www.threatexpert.com/report.aspx?md5=6b16290b05afd1a9d638737924f2ab5c"],"2014758":["http://www.threatexpert.com/report.aspx?md5=f6e1583aca310c4c0d55db1dae942b2b"],"2014762":["http://www.threatexpert.com/report.aspx?md5=f091e8ed0e8f4953ff10ce3bd06dbe54"],"2014763":["http://packetstormsecurity.org/files/97160/Chilkat-Software-FTP2-ActiveX-Code-Execution.html"],"2014764":["http://packetstormsecurity.org/files/97160/Chilkat-Software-FTP2-ActiveX-Code-Execution.html"],"2014765":["http://1337day.com/exploits/17583"],"2014766":["http://1337day.com/exploits/17583"],"2014767":["http://www.threatexpert.com/report.aspx?md5=48352e3a034a95845864c0f6aad07d39"],"2014768":["http://packetstormsecurity.org/files/112685/WordPress-WP-Survey-And-Quiz-Tool-2.9.2-Cross-Site-Scripting.html"],"2014769":["http://packetstormsecurity.org/files/112710/WordPress-CataBlog-1.6-Cross-Site-Scripting.html"],"2014770":["http://packetstormsecurity.org/files/112707/WordPress-Download-Monitor-3.3.5.4-Cross-Site-Scripting.html"],"2014771":["http://packetstormsecurity.org/files/103172/Joomla-Appointment-Booking-Pro-Arbitrary-File-Reading.html"],"2014772":["http://packetstormsecurity.org/files/99775/Joomla-Media-Local-File-Inclusion.html"],"2014778":["http://www.threatexpert.com/report.aspx?md5=ccb463b2dadaf362a03c8bbf34dc247e"],"2014803":["http://www.threatexpert.com/report.aspx?md5=6fd7493e56fdc3b0dd8ecd24aea20da1","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AVBS%2FWimmie.A","http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf","http://www.threatexpert.com/report.aspx?md5=61474931882dce7b1c67e1f22d26187e"],"2014806":["http://exploit-db.com/exploits/18892/"],"2014807":["http://exploit-db.com/exploits/18892/"],"2014808":["http://secunia.com/advisories/49285/"],"2014809":["http://secunia.com/advisories/49285/"],"2014811":["http://packetstormsecurity.org/files/112706/WordPress-Dynamic-Widgets-1.5.1-Cross-Site-Scripting.html"],"2014812":["http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html"],"2014813":["http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html"],"2014814":["http://packetstormsecurity.org/files/103214/Joomla-JE-K2-Story-Submit-Local-File-Inclusion.html"],"2014815":["http://packetstormsecurity.org/files/102422/Joomla-A-Cool-Debate-1.0.3-Local-File-Inclusion.html"],"2014816":["http://www.threatexpert.com/report.aspx?md5=181999985de5feae6f44f9578915417f"],"2014817":["http://www.f-secure.com/v-descs/trojan_w32_renos_h.shtml","http://www.threatexpert.com/report.aspx?md5=35ba53f6aeb6b38c1107018f271189af"],"2014818":["http://crysys.hu/skywiper/skywiper.pdf"],"2014822":["http://blog.cuckoobox.org/2012/05/29/cuckoo-in-flame/"],"2014833":["http://packetstormsecurity.org/files/93252/LEADTOOLS-ActiveX-Raster-Twain-16.5-Buffer-Overflow.html"],"2014834":["http://packetstormsecurity.org/files/93252/LEADTOOLS-ActiveX-Raster-Twain-16.5-Buffer-Overflow.html"],"2014835":["http://packetstormsecurity.org/files/95286/SonicWALL-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control.html"],"2014836":["http://packetstormsecurity.org/files/87907/DynPG-CMS-4.1.0-Remote-File-Inclusion.html"],"2014837":["http://packetstormsecurity.org/files/96812/Joomla-Jotloader-2.2.1-Local-File-Inclusion.html"],"2014838":["http://packetstormsecurity.org/files/112700/WordPress-PDF-And-Print-Button-Joliprint-1.3.0-Cross-Site-Scripting.html"],"2014839":["http://packetstormsecurity.org/files/112700/WordPress-PDF-And-Print-Button-Joliprint-1.3.0-Cross-Site-Scripting.html"],"2014840":["http://packetstormsecurity.org/files/101230/Exponent-2.0.0-Beta-1.1-Local-File-Inclusion.html"],"2014846":["http://code.google.com/p/timthumb/issues/detail?id=212"],"2014847":["http://blog.sucuri.net/2012/05/list-of-domains-hosting-webshells-for-timthumb-attacks.html"],"2014851":["http://blog.spiderlabs.com/2012/05/sakura-exploit-kit-11.html"],"2014852":["http://blog.spiderlabs.com/2012/05/sakura-exploit-kit-11.html"],"2014853":["http://blog.spiderlabs.com/2012/05/sakura-exploit-kit-11.html"],"2014865":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0754","http://blog.9bplus.com/observing-the-enemy-cve-2012-0754-pdf-interac"],"2014869":["http://arachni-scanner.com","http://github.com/Zapotek/arachni"],"2014870":["http://blog.crysys.hu/2012/06/the-flame-malware-wusetupv-exe-certificate-chain/","http://rmhrisk.wpengine.com/?p=52","http://msdn.microsoft.com/en-us/library/aa448396.aspx","http://www.threatexpert.com/report.aspx?md5=1f61d280067e2564999cac20e386041c"],"2014874":["http://secunia.com/advisories/48966/"],"2014875":["http://secunia.com/advisories/48966/"],"2014876":["http://secunia.com/advisories/48965/"],"2014877":["http://secunia.com/advisories/48965/"],"2014878":["http://packetstormsecurity.org/files/96803/Joomla-JE-Auto-Local-File-Inclusion.html"],"2014879":["http://packetstormsecurity.org/files/96751/Joomla-JRadio-Local-File-Inclusion.html"],"2014880":["http://packetstormsecurity.org/files/108282/WordPress-LivePHP-Cross-Site-Scripting.html"],"2014881":["http://packetstormsecurity.org/files/112696/WordPress-Mingle-Forum-1.0.33-Cross-Site-Scripting.html"],"2014882":["http://packetstormsecurity.org/files/96190/Joomla-Catalogue-Local-File-Inclusion.html"],"2014883":["http://packetstormsecurity.org/files/90844/Joomla-JVB-Bridge-Remote-File-Inclusion.html"],"2014886":["http://lists.grok.org.uk/pipermail/full-disclosure/2012-June/087269.html"],"2014887":["http://contagioexchange.blogspot.co.uk/2012/06/022-crime-win32bakcoroxa-proxy-bot-web.html"],"2014890":["http://support.microsoft.com/kb/321185"],"2014896":["http://secunia.com/advisories/49443/"],"2014897":["http://packetstormsecurity.org/files/101770/Joomla-JMSFileSeller-Local-File-Inclusion.html"],"2014898":["http://1337day.com/exploits/12246"],"2014899":["http://packetstormsecurity.org/files/113417/WordPress-Tinymce-Thumbnail-Gallery-1.0.7-File-Disclosure.html"],"2014900":["http://packetstormsecurity.org/files/112711/WordPress-2-Click-Social-Media-Buttons-0.32.2-Cross-Site-Scripting.html"],"2014901":["http://packetstormsecurity.org/files/112711/WordPress-2-Click-Social-Media-Buttons-0.32.2-Cross-Site-Scripting.html"],"2014902":["http://secunia.com/advisories/48602/"],"2014903":["http://secunia.com/advisories/48602/"],"2014904":["http://packetstormsecurity.org/files/112690/WordPress-Sharebar-1.2.1-SQL-Injection-Cross-Site-Scripting.html"],"2014905":["http://packetstormsecurity.org/files/95623/Joomla-CKForms-Local-File-Inclusion.html"],"2014911":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1875"],"2014919":["http://skydrive.live.com"],"2014920":["http://skydrive.live.com"],"2014925":["http://github.com/rapid7/metasploit-framework/blob/master/lib/net/ssh/transport/server_version.rb"],"2014926":["http://blog.9bplus.com/av-bypass-for-malicious-pdfs-using-xdp"],"2014938":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1889"],"2014939":["http://en.wikipedia.org/wiki/.onion"],"2014941":["http://en.wikipedia.org/wiki/.onion"],"2014942":["http://1337day.com/exploits/13938"],"2014943":["http://1337day.com/exploits/13938"],"2014944":["http://packetstormsecurity.org/files/113912/WHCMS-5.0.3-Remote-File-Inclusion.html"],"2014945":["http://packetstormsecurity.org/files/113912/WHCMS-5.0.3-Remote-File-Inclusion.html"],"2014946":["http://packetstormsecurity.org/files/113912/WHCMS-5.0.3-Remote-File-Inclusion.html"],"2014947":["http://secunia.com/advisories/49461"],"2014948":["http://secunia.com/advisories/49462"],"2014949":["http://1337day.com/exploits/18685"],"2014950":["http://secunia.com/advisories/49544"],"2014951":["http://secunia.com/advisories/49544"],"2014952":["http://labs.alienvault.com/labs/index.php/2012/capfire4-malware-rat-software-and-cc-service-together/"],"2014953":["http://labs.alienvault.com/labs/index.php/2012/capfire4-malware-rat-software-and-cc-service-together/"],"2014962":["http://www.threatexpert.com/report.aspx?md5=7b2bfb9d270a5f446f32502d2ed34d67"],"2014963":["http://www.threatexpert.com/report.aspx?md5=3f4c5649d66fc5befc0db47930edb9f6"],"2014979":["http://www.threatexpert.com/report.aspx?md5=43d8afa89bd6bf06973af62220d6c158"],"2014980":["http://www.threatexpert.com/report.aspx?md5=43d8afa89bd6bf06973af62220d6c158"],"2014984":["http://blog.unmaskparasites.com/2012/06/22/runforestrun-and-pseudo-random-domains/"],"2014985":["http://blog.unmaskparasites.com/2012/06/22/runforestrun-and-pseudo-random-domains/"],"2014986":["http://secunia.com/advisories/49627/"],"2014987":["http://secunia.com/advisories/49627/"],"2014988":["http://1337day.com/exploits/18854"],"2014989":["http://packetstormsecurity.org/files/112707/WordPress-Download-Monitor-3.3.5.4-Cross-Site-Scripting.html"],"2014990":["http://packetstormsecurity.org/files/112707/WordPress-Download-Monitor-3.3.5.4-Cross-Site-Scripting.html"],"2014993":["http://packetstormsecurity.org/files/91022/AdaptCMS-2.0.0-Beta-Remote-File-Inclusion.html"],"2014994":["http://packetstormsecurity.org/files/95609/Joomla-Profile-Local-File-Inclusion.html"],"2014995":["http://packetstormsecurity.org/files/95638/WordPress-jRSS-Widget-1.1.1-Local-File-Inclusion.html"],"2014997":["http://www.pandora.com"],"2014999":["http://www.threatexpert.com/report.aspx?md5=43d8afa89bd6bf06973af62220d6c158"],"2015004":["http://blog.fireeye.com/research/2012/07/inside-customized-threat.html#more","http://www.cabextract.org.uk/libmspack/doc/szdd_kwaj_format.html"],"2015017":["http://www.threatexpert.com/report.aspx?md5=60763078b8860fd59a1d8bea2bf8900b"],"2015020":["http://www.threatexpert.com/report.aspx?md5=fbc732c7cd1bbd84956b1e76b53384da"],"2015021":["http://www.threatexpert.com/report.aspx?md5=fbc732c7cd1bbd84956b1e76b53384da"],"2015023":["http://soroush.secproject.com/downloadable/microsoft_iis_tilde_character_vulnerability_feature.pdf"],"2015028":["http://vrt-blog.snort.org/2012/07/banking-trojan-spread-via-ups-phish.html","http://www.virustotal.com/file/00bf5b6f32b6a8223b8e55055800ef7870f8acaed334cb12484e44489b2ace24/analysis/","http://www.packetninjas.net"],"2015032":["http://11337day.com/exploits/18917"],"2015033":["http://www.securityfocus.com/bid/53268/info"],"2015034":["http://www.securityfocus.com/bid/53268/info"],"2015035":["http://1337day.com/exploits/15332"],"2015036":["http://1337day.com/exploits/15098"],"2015037":["http://1337day.com/exploits/15098"],"2015038":["http://secunia.com/advisories/49692/"],"2015039":["http://packetstormsecurity.org/files/95508/Joomla-Wisroyq-Local-File-Inclusion.html"],"2015040":["http://packetstormsecurity.org/files/95430/Joomla-RSSReader-Local-File-Inclusion.html"],"2015041":["http://packetstormsecurity.org/files/112616/WordPress-Custom-Contact-Forms-Cross-Site-Scripting.html"],"2015051":["http://stopmalvertising.com/malware-reports/the-c3284d-malware-network-stats.php.html"],"2015052":["http://stopmalvertising.com/malware-reports/the-c3284d-malware-network-stats.php.html"],"2015458":["http://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/23000/PD23873/en_US/McAfee%20Labs%20Threat%20Advisory-W32-Pift.pdf","http://www.threatexpert.com/report.aspx?md5=d3c6af8284276b11c2f693c1195b4735"],"2015459":["http://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/23000/PD23873/en_US/McAfee%20Labs%20Threat%20Advisory-W32-Pift.pdf","http://www.threatexpert.com/report.aspx?md5=d3c6af8284276b11c2f693c1195b4735"],"2015460":["http://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/23000/PD23873/en_US/McAfee%20Labs%20Threat%20Advisory-W32-Pift.pdf","http://www.threatexpert.com/report.aspx?md5=d3c6af8284276b11c2f693c1195b4735"],"2015464":["http://packetstormsecurity.org/files/114564/AdminStudio-LaunchHelp.dll-ActiveX-Arbitrary-Code-Execution.html"],"2015465":["http://packetstormsecurity.org/files/114364/Oracle-AutoVue-ActiveX-SetMarkupMode-Remote-Code-Execution.html"],"2015466":["http://packetstormsecurity.org/files/112699/WordPress-Leaflet-0.0.1-Cross-Site-Scripting.html"],"2015467":["http://packetstormsecurity.org/files/112699/WordPress-Leaflet-0.0.1-Cross-Site-Scripting.html"],"2015468":["http://packetstormsecurity.org/files/94689/Joomla-JStore-Local-File-Inclusion.html"],"2015469":["http://packetstormsecurity.org/files/88998/Help-Center-Live-2.0.6-Local-File-Inclusion.html"],"2015470":["http://packetstormsecurity.org/files/81376/phpPollScript-1.3-Remote-File-Inclusion.html"],"2015471":["http://packetstormsecurity.org/files/95604/Joomla-eDir-Local-File-Inclusion.html"],"2015472":["http://packetstormsecurity.org/files/95590/Joomla-Connect-Local-File-Inclusion.html"],"2015473":["http://packetstormsecurity.org/files/112710/WordPress-CataBlog-1.6-Cross-Site-Scripting.html"],"2015478":["http://blog.unmaskparasites.com/2012/07/11/whats-in-your-wp-head/"],"2015479":["http://blog.unmaskparasites.com/2012/07/11/whats-in-your-wp-head/"],"2015480":["http://blog.unmaskparasites.com/2012/07/11/whats-in-your-wp-head/"],"2015481":["http://blog.unmaskparasites.com/2012/07/11/whats-in-your-wp-head/"],"2015485":["http://tunein.com/support/get-started"],"2015490":["http://exploit-db.com/exploits/19861/"],"2015491":["http://packetstormsecurity.org/files/82950/CA-BrightStor-ARCserve-Backup-AddColumn-ActiveX-Buffer-Overflow.html"],"2015492":["http://packetstormsecurity.org/files/82950/CA-BrightStor-ARCserve-Backup-AddColumn-ActiveX-Buffer-Overflow.html"],"2015493":["http://packetstormsecurity.org/files/89856/CommuniCrypt-Mail-1.16-SMTP-ActiveX-Stack-Buffer-Overflow.html"],"2015494":["http://packetstormsecurity.org/files/113404/WordPress-PICA-Photo-Gallery-1.0-File-Disclosure.html"],"2015495":["http://packetstormsecurity.org/files/99789/Web-Edition-6.1.0.2-Local-File-Inclusion.html"],"2015496":["http://securityfocus.com/bid/54329"],"2015497":["http://packetstormsecurity.org/files/112708/WordPress-Download-Manager-2.2.2-Cross-Site-Scripting.html"],"2015498":["http://packetstormsecurity.org/files/114893/Joomla-Hello-Local-File-Inclusion.html"],"2015499":["http://packetstormsecurity.org/files/113413/WordPress-Newsletter-1.5-File-Disclosure.html"],"2015500":["http://www.threatexpert.com/report.aspx?md5=04f02d7fea812ef78d2340015c5d768e"],"2015502":["http://www.symantec.com/security_response/writeup.jsp?docid=2012-071005-4515-99&tabid=2"],"2015503":["http://www.symantec.com/security_response/writeup.jsp?docid=2012-071005-4515-99&tabid=2"],"2015504":["http://www.symantec.com/security_response/writeup.jsp?docid=2012-071005-4515-99&tabid=2"],"2015505":["http://www.symantec.com/security_response/writeup.jsp?docid=2012-071005-4515-99&tabid=2"],"2015506":["http://www.symantec.com/security_response/writeup.jsp?docid=2012-071005-4515-99&tabid=2"],"2015508":["http://www.symantec.com/security_response/writeup.jsp?docid=2012-071005-4515-99&tabid=2"],"2015510":["http://www.symantec.com/security_response/writeup.jsp?docid=2012-071005-4515-99&tabid=2"],"2015511":["http://www.symantec.com/security_response/writeup.jsp?docid=2012-071005-4515-99&tabid=2"],"2015512":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3aWin32%2fBublik.B","http://www.threatexpert.com/report.aspx?md5=3ccc73f049a1de731baf7ea8915c92a8","http://www.threatexpert.com/report.aspx?md5=91ce41376a5b33059744cb58758213bb","http://www.threatexpert.com/report.aspx?md5=21880326089f2eab466128974fc70d24"],"2015524":["http://blog.unmaskparasites.com/2012/06/22/runforestrun-and-pseudo-random-domains/"],"2015527":["http://www.incapsula.com/the-incapsula-blog/item/369-was-that-really-a-google-bot-crawling-my-site","http://support.google.com/webmasters/bin/answer.py?hl=en&answer=1061943"],"2015536":["http://packetstormsecurity.org/files/107256/WordPress-Featurific-Cross-Site-Scripting.html"],"2015537":["http://packetstormsecurity.org/files/82969/Symantec-AppStream-LaunchObj-ActiveX-Control-Arbitrary-File-Download-and-Execute..html"],"2015538":["http://packetstormsecurity.org/files/83024/WinZip-FileView-WZFILEVIEW.FileViewCtrl.61-ActiveX-Buffer-Overflow.html"],"2015539":["http://packetstormsecurity.org/files/83024/WinZip-FileView-WZFILEVIEW.FileViewCtrl.61-ActiveX-Buffer-Overflow.html"],"2015540":["http://packetstormsecurity.org/files/90915/Joomla-Picasa2Gallery-1.2.8-Local-File-Inclusion.html"],"2015541":["http://packetstormsecurity.org/files/113996/Commentics-2.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"],"2015542":["http://packetstormsecurity.org/files/107255/WordPress-Clickdesk-Live-Support-Chat-Cross-Site-Scripting.html"],"2015543":["http://packetstormsecurity.org/files/114971/phpProfiles-4.5.4-Beta-XSS-RFI-SQL-Injection.html"],"2015544":["http://packetstormsecurity.org/files/114971/phpProfiles-4.5.4-Beta-XSS-RFI-SQL-Injection.html"],"2015545":["http://packetstormsecurity.org/files/94681/Joomla-PollXT-Local-File-Inclusion.html"],"2015552":["http://www.mkit.com.ar/labs/htexploit/download.php"],"2015554":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1889"],"2015555":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1889"],"2015556":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1889"],"2015557":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-1889"],"2015560":["http://sslbl.abuse.ch"],"2015562":["http://www.threatexpert.com/report.aspx?md5=cf5df13f8498326f1c6407749b3fe160"],"2015563":["http://securityfocus.com/bid/54701"],"2015564":["http://securityfocus.com/bid/54701"],"2015565":["http://securityfocus.com/bid/54759/"],"2015566":["http://packetstormsecurity.org/files/83020/America-Online-ICQ-ActiveX-Control-Arbitrary-File-Download-and-Execute..html"],"2015567":["http://packetstormsecurity.org/files/83020/America-Online-ICQ-ActiveX-Control-Arbitrary-File-Download-and-Execute..html"],"2015568":["http://packetstormsecurity.org/files/94549/Joomla-Jeformcr-Local-File-Inclusion.html"],"2015569":["http://packetstormsecurity.org/files/94540/Joomla-Basdv-Local-File-Inclusion-Directory-Traversal.html"],"2015570":["http://packetstormsecurity.org/files/95332/Joomla-MailChimpCCNewsletter-Local-File-Inclusion.html"],"2015571":["http://packetstormsecurity.org/files/113035/pragmaMx-1.12.1-Cross-Site-Scripting.html"],"2015572":["http://packetstormsecurity.org/files/115126/Temenos-T24-R07.03-Cross-Site-Scripting.html"],"2015573":["http://kahusecurity.com/2012/new-chinese-exploit-pack/"],"2015574":["http://kahusecurity.com/2012/new-chinese-exploit-pack/"],"2015575":["http://kahusecurity.com/2012/new-chinese-exploit-pack/"],"2015576":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2015577":["http://symantec.com/security_response/writeup.jsp?docid=2005-101311-0945-99&tabid=2","http://www.threatexpert.com/report.aspx?md5=d6d0cd7eca2cef5aad66efbd312a7987"],"2015588":["http://sans.org/reading_room/whitepapers/malicious/rss/_33649","http://jessekornblum.livejournal.com/284641.html","http://msdn.microsoft.com/en-us/library/windows/desktop/ms681674%28v=vs.85%29.aspx"],"2015589":["http://sans.org/reading_room/whitepapers/malicious/rss_33649","http://jessekornblum.livejournal.com/284641.html","http://msdn.microsoft.com/en-us/library/windows/desktop/ms682437%28v=vs.85%29.aspx"],"2015593":["http://blog.sucuri.net/2012/08/very-good-malware-redirection.html"],"2015594":["http://community.rapid7.com/community/infosec/blog/2012/08/08/finfisher"],"2015595":["http://community.rapid7.com/community/infosec/blog/2012/08/08/finfisher"],"2015597":["http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution"],"2015598":["http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution"],"2015599":["http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution"],"2015600":["http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution"],"2015601":["http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution"],"2015602":["http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution"],"2015606":["http://1337day.com/exploits/17395"],"2015607":["http://1337day.com/exploits/17395"],"2015608":["http://packetstormsecurity.org/files/83086/Kazaa-Altnet-Download-Manager-ActiveX-Control-Buffer-Overflow.html"],"2015609":["http://packetstormsecurity.org/files/107192/WordPress-Advanced-Text-Widget-Cross-Site-Scripting.html"],"2015610":["http://packetstormsecurity.org/files/107191/WordPress-Lanoba-Social-Cross-Site-Scripting.html"],"2015611":["http://packetstormsecurity.org/files/91171/Joomla-JE-Media-Player-Local-File-Inclusion.html"],"2015612":["http://packetstormsecurity.org/files/115381/dirLIST-0.3.0-Local-File-Inclusion.html"],"2015613":["http://packetstormsecurity.org/files/115381/dirLIST-0.3.0-Local-File-Inclusion.html"],"2015614":["http://1337day.com/exploits/18221"],"2015615":["http://1337day.com/exploits/18932"],"2015618":["http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution"],"2015623":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3aWin32%2fBublik.B","http://www.threatexpert.com/report.aspx?md5=3ccc73f049a1de731baf7ea8915c92a8","http://www.threatexpert.com/report.aspx?md5=91ce41376a5b33059744cb58758213bb","http://www.threatexpert.com/report.aspx?md5=21880326089f2eab466128974fc70d24"],"2015625":["http://www.magentocommerce.com/blog/comments/important-security-update-zend-platform-vulnerability/","http://www.magentocommerce.com/blog/update-zend-framework-vulnerability-security-update","http://www.exploit-db.com/exploits/19793/"],"2015632":["http://www.symantec.com/connect/blogs/shamoon-attacks","http://www.securelist.com/en/blog/208193786/Shamoon_the_Wiper_Copycats_at_Work","http://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/23000/PD23936/en_US/McAfee_Labs_Threat_Advisory_W32_DistTrack.pdf"],"2015636":["http://exploit-db.com/exploits/16630/"],"2015637":["http://packetstormsecurity.org/files/115479/MindTouch-Deki-Wiki-10.1.3-Local-File-Inclusion-Remote-File-Inclusion.html"],"2015638":["http://packetstormsecurity.org/files/115479/MindTouch-Deki-Wiki-10.1.3-Local-File-Inclusion-Remote-File-Inclusion.html"],"2015639":["http://packetstormsecurity.org/files/115479/MindTouch-Deki-Wiki-10.1.3-Local-File-Inclusion-Remote-File-Inclusion.html"],"2015640":["http://packetstormsecurity.org/files/115479/MindTouch-Deki-Wiki-10.1.3-Local-File-Inclusion-Remote-File-Inclusion.html"],"2015641":["http://packetstormsecurity.org/files/115479/MindTouch-Deki-Wiki-10.1.3-Local-File-Inclusion-Remote-File-Inclusion.html"],"2015642":["http://packetstormsecurity.org/files/115479/MindTouch-Deki-Wiki-10.1.3-Local-File-Inclusion-Remote-File-Inclusion.html"],"2015643":["http://exploit-db.com/exploits/16609/","http://kb.cert.org/vuls/id/179281"],"2015644":["http://exploit-db.com/exploits/16609/"],"2015645":["http://packetstormsecurity.org/files/90150/Joomla-G2Bridge-Local-File-Inclusion.html"],"2015657":["http://blog.sucuri.net/2012/08/java-zero-day-in-the-wild.html","http://metasploit.com/modules/exploit/multi/browser/java_jre17_exec"],"2015658":["http://blog.sucuri.net/2012/08/java-zero-day-in-the-wild.html","http://metasploit.com/modules/exploit/multi/browser/java_jre17_exec"],"2015671":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2992","http://www.securityfocus.com/bid/30035","http://secunia.com/advisories/29773"],"2015686":["http://www.win.tue.nl/hashclash/rogue-ca/","http://ietf.org/rfc/rfc3280.txt","http://jensign.com/JavaScience/GetTBSCert/index.html","http://luca.ntop.org/Teaching/Appunti/asn1.html","http://news.netcraft.com/archives/2012/08/31/governments-and-banks-still-using-weak-md5-signed-ssl-certificates.html"],"2015687":["http://blog.sucuri.net/2012/06/uploadify-uploadify-and-uploadify-the-new-timthumb.html"],"2015711":["http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4969"],"2015712":["http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4969"],"2015714":["http://www.threatexpert.com/report.aspx?md5=ce1cdc9c95a6808945f54164b2e4d9d2","http://secureworks.com/research/threats/the-mirage-campaign/"],"2015723":["http://sophos.com/en-us/medialibrary/PDFs/technical%20papers/Sophos_ZeroAccess_Botnet.pdf","http://malwaremustdie.blogspot.co.uk/2013/02/blackhole-of-closest-version-with.html"],"2015726":["http://www.exploit-db.com/exploits/18997/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-3574"],"2015727":["http://www.exploit-db.com/exploits/18997/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-3574"],"2015737":["http://www.phpmyadmin.net/home_page/security/PMASA-2012-5.php"],"2015743":["http://www.adobe.com/support/security/advisories/apsa12-01.html"],"2015747":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1036","http://exploit-db.com/exploits/21080/"],"2015754":["http://www.tenable.com/products/nessus/nessus-product-overview"],"2015755":["http://malwaremustdie.blogspot.jp/2012/10/how-far-phpc99shell-malware-can-go-from.html"],"2015786":["http://www.threatexpert.com/report.aspx?md5=116aaaa5765228d61501322b02a6a3b1","http://www.threatexpert.com/report.aspx?md5=2e66f39a263cb2e95425847b60ee2a93","http://www.threatexpert.com/report.aspx?md5=0ea9b34e9d77b5a4ef5170406ed1aaed"],"2015790":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0183"],"2015791":["http://www.threatexpert.com/report.aspx?md5=9fcbd8ebbbafdb0f64805f2c9a53fb7b","http://crawler.archive.org/index.html"],"2015799":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=PWS%3aWin32%2fFareit.A","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=PWS%3aWin32%2fFareit","http://www.threatexpert.com/report.aspx?md5=99fab94fd824737393f5184685e8edf2","http://www.threatexpert.com/report.aspx?md5=9544c681ae5c4fe3fdbd4d5c6c90e38e","http://www.threatexpert.com/report.aspx?md5=d50c39753ba88daa00bc40848f174168","http://www.threatexpert.com/report.aspx?md5=bf422f3aa215d896f55bbe2ebcd25d17"],"2015807":["http://www.threatexpert.com/report.aspx?md5=58ffe2b79be4e789be80f92b7f96e20c"],"2015808":["http://www.threatexpert.com/report.aspx?md5=f4b8b51b75f67e68d0c1a9639e2488c3"],"2015813":["http://www.sysenter-honeynet.org/?p=269"],"2015850":["http://www.threatexpert.com/report.aspx?md5=d4af87ba30c59d816673df165511e466","http://dea.gov.ge/uploads/CERT%20DOCS/Cyber%20Espionage.pdf"],"2015860":["http://www.threatexpert.com/report.aspx?md5=76bea2200601172ebc2374e4b418c63a"],"2015861":["http://www.threatexpert.com/report.aspx?md5=76bea2200601172ebc2374e4b418c63a"],"2015862":["http://www.ripoffreport.com/directory/rebategiant-com.aspx"],"2015870":["http://blog.fireeye.com/research/2012/11/backdooraddnew-darkddoser-and-gh0st-a-match-made-in-heaven.html","http://www.threatexpert.com/report.aspx?md5=691305b05ae75389526aa7c15b319c3b"],"2015881":["http://ondailybasis.com/blog/?p=1610"],"2015882":["http://ondailybasis.com/blog/?p=1610"],"2015940":["http://blog.sucuri.net/2012/11/psa-sftpftp-password-exposure-via-sftp-config-json.html"],"2015947":["http://blog.sucuri.net/2012/11/piwik-org-webserver-hacked-and-backdoor-added-to-piwik.html"],"2015948":["http://blog.sucuri.net/2012/11/piwik-org-webserver-hacked-and-backdoor-added-to-piwik.html"],"2015953":["http://piwik.org/blog/2012/11/security-report-piwik-org-webserver-hacked-for-a-few-hours-on-2012-nov-26th/","http://forum.piwik.org/read.php?2,97666"],"2015959":["http://www.l8security.com/post/36715280176/vu-281284-samsung-printer-snmp-backdoor"],"2015965":["http://www.trusteer.com/blog/evading-malware-researchers-shylock%E2%80%99s-new-trick"],"2015968":["http://www.threatexpert.com/report.aspx?md5=f127ed76dc5e48f69a1070f314488ce2","http://blog.trendmicro.com/trendlabs-security-intelligence/watch-out-for-worm_vobfus/"],"2015969":["http://www.threatexpert.com/report.aspx?md5=f127ed76dc5e48f69a1070f314488ce2","http://blog.trendmicro.com/trendlabs-security-intelligence/watch-out-for-worm_vobfus/"],"2015976":["http://www.threatexpert.com/report.aspx?md5=f127ed76dc5e48f69a1070f314488ce2","http://blog.trendmicro.com/trendlabs-security-intelligence/watch-out-for-worm_vobfus/","http://blog.dynamoo.com/2012/11/vobfus-sites-to-block.html"],"2015985":["http://www.threatexpert.com/report.aspx?md5=0282bc929bae27ef95733cfa390b10e0"],"2015986":["http://www.securityfocus.com/archive/1/524927/30/0/threaded"],"2015993":["http://seclists.org/fulldisclosure/2012/Dec/att-9/"],"2015995":["http://seclists.org/fulldisclosure/2012/Dec/att-13/"],"2015996":["http://seclists.org/fulldisclosure/2012/Dec/att-13/"],"2016000":["http://www.threatexpert.com/report.aspx?md5=871ecf11ddd7ffe294cab82bcaf9c310","http://blogs.technet.com/b/mmpc/archive/2012/12/06/unexpected-reboot-necurs.aspx"],"2016002":["http://packetstormsecurity.org/files/116871/ViArt-Shop-Evaluation-4.1-Remote-File-Inclusion.html"],"2016003":["http://packetstormsecurity.org/files/116871/ViArt-Shop-Evaluation-4.1-Remote-File-Inclusion.html"],"2016004":["http://packetstormsecurity.org/files/116871/ViArt-Shop-Evaluation-4.1-Remote-File-Inclusion.html"],"2016005":["http://packetstormsecurity.org/files/117822/Achievo-1.4.5-XSS-LFI-SQL-Injection.html"],"2016006":["http://packetstormsecurity.org/files/118348/PRADO-PHP-Framework-3.2.0-File-Read.html"],"2016007":["http://packetstormsecurity.org/files/118348/PRADO-PHP-Framework-3.2.0-File-Read.html"],"2016008":["http://packetstormsecurity.org/files/117683/Inventory-1.0-Cross-Site-Scripting.html"],"2016009":["http://packetstormsecurity.org/files/117683/Inventory-1.0-Cross-Site-Scripting.html"],"2016010":["http://packetstormsecurity.org/files/117683/Inventory-1.0-Cross-Site-Scripting.html"],"2016014":["http://contagiodump.blogspot.co.uk/2012/12/osxdockstera-and-win32trojanagentaxmo.html"],"2016015":["http://exchange.nagios.org/directory/Addons/Components/Graph-Explorer-Component/details"],"2016018":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-3402"],"2016033":["http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf"],"2016036":["http://packetstormsecurity.org/files/117618/SMF-2.0.2-Cross-Site-Scripting.html"],"2016037":["http://secunia.com/advisories/51346"],"2016038":["http://secunia.com/advisories/51346"],"2016039":["http://packetstormsecurity.org/files/118714/Havalite-1.1.7-Cross-Site-Scripting-Shell-Upload.html"],"2016040":["http://packetstormsecurity.org/files/118737/SimpleInvoices-2011.1-Cross-Site-Scripting.html"],"2016041":["http://packetstormsecurity.org/files/118648/NVIDIA-Install-Application-2.1002.85.551-Buffer-Overflow.html"],"2016042":["http://packetstormsecurity.org/files/116724/Manhali-1.8-Local-File-Inclusion.html"],"2016043":["http://packetstormsecurity.org/files/111164/RIPS-0.53-Local-File-Inclusion.html"],"2016044":["http://packetstormsecurity.org/files/111164/RIPS-0.53-Local-File-Inclusion.html"],"2016045":["http://packetstormsecurity.org/files/116155/Admidio-2.3.5-Cross-Site-Scripting-SQL-Injection.html"],"2016050":["http://blog.fireeye.com/research/2012/12/to-russia-with-apt.html","http://contagiodump.blogspot.co.uk/2012/12/end-of-year-presents-continue.html"],"2016065":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-3402"],"2016067":["http://abcpool.co/mining-software-comparison.php"],"2016068":["http://abcpool.co/mining-software-comparison.php"],"2016076":["http://packetstormsecurity.org/files/118466/WordPress-Video-Lead-Form-0.5-Cross-Site-Scripting.html"],"2016077":["http://packetstormsecurity.org/files/117463/Amateur-Photographers-Image-Gallery-0.9a-XSS-SQL-Injection.html"],"2016078":["http://packetstormsecurity.org/files/117463/Amateur-Photographers-Image-Gallery-0.9a-XSS-SQL-Injection.html"],"2016079":["http://packetstormsecurity.org/files/116709/SMF-2.0.2-Local-File-Inclusion.html"],"2016080":["http://packetstormsecurity.org/files/115972/WordPress-Cloudsafe365-Local-File-Inclusion.html"],"2016081":["http://packetstormsecurity.org/files/117067/Zenphoto-1.4.3.2-Cross-Site-Scripting.html"],"2016082":["http://packetstormsecurity.org/files/116837/Wordpress-Plugin-Token-Manager-Cross-Site-Scripting.html"],"2016083":["http://packetstormsecurity.org/files/116837/Wordpress-Plugin-Token-Manager-Cross-Site-Scripting.html"],"2016084":["http://packetstormsecurity.org/files/116848/HP-ALM-Remote-Code-Execution.html"],"2016085":["http://packetstormsecurity.org/files/117137/Cyme-ChartFX-Client-Server-Array-Indexing.html"],"2016086":["http://securelist.com/en/advisories/51615","http://seclists.org/bugtraq/2012/Dec/110"],"2016089":["http://www.threatexpert.com/report.aspx?md5=dd4d18c07e93c34d082dab57a38f1b86","http://www.threatexpert.com/report.aspx?md5=5a864ccfeee9c0c893cfdc35dd8820a6"],"2016094":["http://www.symantec.com/ja/jp/security_response/writeup.jsp?docid=2012-082308-1823-99&tabid=2"],"2016095":["http://contagiodump.blogspot.co.uk/2012/12/dexter-pos-infostealer-samples-and.html"],"2016100":["http://seclists.org/fulldisclosure/2012/Dec/242"],"2016109":["http://www.securityfocus.com/bid/53787/info","http://downloads.securityfocus.com/vulnerabilities/exploits/53787.php"],"2016114":["http://1337day.com/exploit/19949"],"2016115":["http://1337day.com/exploit/19949"],"2016116":["http://1337day.com/exploit/19949"],"2016117":["http://packetstormsecurity.org/files/105236/WordPress-Mailing-List-1.3.2-Remote-File-Inclusion.html"],"2016118":["http://securityfocus.com/bid/47596"],"2016119":["http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00"],"2016120":["http://packetstormsecurity.org/files/116202/Wiki-Web-Help-0.3.11-Remote-File-Inclusion.html"],"2016121":["http://packetstormsecurity.org/files/105239/WordPress-Relocate-Upload-0.14-Remote-File-Inclusion.html"],"2016122":["http://packetstormsecurity.org/files/119015/Loganalyzer-3.6.0-Cross-Site-Scripting.html"],"2016123":["http://packetstormsecurity.org/files/118400/WordPress-Myflash-Local-File-Inclusion.html"],"2016130":["http://www.symantec.com/connect/blogs/trojanstabuniq-found-financial-institution-servers","http://www.symantec.com/security_response/writeup.jsp?docid=2012-121809-2437-99&tabid=2","http://contagiodump.blogspot.com/2012/12/dec-2012-trojanstabuniq-samples.html"],"2016132":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4792","http://github.com/rapid7/metasploit-framework/commit/6cb9106218bde56fc5e8d72c66fbba9f11c24449","http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/"],"2016133":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4792","http://github.com/rapid7/metasploit-framework/commit/6cb9106218bde56fc5e8d72c66fbba9f11c24449","http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/"],"2016134":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4792","http://github.com/rapid7/metasploit-framework/commit/6cb9106218bde56fc5e8d72c66fbba9f11c24449","http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/"],"2016135":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4792","http://github.com/rapid7/metasploit-framework/commit/6cb9106218bde56fc5e8d72c66fbba9f11c24449","http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/"],"2016136":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4792","http://github.com/rapid7/metasploit-framework/commit/6cb9106218bde56fc5e8d72c66fbba9f11c24449","http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/"],"2016137":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4792","http://github.com/rapid7/metasploit-framework/commit/6cb9106218bde56fc5e8d72c66fbba9f11c24449","http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/"],"2016138":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4792","http://blog.exodusintel.com/2013/01/02/happy-new-year-analysis-of-cve-2012-4792/"],"2016139":["http://www.threatexpert.com/report.aspx?md5=3cd598e8e2fd033134d8784251eff59e"],"2016145":["http://github.com/madeye/ptunnel","http://cs.uit.no/~daniels/PingTunnel/#protocol"],"2016146":["http://github.com/madeye/ptunnel","http://cs.uit.no/~daniels/PingTunnel/#protocol"],"2016149":["http://tools.ietf.org/html/rfc5389"],"2016150":["http://tools.ietf.org/html/rfc5389"],"2016156":["http://securityfocus.com/bid/56718"],"2016157":["http://securityfocus.com/bid/57061"],"2016158":["http://secunia.com/advisories/50832"],"2016159":["http://packetstormsecurity.com/files/119240/Simple-Machines-Forum-2.0.3-Path-Disclosure.html"],"2016160":["http://packetstormsecurity.com/files/119022/Sony-PC-Companion-2.1-Load-Unicode-Buffer-Overflow.html"],"2016161":["http://packetstormsecurity.com/files/119023/Sony-PC-Companion-2.1-CheckCompatibility-Unicode-Buffer-Overflow.html"],"2016162":["http://packetstormsecurity.com/files/119024/Sony-PC-Companion-2.1-Admin_RemoveDirectory-Unicode-Buffer-Overflow.html"],"2016163":["http://packetstormsecurity.com/files/116412/SiteGo-Remote-File-Inclusion.html"],"2016164":["http://packetstormsecurity.com/files/116412/SiteGo-Remote-File-Inclusion.html"],"2016165":["http://securityfocus.com/bid/57064"],"2016167":["http://www.threatexpert.com/report.aspx?md5=62f20326e0f08c0786df6886f0427ea7"],"2016168":["http://www.threatexpert.com/report.aspx?md5=62f20326e0f08c0786df6886f0427ea7"],"2016170":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4792","http://github.com/rapid7/metasploit-framework/commit/6cb9106218bde56fc5e8d72c66fbba9f11c24449","http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/"],"2016175":["http://groups.google.com/forum/?hl=en&fromgroups=#!topic/rubyonrails-security/61bkgvnSGTQ"],"2016176":["http://groups.google.com/forum/?hl=en&fromgroups=#!topic/rubyonrails-security/61bkgvnSGTQ"],"2016178":["http://www.securityfocus.com/bid/2112","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0517"],"2016179":["http://www.securityfocus.com/bid/2112","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0517"],"2016181":["http://www.securityfocus.com/bid/2112","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0517"],"2016182":["http://www.adobe.com/support/security/advisories/apsa13-01.html"],"2016183":["http://www.adobe.com/support/security/advisories/apsa13-01.html"],"2016184":["http://www.adobe.com/support/security/advisories/apsa13-01.html"],"2016186":["http://blog.fireeye.com/research/2013/01/happy-new-year-from-new-java-zero-day.html"],"2016187":["http://blog.fireeye.com/research/2013/01/happy-new-year-from-new-java-zero-day.html"],"2016194":["http://packetstormsecurity.com/files/119360/WordPress-NextGEN-Gallery-1.9.10-Cross-Site-Scripting.html"],"2016195":["http://secunia.com/advisories/51739/"],"2016196":["http://kb.cert.org/vuls/id/950172"],"2016197":["http://packetstormsecurity.com/files/119427/Honeywell-Tema-Remote-Installer-ActiveX-Remote-Code-Execution.html"],"2016198":["http://packetstormsecurity.com/files/119385/Free-Blog-1.0-Shell-Upload-Arbitrary-File-Deletion.html"],"2016199":["http://secunia.com/advisories/51816/"],"2016200":["http://securityfocus.com/bid/57230/"],"2016201":["http://securityfocus.com/bid/57230/"],"2016202":["http://securityfocus.com/bid/57230/"],"2016203":["http://securityfocus.com/bid/57256/"],"2016204":["http://groups.google.com/forum/?hl=en&fromgroups=#!topic/rubyonrails-security/61bkgvnSGTQ"],"2016205":["http://thegoldenmessenger.blogspot.de/2012/09/2-disclosure-of-interesting-botnet-part-1.html","http://thegoldenmessenger.blogspot.de/2012/09/2-disclosure-of-interesting-botnet-part-2.html"],"2016206":["http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Iyus-H/detailed-analysis.aspx"],"2016207":["http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Iyus-H/detailed-analysis.aspx"],"2016208":["http://www.f-secure.com/v-descs/backdoor_w32_hupigon.shtml"],"2016209":["http://www.symantec.com/connect/blogs/androidcoolpaperleak-million-download-baby"],"2016210":["http://blogs.mcafee.com/mcafee-labs/red-kit-an-emerging-exploit-pack","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0188"],"2016214":["http://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation"],"2016215":["http://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation"],"2016216":["http://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation"],"2016217":["http://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation"],"2016218":["http://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation"],"2016219":["http://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation"],"2016220":["http://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation"],"2016223":["http://www.threatexpert.com/report.aspx?md5=41c33fdb9a95353a3b109393543f90dd"],"2016230":["http://securityfocus.com/bid/51357/"],"2016231":["http://packetstormsecurity.com/files/117370/Cartweaver-3-Local-File-Inclusion.html"],"2016232":["http://packetstormsecurity.com/files/118943/Joomla-Bit-Local-File-Inclusion.html"],"2016233":["http://packetstormsecurity.com/files/118944/Joomla-ZtAutoLink-Local-File-Inclusion.html"],"2016234":["http://packetstormsecurity.com/files/116148/Mu-Perspectives-CMS-Cross-Site-Scripting.html"],"2016235":["http://packetstormsecurity.com/files/117293/KeyHelp-ActiveX-LaunchTriPane-Remote-Code-Execution.html"],"2016236":["http://packetstormsecurity.com/files/117293/KeyHelp-ActiveX-LaunchTriPane-Remote-Code-Execution.html"],"2016237":["http://packetstormsecurity.com/files/119423/Samsung-Kies-2.5.0.12114_1-Buffer-Overflow.html"],"2016238":["http://packetstormsecurity.com/files/119364/Joomla-Incapsula-1.4.6_b-Cross-Site-Scripting.html"],"2016239":["http://packetstormsecurity.com/files/119364/Joomla-Incapsula-1.4.6_b-Cross-Site-Scripting.html"],"2016251":["http://www.threatexpert.com/report.aspx?md5=49205774f0ff7605c226828e080238f3","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDropper%3AWin32%2FEmold.C"],"2016254":["http://malware.dontneedcoffee.com/"],"2016255":["http://malware.dontneedcoffee.com/"],"2016270":["http://blog.avast.com/2013/01/22/reporters-without-borders-website-misused-in-wateringhole-attack/"],"2016271":["http://blog.avast.com/2013/01/22/reporters-without-borders-website-misused-in-wateringhole-attack/"],"2016273":["http://about-threats.trendmicro.com/Malware.aspx?id=50100&name=TROJ_DLOADR.BKM&language=au"],"2016274":["http://about-threats.trendmicro.com/Malware.aspx?id=50100&name=TROJ_DLOADR.BKM&language=au"],"2016275":["http://threatexpert.com/report.aspx?md5=f45b1b82c849fbbea3374ae7e9200092"],"2016282":["http://packetstormsecurity.com/files/115284/Openconstructor-CMS-3.12.0-Reflected-XSS.html"],"2016283":["http://packetstormsecurity.com/files/115284/Openconstructor-CMS-3.12.0-Reflected-XSS.html"],"2016284":["http://packetstormsecurity.com/files/119082/CubeCart-4.4.6-Local-File-Inclusion.html"],"2016285":["http://packetstormsecurity.com/files/115302/GetSimple-CMS-3.1.2-Local-File-Inclusion-Path-Disclosure.html"],"2016286":["http://exploit-db.com/exploits/24319/"],"2016287":["http://packetstormsecurity.com/files/118964/Banana-Dance-B.2.6-Inclusion-Access-Control-SQL-Injection.html"],"2016288":["http://exploit-db.com/exploits/24228/"],"2016289":["http://packetstormsecurity.com/files/115886/Web-Wiz-Forums-10.03-Cross-Site-Scripting.html"],"2016290":["http://packetstormsecurity.com/files/115886/Web-Wiz-Forums-10.03-Cross-Site-Scripting.html"],"2016291":["http://cxsecurity.com/issue/WLB-2013010179"],"2016300":["http://www.threatexpert.com/report.aspx?md5=10642e1067aca9f04ca874c02aabda5c"],"2016302":["http://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play","http://upnp.org/specs/arch/UPnP-arch-DeviceArchitecture-v1.1.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0229"],"2016303":["http://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play","http://upnp.org/specs/arch/UPnP-arch-DeviceArchitecture-v1.1.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-5958","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-5959"],"2016304":["http://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play","http://upnp.org/specs/arch/UPnP-arch-DeviceArchitecture-v1.1.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-5958","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-5959"],"2016305":["http://gist.github.com/4660248"],"2016312":["http://www.securelist.com/en/descriptions/15316120/Trojan.Win32.Agent.fajk"],"2016313":["http://www.securelist.com/en/descriptions/15316120/Trojan.Win32.Agent.fajk"],"2016314":["http://blog.eset.com/2013/01/24/linux-sshdoor-a-backdoored-ssh-daemon-that-steals-passwords"],"2016316":["http://www.securelist.com/en/descriptions/24621847/Trojan-Dropper.Win32.StartPage.eba"],"2016318":["http://www.threatexpert.com/report.aspx?md5=e6d9776113b29680aec73ac2d1445946","http://www.threatexpert.com/report.aspx?md5=13e6ce4aac7e60b10bfde091c09b9d88","http://anubis.iseclab.org/?action=result&task_id=16b7814b794cd728435e122ca2c2fcdd3","http://www.fortiguard.com/latest/mobile/4158213","http://symantec.com/connect/blogs/mdk-largest-mobile-botnet-china"],"2016322":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE_2012-5958","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5962"],"2016323":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5963"],"2016324":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5964"],"2016325":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5965"],"2016326":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5961"],"2016329":["http://anubis.iseclab.org/?action=result&task_id=19f379c075627c7b44d0a0db154394f63"],"2016330":["http://anubis.iseclab.org/?action=result&task_id=19f379c075627c7b44d0a0db154394f63"],"2016331":["http://blog.eset.com/2013/01/30/walking-through-win32jabberbot-a-instant-messaging-cc"],"2016334":["http://securityfocus.com/bid/51721/"],"2016335":["http://securityfocus.com/bid/51721/"],"2016336":["http://securityfocus.com/bid/51721/"],"2016337":["http://securityfocus.com/bid/57541/"],"2016338":["http://securityfocus.com/bid/57541/"],"2016339":["http://securityfocus.com/bid/56132/"],"2016340":["http://securityfocus.com/bid/56132/"],"2016342":["http://blog.fireeye.com/research/2013/02/operation-beebus.html"],"2016343":["http://blog.trustgo.com/fakelookout/","http://www.threatexpert.com/report.aspx?md5=65baecf1fe1ec7b074a5255dc5014beb"],"2016344":["http://www.threatexpert.com/report.aspx?md5=7dec1c9174d0f688667f6c34c0fa66c2","http://blog.fortiguard.com/android-malware-distributed-by-malicious-sms-in-france/"],"2016352":["http://malwaremustdie.blogspot.co.uk/2013/02/the-infection-of-styx-exploit-kit.html"],"2016353":["http://malwaremustdie.blogspot.co.uk/2013/02/the-infection-of-styx-exploit-kit.html"],"2016363":["http://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play","http://upnp.org/specs/arch/UPnP-arch-DeviceArchitecture-v1.1.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0229"],"2016364":["http://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play","http://upnp.org/specs/arch/UPnP-arch-DeviceArchitecture-v1.1.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0230"],"2016366":["http://malware.dontneedcoffee.com/2013/02/inside-multi-botnet-ver4-c-panel.html"],"2016367":["http://malware.dontneedcoffee.com/2013/02/inside-multi-botnet-ver4-c-panel.html"],"2016368":["http://malware.dontneedcoffee.com/2013/02/inside-multi-botnet-ver4-c-panel.html"],"2016369":["http://malware.dontneedcoffee.com/2013/02/inside-multi-botnet-ver4-c-panel.html"],"2016370":["http://malware.dontneedcoffee.com/2013/02/inside-multi-botnet-ver4-c-panel.html"],"2016381":["http://secunia.com/advisories/51707/"],"2016382":["http://1337day.org/exploit/15398"],"2016383":["http://packetstormsecurity.com/files/120129/WordPress-Audio-Player-SWF-Cross-Site-Scripting.html"],"2016384":["http://securityfocus.com/bid/57771/"],"2016388":["http://securityfocus.com/bid/57845/"],"2016389":["http://securityfocus.com/bid/57845/"],"2016390":["http://packetstormsecurity.com/files/120045/Glossword-1.8.12-XSS-CSRF-Shell-Upload-Database-Disclosure.html"],"2016391":["http://www.threatexpert.com/report.aspx?md5=3de314089db35af9baaeefc598f09b23","http://www.threatexpert.com/report.aspx?md5=2568615875525003688839cb8950aeae","http://blog.fireeye.com/research/2013/02/lady-boyle-comes-to-town-with-a-new-exploit.html","http://www.adobe.com/go/apsb13-04","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0633","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0633"],"2016398":["http://www.threatexpert.com/report.aspx?md5=81687637b7bf2b90258a5006683e781c","http://www.fireeye.com/blog/technical/cyber-exploits/2013/08/the-sunshop-campaign-continues.html"],"2016399":["http://www.securelist.com/en/blog/798/God_horses_are_floating_clouds_The_story_of_a_Chinese_banker_Trojan"],"2016400":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0634"],"2016401":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0364"],"2016409":["http://blog.fireeye.com/research/2013/02/the-number-of-the-beast.html"],"2016410":["http://blog.fireeye.com/research/2013/02/the-number-of-the-beast.html"],"2016411":["http://www.joesecurity.org/reports/report-f3b9663a01a73c5eca9d6b2a0519049e.html"],"2016415":["http://blog.spiderlabs.com/2013/02/honeypot-alert-user-agent-field-php-injection-attacks.html"],"2016416":["http://blog.spiderlabs.com/2013/02/honeypot-alert-user-agent-field-php-injection-attacks.html"],"2016417":["http://www.lavasoft.com/mylavasoft/malware-descriptions/blog/trojandownloaderwin32vundojd"],"2016418":["http://virustracker.info"],"2016420":["http://virustracker.info"],"2016421":["http://virustracker.info"],"2016422":["http://virustracker.info"],"2016423":["http://virustracker.info"],"2016424":["http://www.threatexpert.com/report.aspx?md5=8840a0d9d7f4dba3953ccb68b17b2d6c","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3AWin32%2FVundo.OD"],"2016425":["http://www.threatexpert.com/report.aspx?md5=e8e3d22203f9549d6c5f361dfe51f8c6"],"2016431":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=5bcaa2f4bc7567f6ffd5507a161e221a"],"2016432":["http://www.threatexpert.com/report.aspx?md5=95d85aa629a786bb67439a064c4349ec"],"2016433":["http://www.threatexpert.com/report.aspx?md5=b5e9ce72771217680efaeecfafe3da3f","http://threatexpert.com/report.aspx?md5=4b6f5e62d7913fc1ab6c71b5b909ecbf"],"2016434":["http://www.mandiant.com/apt1"],"2016435":["http://www.threatexpert.com/report.aspx?md5=7a7a46e8fbc25a624d58e897dee04ffa","http://www.threatexpert.com/report.aspx?md5=110160e9d6e1483192653d4bfdcbb609","http://www.mandiant.com/apt1"],"2016436":["http://www.threatexpert.com/report.aspx?md5=7a7a46e8fbc25a624d58e897dee04ffa","http://www.threatexpert.com/report.aspx?md5=110160e9d6e1483192653d4bfdcbb609","http://www.mandiant.com/apt1"],"2016437":["http://www.threatexpert.com/report.aspx?md5=7a7a46e8fbc25a624d58e897dee04ffa","http://www.threatexpert.com/report.aspx?md5=110160e9d6e1483192653d4bfdcbb609","http://www.mandiant.com/apt1"],"2016438":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=7a7a46e8fbc25a624d58e897dee04ffa","http://www.threatexpert.com/report.aspx?md5=110160e9d6e1483192653d4bfdcbb609"],"2016439":["http://www.threatexpert.com/report.aspx?md5=a2cd1189860b9ba214421aab86ecbc8a","http://www.mandiant.com/apt1"],"2016440":["http://www.threatexpert.com/report.aspx?md5=5e0df5b28a349d46ac8cc7d9e5e61a96","http://www.mandiant.com/apt1"],"2016441":["http://www.threatexpert.com/report.aspx?md5=5e0df5b28a349d46ac8cc7d9e5e61a96","http://www.mandiant.com/apt1"],"2016442":["http://www.threatexpert.com/report.aspx?md5=5e0df5b28a349d46ac8cc7d9e5e61a96","http://www.mandiant.com/apt1"],"2016443":["http://www.threatexpert.com/report.aspx?md5=8442ae37b91f279a9f06de4c60b286a3","http://www.mandiant.com/apt1"],"2016444":["http://www.threatexpert.com/report.aspx?md5=8442ae37b91f279a9f06de4c60b286a3","http://www.mandiant.com/apt1"],"2016445":["http://www.threatexpert.com/report.aspx?md5=052f5da1734464a985dcd669bff62f93","http://www.mandiant.com/apt1"],"2016446":["http://www.cyberesi.com/2011/06/15/trojan-letsgo-analysis/","http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=052ec04866e4a67f31845d656531830d"],"2016447":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=7acb0d1df51706536f33bbdb990041d3"],"2016448":["http://www.mandiant.com/apt1"],"2016449":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=0cf9e999c574ec89595263446978dc9f","http://www.threatexpert.com/report.aspx?md5=0cf9e999c574ec89595263446978dc9f"],"2016450":["http://threatexpert.com/report.aspx?md5=4b6f5e62d7913fc1ab6c71b5b909ecbf"],"2016451":["http://intelreport.mandiant.com","http://www.threatexpert.com/report.aspx?md5=0cf9e999c574ec89595263446978dc9f","http://www.threatexpert.com/report.aspx?md5=fcdaa67e33357f64bc4ce7b57491fc53"],"2016452":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=29c691978af80dc23c4df96b5f6076bb"],"2016453":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=29c691978af80dc23c4df96b5f6076bb"],"2016454":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=1e5ec6c06e4f6bb958dcbb9fc636009d"],"2016455":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=b5e9ce72771217680efaeecfafe3da3f"],"2016456":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=ec3a2197ca6b63ee1454d99a6ae145ab"],"2016457":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=ec3a2197ca6b63ee1454d99a6ae145ab"],"2016458":["http://www.mandiant.com/apt1","http://www.threatexpert.com/report.aspx?md5=5bcaa2f4bc7567f6ffd5507a161e221a"],"2016459":["http://www.threatexpert.com/report.aspx?md5=ba45339da92ca4622b472ac458f4c8f2","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AWin32%2FSmall.XR","http://www.mandiant.com/apt1"],"2016460":["http://www.threatexpert.com/report.aspx?md5=ba45339da92ca4622b472ac458f4c8f2","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=TrojanDownloader%3AWin32%2FSmall.XR","http://intelreport.mandiant.com/","http://www.threatexpert.com/report.aspx?md5=8dd6a7fe83bd9682187d956f160ffb47"],"2016461":["http://www.securelist.com/en/descriptions/24052976/Trojan.Win32.Scar.ddxe","http://www.threatexpert.com/report.aspx?md5=0149b7bd7218aab4e257d28469fddb0d","http://www.threatexpert.com/report.aspx?md5=6f9992c486195edcf0bf2f6ee6c3ec74","http://www.mandiant.com/apt1"],"2016462":["http://www.mandiant.com/apt1"],"2016463":["http://www.mandiant.com/apt1"],"2016464":["http://www.mandiant.com/apt1"],"2016465":["http://www.mandiant.com/apt1"],"2016466":["http://www.mandiant.com/apt1"],"2016467":["http://www.mandiant.com/apt1"],"2016468":["http://www.mandiant.com/apt1"],"2016469":["http://www.mandiant.com/apt1"],"2016470":["http://www.mandiant.com/apt1"],"2016471":["http://www.mandiant.com/apt1"],"2016472":["http://www.threatexpert.com/report.aspx?md5=ae45648a8fc01b71214482d35cf8da54","http://www.mandiant.com/apt1"],"2016498":["http://malwaremustdie.blogspot.co.uk/2013/02/the-infection-of-styx-exploit-kit.html","http://www.threatexpert.com/report.aspx?md5=9a17d72f6234a1dc930ffe6b1681504c"],"2016507":["http://www.welivesecurity.com/2013/02/25/caphaw-attacking-major-european-banks-with-webinject-plugin/"],"2016508":["http://www.welivesecurity.com/2013/02/25/caphaw-attacking-major-european-banks-with-webinject-plugin/"],"2016512":["http://blogs.mcafee.com/mcafee-labs/sms-trojan-targets-south-korean-android-devices"],"2016513":["http://blogs.mcafee.com/mcafee-labs/sms-trojan-targets-south-korean-android-devices"],"2016519":["http://community.rapid7.com/community/metasploit/blog/2013/03/04/new-heap-spray-technique-for-metasploit-browser-exploitation"],"2016527":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-asprox-reborn.pdf"],"2016528":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-asprox-reborn.pdf"],"2016529":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-asprox-reborn.pdf"],"2016530":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-asprox-reborn.pdf"],"2016531":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-asprox-reborn.pdf"],"2016533":["http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AMSIL%2FCrime.B"],"2016534":["http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AMSIL%2FCrime.B"],"2016535":["http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AMSIL%2FCrime.B"],"2016536":["http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AMSIL%2FCrime.B"],"2016542":["http://ondailybasis.com/blog/?p=1867"],"2016543":["http://ondailybasis.com/blog/?p=1867"],"2016546":["http://www.symantec.com/security_response/writeup.jsp?docid=2012-061213-2441-99"],"2016550":["http://www.threatexpert.com/report.aspx?md5=10baa5250610fc2b5b2cdf932f2007c0"],"2016552":["http://www.abuse.ch/?p=5175","http://www.virusradar.com/Win32_Trustezeb.C/description"],"2016553":["http://www.threatexpert.com/report.aspx?md5=09462f13d7e6aaa0bff2788158343829","http://www.threatexpert.com/report.aspx?md5=b18f80d665f340af91003226a2b974b6","http://www.threatexpert.com/report.aspx?md5=1494b8b9f42753a4bc1762d8f3287db6"],"2016560":["http://kahusecurity.com/2012/new-chinese-exploit-pack/"],"2016567":["http://www.threatexpert.com/report.aspx?md5=09462f13d7e6aaa0bff2788158343829","http://www.threatexpert.com/report.aspx?md5=b18f80d665f340af91003226a2b974b6","http://www.threatexpert.com/report.aspx?md5=1494b8b9f42753a4bc1762d8f3287db6"],"2016568":["http://www.fireeye.com/blog/technical/targeted-attack/2013/03/the-dingo-and-the-baby.html"],"2016569":["http://labs.alienvault.com"],"2016570":["http://labs.alienvault.com"],"2016571":["http://labs.alienvault.com"],"2016572":["http://labs.alienvault.com"],"2016573":["http://labs.alienvault.com"],"2016578":["http://www.threatexpert.com/report.aspx?md5=3452c20fd0df69ccfdea520a6515208a"],"2016579":["http://labs.alienvault.com/labs/index.php/2013/latest-adobe-pdf-exploit-used-to-target-uyghur-and-tibetan-activists/"],"2016586":["http://www.vpngate.net"],"2016596":["http://doc.emergingthreats.net/2008175"],"2016599":["http://www.threatexpert.com/report.aspx?md5=fea70e818984b82c9a6bbdc5157d4a40","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3aWin32%2fXtrat.A"],"2016638":["http://www.fireeye.com/blog/technical/targeted-attack/2013/03/internet-explorer-8-exploit-found-in-watering-hole-campaign-targeting-chinese-dissidents.html","http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanDownloader%3AWin32%2FDepyot.A&ThreatID=-2147288740"],"2016639":["http://www.fireeye.com/blog/technical/targeted-attack/2013/03/internet-explorer-8-exploit-found-in-watering-hole-campaign-targeting-chinese-dissidents.html"],"2016640":["http://www.fireeye.com/blog/technical/targeted-attack/2013/03/internet-explorer-8-exploit-found-in-watering-hole-campaign-targeting-chinese-dissidents.html"],"2016641":["http://isc.sans.edu/diary.html?storyid=9478"],"2016642":["http://isc.sans.edu/diary.html?storyid=9478"],"2016644":["http://twitter.com/kafeine/status/314859973064667136/photo/1"],"2016645":["http://twitter.com/kafeine/status/314859973064667136/photo/1"],"2016656":["http://blog.crowdstrike.com/whois-anchor-panda/index.html"],"2016659":["http://blog.crowdstrike.com/whois-anchor-panda/index.html"],"2016660":["http://blog.crowdstrike.com/whois-anchor-panda/index.html"],"2016685":["http://www.threatexpert.com/report.aspx?md5=90f8b934c541966aede75094cfef27ed","http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=VirTool%3AWin32%2FDelfInject"],"2016690":["http://www.botnets.fr/index.php/Kovter","http://www.threatexpert.com/report.aspx?md5=82d0e4f8b34d6d39ee4ff59d0816ec05"],"2016697":["http://www.threatexpert.com/report.aspx?md5=fd95cc0bb7d3ea5a0c86d45570df5228","http://www.threatexpert.com/report.aspx?md5=09330c596a33689a610a1b183a651118"],"2016698":["http://www.threatexpert.com/report.aspx?md5=145c06300d61b3a0ce2c944fe7cdcb96"],"2016699":["http://www.threatexpert.com/report.aspx?md5=d929747212309559cb702dd062fb3e5d"],"2016700":["http://www.threatexpert.com/report.aspx?md5=de1bc32ad135b14ad3a5cf72566a63ff"],"2016701":["http://www.threatexpert.com/report.aspx?md5=450dbe96d7f4108474071aca5826fc43"],"2016702":["http://www.threatexpert.com/report.aspx?md5=21a069667a6dba38f06765e414e48824"],"2016703":["http://www.threatexpert.com/report.aspx?md5=ea3dec87f79ff97512c637a5c8868a7e"],"2016707":["http://www.threatexpert.com/report.aspx?md5=539d3b15e9c3882ac70bb1ac7f90a837"],"2016710":["http://www.threatexpert.com/report.aspx?md5=e94fb19f3a38f9b2a775b925e4c0abe3"],"2016711":["http://citizenlab.org/2013/04/permission-to-spy-an-analysis-of-android-malware-targeting-tibetans/"],"2016713":["http://www.fireeye.com/blog/technical/malware-research/2013/04/trojan-apt-banechant-in-memory-trojan-that-observes-for-multiple-mouse-clicks.html"],"2016716":["http://blog.sucuri.net/2013/02/web-server-compromise-debian-distro-identify-and-remove-corrupt-apache-modules.html"],"2016717":["http://blog.sucuri.net/2013/02/web-server-compromise-debian-distro-identify-and-remove-corrupt-apache-modules.html"],"2016718":["http://blog.sucuri.net/2013/02/web-server-compromise-debian-distro-identify-and-remove-corrupt-apache-modules.html"],"2016719":["http://blog.sucuri.net/2013/02/web-server-compromise-debian-distro-identify-and-remove-corrupt-apache-modules.html"],"2016727":["http://www.fireeye.com/blog/technical/malware-research/2013/04/trojan-apt-banechant-in-memory-trojan-that-observes-for-multiple-mouse-clicks.html"],"2016728":["http://www.fireeye.com/blog/technical/malware-research/2013/04/trojan-apt-banechant-in-memory-trojan-that-observes-for-multiple-mouse-clicks.html"],"2016731":["http://www.botnets.fr/index.php/Revoyem"],"2016732":["http://www.botnets.fr/index.php/Revoyem"],"2016737":["http://kahusecurity.com/2012/new-chinese-exploit-pack/"],"2016738":["http://malwaremustdie.blogspot.co.uk/2013/04/wireshark-analysis-of-citadel-trojan.html","http://seifreed.es/docs/Citadel%20Trojan%20Report_eng.pdf"],"2016739":["http://malwaremustdie.blogspot.co.uk/2013/04/wireshark-analysis-of-citadel-trojan.html","http://seifreed.es/docs/Citadel%20Trojan%20Report_eng.pdf"],"2016740":["http://malwaremustdie.blogspot.co.uk/2013/04/wireshark-analysis-of-citadel-trojan.html","http://seifreed.es/docs/Citadel%20Trojan%20Report_eng.pdf"],"2016741":["http://malwaremustdie.blogspot.co.uk/2013/04/wireshark-analysis-of-citadel-trojan.html","http://seifreed.es/docs/Citadel%20Trojan%20Report_eng.pdf"],"2016742":["http://malwaremustdie.blogspot.co.uk/2013/04/wireshark-analysis-of-citadel-trojan.html","http://seifreed.es/docs/Citadel%20Trojan%20Report_eng.pdf"],"2016743":["http://malwaremustdie.blogspot.co.uk/2013/04/wireshark-analysis-of-citadel-trojan.html","http://seifreed.es/docs/Citadel%20Trojan%20Report_eng.pdf"],"2016768":["http://microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Worm%3AWin32/Dorkbot.AR","http://www.threatexpert.com/report.aspx?md5=7e76c7db8706511fc59508af4aef27fa"],"2016769":["http://www.threatexpert.com/report.aspx?md5=2642999a085443e9055b292c4d405e64","http://www.threatexpert.com/report.aspx?md5=37066ed52cd7510bf04808c332599f1c","http://www.seculert.com/blog/2013/04/magic-persistent-threat.html"],"2016770":["http://www.threatexpert.com/report.aspx?md5=2642999a085443e9055b292c4d405e64","http://www.threatexpert.com/report.aspx?md5=37066ed52cd7510bf04808c332599f1c","http://www.seculert.com/blog/2013/04/magic-persistent-threat.html"],"2016771":["http://www.threatexpert.com/report.aspx?md5=2642999a085443e9055b292c4d405e64","http://www.threatexpert.com/report.aspx?md5=37066ed52cd7510bf04808c332599f1c","http://www.seculert.com/blog/2013/04/magic-persistent-threat.html"],"2016772":["http://www.threatexpert.com/report.aspx?md5=2642999a085443e9055b292c4d405e64","http://www.threatexpert.com/report.aspx?md5=37066ed52cd7510bf04808c332599f1c","http://www.seculert.com/blog/2013/04/magic-persistent-threat.html"],"2016773":["http://fireeye.com/blog/technical/malware-research/2013/04/the-mutter-backdoor-operation-beebus-with-new-targets.html"],"2016780":["http://www.threatexpert.com/report.aspx?md5=38f61d046e575971ed83c4f71accd132"],"2016792":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1557"],"2016793":["http://welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/"],"2016794":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2016795":["http://blog.trendmicro.com/trendlabs-security-intelligence/targeted-attack-campaign-hides-behind-ssl-communication/"],"2016796":["http://immunityproducts.blogspot.fr/2013/04/yet-another-java-security-warning-bypass.html"],"2016797":["http://immunityproducts.blogspot.fr/2013/04/yet-another-java-security-warning-bypass.html"],"2016806":["http://uscyberlabs.com/blog/2013/04/30/tor-exploit-pak/"],"2016808":["http://www.threatexpert.com/report.aspx?md5=840BD11343D140916F45223BA05ABACB"],"2016809":["http://www.threatexpert.com/report.aspx?md5=09462f13d7e6aaa0bff2788158343829","http://www.threatexpert.com/report.aspx?md5=b18f80d665f340af91003226a2b974b6","http://www.threatexpert.com/report.aspx?md5=1494b8b9f42753a4bc1762d8f3287db6"],"2016810":["http://uscyberlabs.com/blog/2013/04/30/tor-exploit-pak/"],"2016814":["http://welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/"],"2016815":["http://welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/"],"2016817":["http://immunityproducts.blogspot.fr/2013/04/yet-another-java-security-warning-bypass.html"],"2016818":["http://immunityproducts.blogspot.fr/2013/04/yet-another-java-security-warning-bypass.html"],"2016819":["http://labs.alienvault.com/labs/index.php/2013/u-s-department-of-labor-website-hacked-and-redirecting-to-malicious-code/","http://crowdstrike.com/sites/default/files/AdversaryIntelligenceReport_DeepPanda_0.pdf"],"2016820":["http://labs.alienvault.com/labs/index.php/2013/u-s-department-of-labor-website-hacked-and-redirecting-to-malicious-code/","http://crowdstrike.com/sites/default/files/AdversaryIntelligenceReport_DeepPanda_0.pdf"],"2016821":["http://labs.alienvault.com/labs/index.php/2013/u-s-department-of-labor-website-hacked-and-redirecting-to-malicious-code/","http://crowdstrike.com/sites/default/files/AdversaryIntelligenceReport_DeepPanda_0.pdf"],"2016822":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1347","http://labs.alienvault.com/labs/index.php/2013/u-s-department-of-labor-website-hacked-and-redirecting-to-malicious-code/","http://technet.microsoft.com/en-us/security/advisory/2847140"],"2016823":["http://dev.opera.com/articles/view/opera-ua-string-changes","http://blog.avast.com/2013/05/03/regents-of-louisiana-spreading-sirefef-malware"],"2016824":["http://community.rapid7.com/community/metasploit/blog/2013/03/04/new-heap-spray-technique-for-metasploit-browser-exploitation"],"2016831":["http://weblog.ikvm.net/CommentView.aspx?guid=acd2dd6d-1028-4996-95df-efa42ac237f0"],"2016833":["http://blog.exodusintel.com/2013/01/02/happy-new-year-analysis-of-cve-2012-4792/"],"2016835":["http://redteam-pentesting.de/de/advisories/rt-sa-2013-001/-exim-with-dovecot-typical-misconfiguration-leads-to-remote-command-execution"],"2016836":["http://cxsecurity.com/issue/WLB-2013050065"],"2016837":["http://blog.spiderlabs.com/2013/05/alina-shedding-some-light-on-this-malware-family.html"],"2016838":["http://blog.spiderlabs.com/2013/05/alina-shedding-some-light-on-this-malware-family.html"],"2016841":["http://www.exploit-db.com/exploits/25305/"],"2016842":["http://exploit-db.com/exploits/24946/"],"2016843":["http://exploit-db.com/exploits/24946/"],"2016844":["http://threatexpert.com/report.aspx?md5=c4e923564c564163620959f23691cc26","http://www.threatexpert.com/report.aspx?md5=4a77d3575845cf24b72400816d0b95c2"],"2016845":["http://www.vanheusden.com/httping/"],"2016846":["http://research.zscaler.com/2012/09/how-to-install-silently-malicious.html"],"2016847":["http://blogs.technet.com/b/mmpc/archive/2013/05/10/browser-extension-hijacks-facebook-profiles.aspx"],"2016849":["http://microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Worm%3AWin32/Dorkbot.AR","http://www.threatexpert.com/report.aspx?md5=dd05fcd2368d8d410a5b85e8d504a435"],"2016850":["http://code.google.com/p/malware-lu/wiki/en_malware_cdorked_A","http://welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/"],"2016854":["http://research.zscaler.com/2013/03/guess-who-am-i-pe-or-apk.html"],"2016855":["http://research.zscaler.com/2013/03/guess-who-am-i-pe-or-apk.html"],"2016856":["http://source.android.com/tech/dalvik/dex-format.html"],"2016861":["http://www.threatexpert.com/report.aspx?md5=023d82950ebec016cd4016d7a11be58d","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016862":["http://www.threatexpert.com/report.aspx?md5=0b38f87841ed347cc2a5ffa510a1c8f6","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016863":["http://www.threatexpert.com/report.aspx?md5=0cace87b377a00df82839c659fc3adea","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016864":["http://www.threatexpert.com/report.aspx?md5=06ba10a49c8cea32a51f0bbe8f5073f1","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016865":["http://www.threatexpert.com/report.aspx?md5=0e9e46d068fea834e12b2226cc8969fd","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016866":["http://www.threatexpert.com/report.aspx?md5=078d12eb9fc2b1665c0cc3001448b69b","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016881":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016882":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016883":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016884":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016885":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016886":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016887":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016888":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016891":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016892":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016893":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016894":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016895":["http://blogs.rsa.com/dont-fear-the-hangover-network-detection-of-hangover-malware-samples","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016897":["http://windows.microsoft.com/en-us/internet-explorer/products/ie-9/system-requirements"],"2016899":["http://ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-delphi/"],"2016902":["http://ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-delphi/"],"2016903":["http://www.virustotal.com/en/file/93236b781e147e3ac983be1374a5f807fabd27ee2b92e6d99e293a6eb070ac2b/analysis/","http://www.threatexpert.com/report.aspx?md5=0da0d8e664f44400c19898b4c9e71456"],"2016904":["http://chilkatsoft.com"],"2016905":["http://virustotal.com/en/file/93236b781e147e3ac983be1374a5f807fabd27ee2b92e6d99e293a6eb070ac2b/analysis/","http://www.threatexpert.com/report.aspx?md5=0da0d8e664f44400c19898b4c9e71456"],"2016906":["http://virustotal.com/en/file/93236b781e147e3ac983be1374a5f807fabd27ee2b92e6d99e293a6eb070ac2b/analysis/","http://www.threatexpert.com/report.aspx?md5=0da0d8e664f44400c19898b4c9e71456"],"2016909":["http://ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-delphi/"],"2016910":["http://ddos.arbornetworks.com/2013/05/the-revolution-will-be-written-in-delphi/"],"2016911":["http://www.fireeye.com/blog/technical/cyber-exploits/2013/05/ready-for-summer-the-sunshop-campaign.html","http://citizenlab.org/wp-content/uploads/2012/09/IEXPL0RE_RAT.pdf","http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PWS%3AWin32%2FBriba.A"],"2016912":["http://www.threatexpert.com/report.aspx?md5=eddce1a6c0cc0eb7b739cb758c516975","http://www.threatexpert.com/report.aspx?md5=c0d9352ad82598362a426cd38a7ecf0e","http://www.fortiguard.com/av/VID4225990","http://enterprise.norman.com/resources/files/unveiling_an_indian_cyberattack_infrastructure_appendixes.pdf"],"2016913":["http://www.threatexpert.com/report.aspx?md5=e7d9bc670d69ad8a6ad2784255324eec","http://www.threatexpert.com/report.aspx?md5=37207835e128516fe17af3dacc83a00c"],"2016914":["http://www.threatexpert.com/report.aspx?md5=2b63ed542eb0e1a4547a2b6e91391dc0","http://www.securelist.com/en/descriptions/16150989/Trojan.Win32.Antavmu.guw?print_mode=1","http://www.threatexpert.com/report.aspx?md5=a80f33c94c44556caa2ef46cd5eb863c"],"2016915":["http://www.threatexpert.com/report.aspx?md5=a80f33c94c44556caa2ef46cd5eb863c","http://www.drwebhk.com/en/virus_techinfo/Trojan.DownLoader8.25530.html","http://www.threatexpert.com/report.aspx?md5=2b63ed542eb0e1a4547a2b6e91391dc0"],"2016917":["http://virustotal.com/en/file/1ea487b1507305f17a2cd2ab0dbcfac523419dbc27cde38e27cb5c4a8d3c9caf/analysis/","http://lists.clean-mx.com/pipermail/viruswatch/20121222/037085.html","http://www.threatexpert.com/report.aspx?md5=0564e603f9ed646553933cb0d271f906"],"2016918":["http://www.vnsecurity.net/2013/05/analysis-of-nginx-cve-2013-2028/","http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/nginx_chunked_size.rb"],"2016920":["http://struts.apache.org/development/2.x/docs/s2-013.html"],"2016922":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://labs.alienvault.com/labs/index.php/2012/new-macontrol-variant-targeting-uyghur-users-the-windows-version-using-gh0st-rat/","http://www.infowar-monitor.net/2009/09/tracking-ghostnet-investigating-a-cyber-espionage-network/","http://blogs.rsa.com/will-gragido/lions-at-the-watering-hole-the-voho-affair/","http://www.norman.com/about_norman/press_center/news_archive/2012/the_many_faces_of_gh0st_rat/en"],"2016923":["http://kahusecurity.com/2012/new-chinese-exploit-pack/"],"2016924":["http://kahusecurity.com/2012/new-chinese-exploit-pack/"],"2016925":["http://kahusecurity.com/2012/new-chinese-exploit-pack/"],"2016926":["http://kahusecurity.com/2012/new-chinese-exploit-pack/"],"2016932":["http://contagiodump.blogspot.no/2011/01/jan-6-cve-2010-3333-with-info-theft.html"],"2016934":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-safe-a-targeted-threat.pdf"],"2016935":["http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet"],"2016936":["http://dev.mysql.com/doc/refman/5.1/en/string-functions.html#function_load-file","http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet"],"2016938":["http://www.threatexpert.com/report.aspx?md5=dede600f1e78fd20e4515bea1f2bdf61"],"2016939":["http://www.threatexpert.com/report.aspx?md5=ff7a263e89ff01415294470e1e52c010"],"2016941":["http://www.threatexpert.com/report.aspx?md5=44be7c6d4109ae5fb0ceb2824facf2dd","http://cert.pl/news/8706/langswitch_lang/en"],"2016944":["http://www.net78.net"],"2016946":["http://www.threatexpert.com/report.aspx?md5=252c95327ce556a21bdd7e9a322e206c","http://www.virusradar.com/Win32_Bicololo.A/description"],"2016947":["http://www.threatexpert.com/report.aspx?md5=691bd07048b09c73f0a979529a66f6e3"],"2016948":["http://www.threatexpert.com/report.aspx?md5=691bd07048b09c73f0a979529a66f6e3"],"2016949":["http://malwaremustdie.blogspot.jp/2013/05/story-of-unix-trojan-tsunami-ircbot-w.html"],"2016950":["http://www.threatexpert.com/report.aspx?md5=4d23395fcbab1dabef9afe6af81df558"],"2016951":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3aWin32/Agent.AAE"],"2016956":["http://struts.apache.org/development/2.x/docs/s2-013.html"],"2016957":["http://struts.apache.org/development/2.x/docs/s2-013.html"],"2016958":["http://struts.apache.org/development/2.x/docs/s2-013.html"],"2016959":["http://struts.apache.org/development/2.x/docs/s2-013.html"],"2016960":["http://www.threatexpert.com/report.aspx?md5=16d529fc48250571a9e667fb264c8497"],"2016961":["http://www.threatexpert.com/report.aspx?md5=16d529fc48250571a9e667fb264c8497"],"2016967":["http://www.deependresearch.org/2013/05/under-this-rock-vulnerable.html"],"2016968":["http://www.threatexpert.com/report.aspx?md5=d04a7f30c83290b86cac8d762dcc2df5","http://www.threatexpert.com/report.aspx?md5=cb9cc50b18a7c91cf4a34c624b90db5d","http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AWin32%2FTravnet.A","http://blogs.mcafee.com/mcafee-labs/travnet-botnet-steals-huge-amount-of-sensitive-data","http://www.securelist.com/en/downloads/vlpdfs/kaspersky-the-net-traveler-part1-final.pdf"],"2016969":["http://www.threatexpert.com/report.aspx?md5=d04a7f30c83290b86cac8d762dcc2df5","http://www.threatexpert.com/report.aspx?md5=cb9cc50b18a7c91cf4a34c624b90db5d","http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AWin32%2FTravnet.A","http://blogs.mcafee.com/mcafee-labs/travnet-botnet-steals-huge-amount-of-sensitive-data"],"2016977":["http://seclists.org/fulldisclosure/2013/Jun/21"],"2016978":["http://seclists.org/fulldisclosure/2013/Jun/21"],"2016979":["http://seclists.org/fulldisclosure/2013/Jun/21"],"2016980":["http://seclists.org/fulldisclosure/2013/Jun/21"],"2016981":["http://seclists.org/fulldisclosure/2013/Jun/21"],"2016982":["http://seclists.org/fulldisclosure/2013/Jun/21"],"2016983":["http://seclists.org/fulldisclosure/2013/Jun/21"],"2016991":["http://blog.spiderlabs.com/2013/05/alina-shedding-some-light-on-this-malware-family.html","http://www.threatexpert.com/report.aspx?md5=7d6ec042a38d108899c8985ed7417e4a"],"2017004":["http://www.threatexpert.com/report.aspx?md5=ac03c5980e2019992b876798df2df9ab"],"2017006":["http://blogs.technet.com/b/srd/archive/2013/06/11/ms13-051-get-out-of-my-office.aspx"],"2017007":["http://blogs.technet.com/b/srd/archive/2013/06/11/ms13-051-get-out-of-my-office.aspx"],"2017009":["http://malware.lu/Pro/RAP003_KimJongRAT-Stealer_Analysis.1.0.pdf"],"2017012":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-1533"],"2017013":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-1533"],"2017015":["http://www.dropbox.com/help/201/en"],"2017022":["http://www.malwaresigs.com/2013/06/14/slight-change-in-flashpack-uri/"],"2017023":["http://www.malwaresigs.com/2013/06/14/slight-change-in-flashpack-uri/"],"2017026":["http://blog.sucuri.net/2013/06/apache-php-injection-to-javascript-files.html"],"2017027":["http://blog.sucuri.net/2013/06/apache-php-injection-to-javascript-files.html"],"2017034":["http://www.basemont.com/june_2013_exploit_kit_2"],"2017036":["http://fireeye.com/blog/technical/malware-research/2013/06/trojan-apt-seinup-hitting-asean.html"],"2017037":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1571"],"2017046":["http://ddos.arbornetworks.com/2013/06/dirtjumpers-ddos-engine-gets-a-tune-up-with-new-drive-variant/"],"2017047":["http://ddos.arbornetworks.com/2013/06/dirtjumpers-ddos-engine-gets-a-tune-up-with-new-drive-variant/"],"2017048":["http://ddos.arbornetworks.com/2013/06/dirtjumpers-ddos-engine-gets-a-tune-up-with-new-drive-variant/"],"2017049":["http://ddos.arbornetworks.com/2013/06/dirtjumpers-ddos-engine-gets-a-tune-up-with-new-drive-variant/"],"2017050":["http://ddos.arbornetworks.com/2013/06/dirtjumpers-ddos-engine-gets-a-tune-up-with-new-drive-variant/"],"2017051":["http://ddos.arbornetworks.com/2013/06/dirtjumpers-ddos-engine-gets-a-tune-up-with-new-drive-variant/"],"2017063":["http://localhost.re/p/solusvm-whmcs-module-316-vulnerability"],"2017066":["http://threatexpert.com/report.aspx?md5=9378ef5f2fb2e71e5eeed20f9f21d8dd","http://microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan%3aWin32/Comisproc&ThreatID=-2147341910","http://unixfreaxjp.blogspot.com.br/2012/11/ocjp-080-bootkitsoftbankbb.html"],"2017068":["http://malwaremustdie.blogspot.co.uk/2013/06/knockin-on-neutrino-exploit-kits-door.html"],"2017069":["http://malwaremustdie.blogspot.co.uk/2013/06/knockin-on-neutrino-exploit-kits-door.html"],"2017074":["http://www.securityfocus.com/bid/57082","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-6081","http://packetstormsecurity.com/files/122079/moinmoin_twikidraw.rb.txt","http://exploit-db.com/exploits/25304/"],"2017092":["http://www.malwaresigs.com/2013/06/14/slight-change-in-flashpack-uri/"],"2017093":["http://www.malwaresigs.com/2013/06/14/slight-change-in-flashpack-uri/"],"2017094":["http://www.intel.com/content/dam/www/public/us/en/documents/product-briefs/second-gen-interface-spec-v2.pdf","http://community.rapid7.com/community/metasploit/blog/2013/06/23/a-penetration-testers-guide-to-ipmi"],"2017100":["http://blogs.mcafee.com/mcafee-labs/styx-exploit-kit-takes-advantage-of-vulnerabilities"],"2017101":["http://blogs.mcafee.com/mcafee-labs/styx-exploit-kit-takes-advantage-of-vulnerabilities"],"2017102":["http://blogs.mcafee.com/mcafee-labs/styx-exploit-kit-takes-advantage-of-vulnerabilities"],"2017107":["http://blog.avast.com/2013/07/03/fake-flash-player-installer"],"2017108":["http://blog.avast.com/2013/07/03/fake-flash-player-installer"],"2017109":["http://blog.avast.com/2013/07/03/fake-flash-player-installer"],"2017111":["http://blog.sucuri.net/2013/07/vbulletin-infections-from-adabeupdate.html"],"2017112":["http://blog.sucuri.net/2013/07/vbulletin-infections-from-adabeupdate.html"],"2017113":["http://blog.sucuri.net/2013/07/vbulletin-infections-from-adabeupdate.html"],"2017129":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3163","http://blogs.technet.com/b/srd/archive/2013/07/10/running-in-the-wild-not-for-so-long.aspx"],"2017130":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3163","http://blogs.technet.com/b/srd/archive/2013/07/10/running-in-the-wild-not-for-so-long.aspx"],"2017131":["http://blogs.technet.com/b/srd/archive/2013/07/10/running-in-the-wild-not-for-so-long.aspx"],"2017133":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3163"],"2017136":["http://virustotal.com/en/file/21e04ef285d9df2876bab83dd91a8bd78ecdf0d47a8e4693e2ec1924f642bfc8/analysis/","http://www.threatexpert.com/report.aspx?md5=0134997dff945fbfe62f343bcba782bc"],"2017143":["http://www.owasp.org/index.php/CRLF_Injection"],"2017148":["http://portswigger.net/burp/proxy.html"],"2017155":["http://struts.apache.org/release/2.3.x/docs/s2-016.html"],"2017156":["http://struts.apache.org/release/2.3.x/docs/s2-016.html"],"2017157":["http://struts.apache.org/release/2.3.x/docs/s2-016.html"],"2017161":["http://www.yasinkaplan.com/SipCli/"],"2017162":["http://www.yasinkaplan.com/SipCli/"],"2017163":["http://sophos.com/2013/07/17/anatomy-of-another-android-hole-chinese-researchers-claim-new-code-verification-bypass/"],"2017165":["http://blog.malwarebytes.org/intelligence/2013/07/fbi-ransomware-now-targeting-apples-mac-os-x-users/","http://www.f-secure.com/weblog/archives/00002577.html"],"2017173":["http://struts.apache.org/development/2.x/docs/s2-013.html"],"2017174":["http://struts.apache.org/release/2.3.x/docs/s2-016.html"],"2017175":["http://struts.apache.org/release/2.3.x/docs/s2-016.html"],"2017176":["http://struts.apache.org/release/2.3.x/docs/s2-016.html"],"2017190":["http://www.threatexpert.com/report.aspx?md5=1303188d039076998b170fffe48e4cc0"],"2017191":["http://www.threatexpert.com/report.aspx?md5=00db349caf2eefc3be5ee30b8b8947a2"],"2017201":["http://immunityproducts.blogspot.fr/2013/04/yet-another-java-security-warning-bypass.html"],"2017202":["http://immunityproducts.blogspot.fr/2013/04/yet-another-java-security-warning-bypass.html"],"2017203":["http://immunityproducts.blogspot.fr/2013/04/yet-another-java-security-warning-bypass.html"],"2017204":["http://immunityproducts.blogspot.fr/2013/04/yet-another-java-security-warning-bypass.html"],"2017262":["http://www.secureworks.com/cyber-threat-intelligence/threats/secrets-of-the-comfoo-masters/"],"2017270":["http://malwaremustdie.blogspot.co.uk/2013/02/the-infection-of-styx-exploit-kit.html"],"2017274":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-stealrat.pdf"],"2017275":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-stealrat.pdf"],"2017276":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-stealrat.pdf"],"2017277":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2135","http://www.securityfocus.com/bid/60345","http://cwiki.apache.org/confluence/display/WW/S2-015"],"2017279":["http://www.threatexpert.com/report.aspx?md5=605daaa9662b82c0d5982ad3a742d2e7"],"2017280":["http://blog.sucuri.net/2013/08/openx-org-compromised-and-downloads-injected-with-a-backdoor.html"],"2017298":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1690"],"2017305":["http://www.threatexpert.com/report.aspx?md5=94e496decf90c4ba2fb3e7113a081726"],"2017308":["http://anubis.iseclab.org/?action=result&task_id=19e3b6cbfdf8d6bd429ecc75ed016fb91","http://blog.avast.com/2013/11/21/ransomware-annoys-its-victims-by-displaying-child-pornography-pictures/#more-20393","http://blog.avast.com/2013/10/24/what-to-do-if-your-computer-is-attacked-by-ransomware/","http://johannesbader.ch/2015/03/the-dga-of-dircrypt"],"2017309":["http://www.arbornetworks.com/asert/2013/08/fort-disco-bruteforce-campaign/","http://www.threatexpert.com/report.aspx?md5=722a1809bd4fd75743083f3577e1e6a4"],"2017310":["http://www.arbornetworks.com/asert/2013/08/fort-disco-bruteforce-campaign/","http://www.threatexpert.com/report.aspx?md5=722a1809bd4fd75743083f3577e1e6a4"],"2017311":["http://www.arbornetworks.com/asert/2013/08/fort-disco-bruteforce-campaign/"],"2017312":["http://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/23000/PD23873/en_US/McAfee%20Labs%20Threat%20Advisory-W32-Pift.pdf","http://www.threatexpert.com/report.aspx?md5=d3c6af8284276b11c2f693c1195b4735"],"2017313":["http://www.fireeye.com/blog/technical/botnet-activities-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html"],"2017325":["http://www.threatexpert.com/report.aspx?md5=832f5e01be536da71d5b3f7e41938cfb","http://fireeye.com/blog/technical/2013/08/survival-of-the-fittest-new-york-times-attackers-evolve-quickly.html"],"2017326":["http://www.threatexpert.com/report.aspx?md5=832f5e01be536da71d5b3f7e41938cfb","http://fireeye.com/blog/technical/2013/08/survival-of-the-fittest-new-york-times-attackers-evolve-quickly.html"],"2017329":["http://piratebrowser.com"],"2017343":["http://www.virusradar.com/en/Win32_Spy.KeyLogger.OCI/description","http://www.virustotal.com/en/file/ec19e12e5dafc7aafaa0f582cd714ee5aa3615b89fe2f36f7851d96ec55e3344/analysis/"],"2017344":["http://www.virustotal.com/en/file/ec19e12e5dafc7aafaa0f582cd714ee5aa3615b89fe2f36f7851d96ec55e3344/analysis"],"2017345":["http://cansecwest.com/slides07/csw07-nazario.pdf","http://www.sophos.com/security/technical-papers/malware_with_your_mocha.html","http://www.windowsecurity.com/articles/Obfuscated-Shellcode-Part1.html"],"2017349":["http://www.threatexpert.com/report.aspx?md5=0ce7f9dde5c273d7e71c9f1301fe505d"],"2017350":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017351":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017352":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017353":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017354":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017355":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017356":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017357":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017358":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017359":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017360":["http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf"],"2017362":["http://www.threatexpert.com/report.aspx?md5=9a8cee88d7440f25be8404b71cb584de","http://www.threatexpert.com/report.aspx?md5=b70f8d0afa82c222f55f7a18d2ad0b81"],"2017365":["http://www.threatexpert.com/report.aspx?md5=b0e8ce16c42dee20d2c1dfb1b87b3afc"],"2017366":["http://www.exploit-db.com/exploits/27755/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0632"],"2017367":["http://www.threatexpert.com/report.aspx?md5=9a8cee88d7440f25be8404b71cb584de","http://www.threatexpert.com/report.aspx?md5=b70f8d0afa82c222f55f7a18d2ad0b81"],"2017368":["http://www.threatexpert.com/report.aspx?md5=7b6409fc32c70908a9468eaac845bdaa","http://www.threatexpert.com/report.aspx?md5=b647a4af77b2fad3f40c6769c22ebf74","http://www.welivesecurity.com/2013/08/20/avatar-rootkit-the-continuing-saga/"],"2017369":["http://blog.avast.com/2013/08/01/malicious-bitcoin-miners-target-czech-republic/"],"2017371":["http://www.threatexpert.com/report.aspx?md5=c447d364a9dad369ff07dcc14f5fbefb","http://www.threatexpert.com/report.aspx?md5=a0a66dfbdf1ce76782ba20a07a052976"],"2017377":["http://welivesecurity.com/2013/08/27/the-powerloader-64-bit-update-based-on-leaked-exploits/"],"2017378":["http://www.arbornetworks.com/asert/2013/08/dirtjumper-drive-shifts-into-a-new-gear/"],"2017379":["http://www.arbornetworks.com/asert/2013/08/dirtjumper-drive-shifts-into-a-new-gear/"],"2017380":["http://www.arbornetworks.com/asert/2013/08/dirtjumper-drive-shifts-into-a-new-gear/"],"2017381":["http://www.arbornetworks.com/asert/2013/08/dirtjumper-drive-shifts-into-a-new-gear/"],"2017382":["http://www.arbornetworks.com/asert/2013/08/dirtjumper-drive-shifts-into-a-new-gear/"],"2017383":["http://www.arbornetworks.com/asert/2013/08/dirtjumper-drive-shifts-into-a-new-gear/"],"2017384":["http://www.arbornetworks.com/asert/2013/08/dirtjumper-drive-shifts-into-a-new-gear/"],"2017385":["http://www.arbornetworks.com/asert/2013/08/dirtjumper-drive-shifts-into-a-new-gear/","http://www.threatexpert.com/report.aspx?md5=50a538221e015d77cf4794ae78978ce2"],"2017386":["http://community.rapid7.com/community/infosec/blog/2013/08/26/upcoming-g20-summit-fuels-espionage-operations"],"2017404":["http://www.fireeye.com/blog/technical/malware-research/2013/08/njw0rm-brother-from-the-same-mother.html","http://www.threatexpert.com/report.aspx?md5=4c60493b14c666c56db163203e819272","http://www.threatexpert.com/report.aspx?md5=b0e1d20accd9a2ed29cdacb803e4a89d"],"2017408":["http://www.kahusecurity.com/2013/deobfuscating-the-ck-exploit-kit"],"2017409":["http://www.antiy.net/wp-content/uploads/The-Latest-APT-Attack-by-Exploiting-CVE2012-0158-Vulnerability.pdf","http://contagiodump.blogspot.com/2013/09/sandbox-miming-cve-2012-0158-in-mhtml.html"],"2017410":["http://www.antiy.net/wp-content/uploads/The-Latest-APT-Attack-by-Exploiting-CVE2012-0158-Vulnerability.pdf","http://contagiodump.blogspot.com/2013/09/sandbox-miming-cve-2012-0158-in-mhtml.html"],"2017411":["http://www.antiy.net/wp-content/uploads/The-Latest-APT-Attack-by-Exploiting-CVE2012-0158-Vulnerability.pdf","http://contagiodump.blogspot.com/2013/09/sandbox-miming-cve-2012-0158-in-mhtml.html"],"2017412":["http://contagiodump.blogspot.com.br/2013/09/sandbox-miming-cve-2012-0158-in-mhtml.html","http://www.threatexpert.com/report.aspx?md5=82644661f6639c9fcb021ad197b565f7"],"2017413":["http://contagiodump.blogspot.com.br/2013/09/sandbox-miming-cve-2012-0158-in-mhtml.html"],"2017417":["http://www.threatexpert.com/report.aspx?md5=0ae2261385c482d55519be9b0e4afef3","http://anubis.iseclab.org/?action=result&task_id=1043e1f5f61319b944d51d0d6d7e23f2e","http://www.threatexpert.com/report.aspx?md5=41a0a4c0831dbcbbfd877c7d37b671e0","http://www.fireeye.com/blog/technical/botnet-activities-research/2012/09/the-story-behind-backdoorlv.html"],"2017418":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017419":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017420":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017421":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017422":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017423":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017424":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017425":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017426":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017427":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017428":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017429":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017430":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017431":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017432":["http://threatgeek.com/2013/07/njrat-detection-rules-using-yara-.html"],"2017436":["http://imperva.com/download.asp?id=421"],"2017437":["http://imperva.com/download.asp?id=421"],"2017438":["http://imperva.com/download.asp?id=421"],"2017439":["http://imperva.com/download.asp?id=421"],"2017440":["http://imperva.com/download.asp?id=421"],"2017441":["http://imperva.com/download.asp?id=421"],"2017442":["http://imperva.com/download.asp?id=421"],"2017443":["http://imperva.com/download.asp?id=421"],"2017444":["http://imperva.com/download.asp?id=421"],"2017445":["http://imperva.com/download.asp?id=421"],"2017446":["http://imperva.com/download.asp?id=421"],"2017447":["http://imperva.com/download.asp?id=421"],"2017448":["http://imperva.com/download.asp?id=421"],"2017449":["http://imperva.com/download.asp?id=421"],"2017455":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_infiltrating_the_waledac_botnet_v2.pdf"],"2017462":["http://dnsamplificationattacks.blogspot.gr/p/blog-page.html"],"2017464":["http://blogs.mcafee.com/mcafee-labs/hesperus-evening-star-shines-as-latest-banker-trojan"],"2017465":["http://blogs.mcafee.com/mcafee-labs/hesperus-evening-star-shines-as-latest-banker-trojan"],"2017466":["http://blogs.mcafee.com/mcafee-labs/android-fake-av-hosted-in-google-code-targets-south-koreans"],"2017475":["http://www.threatexpert.com/report.aspx?md5=182ea2f564f6211d37a6c35a4bd99ee6"],"2017477":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3893","http://blogs.technet.com/b/srd/archive/2013/09/17/cve-2013-3893-fix-it-workaround-available.aspx"],"2017478":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3893","http://blogs.technet.com/b/srd/archive/2013/09/17/cve-2013-3893-fix-it-workaround-available.aspx"],"2017479":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3893","http://blogs.technet.com/b/srd/archive/2013/09/17/cve-2013-3893-fix-it-workaround-available.aspx"],"2017480":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3893","http://blogs.technet.com/b/srd/archive/2013/09/17/cve-2013-3893-fix-it-workaround-available.aspx"],"2017489":["http://www.threatexpert.com/report.aspx?md5=7e37a407a8fb0df3b2835419ad16f500","http://www.threatexpert.com/report.aspx?md5=422b926dbbe03d0e4555328282c8f32b"],"2017490":["http://blog.trendmicro.com/trendlabs-security-intelligence/us-taiwan-most-affected-by-mevade-malware/","http://blog.damballa.com/archives/2135"],"2017511":["http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html"],"2017512":["http://research.zscaler.com/2013/09/a-new-wave-of-win32caphaw-attacks.html","http://blog.damballa.com/archives/2147"],"2017513":["http://research.zscaler.com/2013/09/a-new-wave-of-win32caphaw-attacks.html","http://blog.damballa.com/archives/2147"],"2017516":["http://www.threatexpert.com/report.aspx?md5=d2e799904582f03281060689f5447585"],"2017517":["http://www.threatexpert.com/report.aspx?md5=d2e799904582f03281060689f5447585"],"2017518":["http://www.fireeye.com/blog/uncategorized/2013/09/now-you-see-me-h-worm-by-houdini.html"],"2017519":["http://www.fireeye.com/blog/uncategorized/2013/09/now-you-see-me-h-worm-by-houdini.html"],"2017520":["http://www.fireeye.com/blog/uncategorized/2013/09/now-you-see-me-h-worm-by-houdini.html"],"2017521":["http://www.fireeye.com/blog/uncategorized/2013/09/now-you-see-me-h-worm-by-houdini.html"],"2017522":["http://www.fireeye.com/blog/uncategorized/2013/09/now-you-see-me-h-worm-by-houdini.html"],"2017523":["http://www.fireeye.com/blog/uncategorized/2013/09/now-you-see-me-h-worm-by-houdini.html"],"2017524":["http://krebsonsecurity.com/2013/09/data-broker-giants-hacked-by-id-theft-service/","http://www.threatexpert.com/report.aspx?md5=adcfe50aaaa0928adf2785fefe7307cc"],"2017528":["http://thehackernews.com/2013/09/thousands-of-wordpress-blogs.html","http://pastebin.com/NP64hTQr"],"2017544":["http://blogs.cisco.com/security/watering-hole-attacks-target-energy-sector"],"2017548":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=2eed956920934a78200899ef05ace0d8"],"2017552":["http://malwaremustdie.blogspot.co.uk/2013/09/302-redirector-new-cushion-attempt-to.html"],"2017557":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1488","http://www.contextis.com/research/blog/java-pwn2own/","http://www.rapid7.com/db/modules/exploit/multi/browser/java_jre17_driver_manager"],"2017560":["http://localhost.re/p/whmcs-527-vulnerability"],"2017563":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2465","http://seclists.org/fulldisclosure/2013/Aug/134","http://malwageddon.blogspot.com/2013/10/unknown-ek-i-wanna-be-billionaire-so.html"],"2017568":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2465","http://seclists.org/fulldisclosure/2013/Aug/134","http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/java_storeimagearray.rb"],"2017572":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3897"],"2017573":["http://www.exploit-db.com/exploits/28713/"],"2017574":["http://www.exploit-db.com/exploits/28713/"],"2017575":["http://blog.imperva.com/2013/10/threat-advisory-a-vbulletin-exploit-administrator-injection.html"],"2017582":["http://www.threatexpert.com/report.aspx?md5=a354873df6dbce59e801380cee39ac17"],"2017584":["http://www.threatexpert.com/report.aspx?md5=6afc848066d274d8632c742340560a67"],"2017585":["http://www.welivesecurity.com/2013/10/11/win32kankan-chinese-drama/"],"2017586":["http://www.welivesecurity.com/2013/10/11/win32kankan-chinese-drama/"],"2017587":["http://quequero.org/2013/09/android-opfake-malware-analysis/"],"2017588":["http://quequero.org/2013/09/android-opfake-malware-analysis/"],"2017598":["http://www.threatexpert.com/report.aspx?md5=f5bcc28e7868a68e473373d684a8c54a"],"2017599":["http://symantec.com/connect/blogs/infostealernemim-how-pervasive-infostealer-continues-evolve"],"2017600":["http://symantec.com/connect/blogs/backdooregobot-how-effectively-execute-targeted-campaign"],"2017604":["http://blog.spiderlabs.com/2013/10/hiding-webshell-backdoor-code-in-image-files.html"],"2017605":["http://blog.spiderlabs.com/2013/10/hiding-webshell-backdoor-code-in-image-files.html"],"2017606":["http://blog.spiderlabs.com/2013/10/hiding-webshell-backdoor-code-in-image-files.html"],"2017607":["http://blog.spiderlabs.com/2013/10/hiding-webshell-backdoor-code-in-image-files.html"],"2017608":["http://blog.spiderlabs.com/2013/10/hiding-webshell-backdoor-code-in-image-files.html"],"2017609":["http://blog.spiderlabs.com/2013/10/hiding-webshell-backdoor-code-in-image-files.html"],"2017611":["http://security.coverity.com/advisory/2013/Oct/two-path-traversal-defects-in-oracles-jsf2-implementation.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-3815"],"2017615":["http://blog.erratasec.com/2013/10/that-dlink-bug-masscan.html","http://blog.erratasec.com/2013/09/masscan-entire-internet-in-3-minutes.html"],"2017616":["http://blog.erratasec.com/2013/10/that-dlink-bug-masscan.html","http://blog.erratasec.com/2013/09/masscan-entire-internet-in-3-minutes.html"],"2017617":["http://blog.fortinet.com/Avoiding-Heuristic-Detection/"],"2017620":["http://www.threatexpert.com/report.aspx?md5=c71416a9ec5414fe487167b5bfd921ec"],"2017622":["http://localhost.re/res/whmcs2.py"],"2017627":["http://www.soleranetworks.com/blogs/cryptolocker-kegotip-medfos-malware-triple-threat/","http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PWS%3AWin32%2FKegotip.C"],"2017633":["http://www.threatexpert.com/report.aspx?md5=19ca0d830cd7b44e5de1ab85f4e17d82"],"2017640":["http://blog.sucuri.net/2013/10/backdoor-evasion-using-encrypted-content.html"],"2017641":["http://blog.sucuri.net/2013/10/backdoor-evasion-using-encrypted-content.html"],"2017645":["http://www.normanshark.com/blog/necurs-cc-domains-non-censorable/"],"2017646":["http://www.fireeye.com/blog/technical/malware-research/2013/10/evasive-tactics-terminator-rat.html"],"2017647":["http://www.threatexpert.com/report.aspx?md5=d1663e13314a6722db7cb7549b470c64"],"2017655":["http://www.threatexpert.com/report.aspx?md5=4f5d28c43795b9c4e6257bf26c52bdfe"],"2017656":["http://www.threatexpert.com/report.aspx?md5=70a6d9cb37e346b4dfd28bd4ea1f8671"],"2017657":["http://blog.exodusintel.com/2013/01/02/happy-new-year-analysis-of-cve-2012-4792/","http://cyvera.com/cve-2013-3897-analysis-of-yet-another-ie-0-day/"],"2017662":["http://www.threatexpert.com/report.aspx?md5=723a90462a417337355138cc6aba2290"],"2017668":["http://www.symantec.com/security_response/writeup.jsp?docid=2013-070113-1904-99&tabid=3"],"2017670":["http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-microsoft-office-2"],"2017671":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017672":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017673":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017674":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017675":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017677":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017679":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017680":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017681":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017682":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017683":["http://alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017684":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3621","http://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmi-firmware-vulnerabilities"],"2017685":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3621","http://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmi-firmware-vulnerabilities"],"2017686":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3623","http://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmi-firmware-vulnerabilities"],"2017687":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3623","http://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmi-firmware-vulnerabilities"],"2017688":["http://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmi-firmware-vulnerabilities"],"2017689":["http://www.alienvault.com/open-threat-exchange/blog/microsoft-office-zeroday-used-to-attack-pakistani-targets"],"2017690":["http://botnetlegalnotice.com/citadel/files/Patel_Decl_Ex20.pdf","http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/the-dual-use-exploit-cve-2013-3906-used-in-both-targeted-attacks-and-crimeware-campaigns.html"],"2017691":["http://botnetlegalnotice.com/citadel/files/Patel_Decl_Ex20.pdf","http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/the-dual-use-exploit-cve-2013-3906-used-in-both-targeted-attacks-and-crimeware-campaigns.html"],"2017697":["http://pastebin.com/raw.php?i=tdATTg7L"],"2017701":["http://blog.sucuri.net/2013/11/case-study-analyzing-a-wordpress-attack-dissecting-the-webr00t-cgi-shell-part-i.html"],"2017702":["http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html"],"2017704":["http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html"],"2017705":["http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html"],"2017707":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231"],"2017708":["http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html"],"2017709":["http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html"],"2017713":["http://fireeye.com/blog/technical/cyber-exploits/2013/11/exploit-proliferation-additional-threat-groups-acquire-cve-2013-3906.html","http://www.threatexpert.com/report.aspx?md5=17f9f999e1814b99601446f8ce7eb816"],"2017714":["http://fireeye.com/blog/technical/cyber-exploits/2013/11/exploit-proliferation-additional-threat-groups-acquire-cve-2013-3906.html","http://www.threatexpert.com/report.aspx?md5=17f9f999e1814b99601446f8ce7eb816"],"2017716":["http://arbornetworks.com/asert/2013/11/athena-a-ddos-malware-odyssey/","http://www.threatexpert.com/report.aspx?md5=859c2fec50ba1212dca9f00aa4a64ec4"],"2017717":["http://www.btpro.net/blog/2013/05/black-revolution-botnet-trojan/"],"2017718":["http://www.btpro.net/blog/2013/05/black-revolution-botnet-trojan/"],"2017721":["http://www.btpro.net/blog/2013/05/black-revolution-botnet-trojan/"],"2017722":["http://www.btpro.net/blog/2013/05/black-revolution-botnet-trojan/"],"2017723":["http://www.btpro.net/blog/2013/05/black-revolution-botnet-trojan/"],"2017724":["http://www.threatexpert.com/report.aspx?md5=0fe0cf9a2d8c3ccd1c92acbb81ff6343","http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=PWS%3AWin32%2FLmir.BMQ"],"2017725":["http://www.threatexpert.com/report.aspx?md5=f8b3fb4e5f8f1b3bd643e58f1015f9fc"],"2017727":["http://www.symantec.com/connect/blogs/linux-back-door-uses-covert-communication-protocol"],"2017728":["http://www.threatexpert.com/report.aspx?md5=6ef66c2336b2b5aaa697c2d0ab2b66e2"],"2017730":["http://github.com/MrXors/Javax/"],"2017734":["http://nickhumphreyit.blogspot.co.il/2013/10/jboss-42-hacked-by-pwnjsp.html","http://blog.imperva.com/2013/11/threat-advisory-a-jboss-as-exploit-web-shell-code-injection.html"],"2017742":["http://blog.avast.com/2013/09/25/win3264napolar-new-trojan-shines-on-the-cyber-crime-scene/","http://www.welivesecurity.com/2013/09/25/win32napolar-a-new-bot-on-the-block/","http://www.threatexpert.com/report.aspx?md5=2c344add2ee6201f4e2cdf604548408b"],"2017746":["http://www.threatexpert.com/report.aspx?md5=d14314ceb74c8c1a8e1e8ca368d75501"],"2017747":["http://www.threatexpert.com/report.aspx?md5=d14314ceb74c8c1a8e1e8ca368d75501"],"2017776":["http://www.threatexpert.com/report.aspx?md5=a9af388f5a627aa66c34074ef45db1b7"],"2017777":["http://www.fireeye.com/blog/technical/vulnerabilities/2013/11/inmobi-another-vulnaggressive-adware-opens-billions-of-javascript-sidedoors-on-android-devices.html"],"2017778":["http://www.fireeye.com/blog/technical/vulnerabilities/2013/11/inmobi-another-vulnaggressive-adware-opens-billions-of-javascript-sidedoors-on-android-devices.html"],"2017779":["http://www.fireeye.com/blog/technical/vulnerabilities/2013/11/inmobi-another-vulnaggressive-adware-opens-billions-of-javascript-sidedoors-on-android-devices.html"],"2017780":["http://fireeye.com/blog/threat-research/2014/01/js-binding-over-http-vulnerability-and-javascript-sidedoor.html"],"2017781":["http://fireeye.com/blog/threat-research/2014/01/js-binding-over-http-vulnerability-and-javascript-sidedoor.html"],"2017782":["http://fireeye.com/blog/threat-research/2014/01/js-binding-over-http-vulnerability-and-javascript-sidedoor.html"],"2017783":["http://fireeye.com/blog/threat-research/2014/01/js-binding-over-http-vulnerability-and-javascript-sidedoor.html"],"2017784":["http://www.threatexpert.com/report.aspx?md5=f127ed76dc5e48f69a1070f314488ce2","http://blog.trendmicro.com/trendlabs-security-intelligence/watch-out-for-worm_vobfus/","http://blog.dynamoo.com/2012/11/vobfus-sites-to-block.html"],"2017787":["http://www.fireeye.com/blog/technical/targeted-attack/2013/11/dissecting-android-korbanker.html","http://www.threatexpert.com/report.aspx?md5=a68bbfe91fab666daaf2c070db00022f","http://www.threatexpert.com/report.aspx?md5=a68bbfe91fab666daaf2c070db00022f"],"2017788":["http://www.fireeye.com/blog/technical/targeted-attack/2013/11/dissecting-android-korbanker.html","http://www.threatexpert.com/report.aspx?md5=a68bbfe91fab666daaf2c070db00022f","http://www.threatexpert.com/report.aspx?md5=a68bbfe91fab666daaf2c070db00022f"],"2017790":["http://www.exploit-db.com/exploits/29881/"],"2017798":["http://deependresearch.org/2013/12/hey-zollard-leave-my-internet-of-things.html"],"2017799":["http://deependresearch.org/2013/12/hey-zollard-leave-my-internet-of-things.html"],"2017800":["http://deependresearch.org/2013/12/hey-zollard-leave-my-internet-of-things.html"],"2017801":["http://media.blackhat.com/us-13/US-13-Polyakov-Practical-Pentesting-of-ERPs-and-Business-Applications-Slides.pdf"],"2017802":["http://media.blackhat.com/us-13/US-13-Polyakov-Practical-Pentesting-of-ERPs-and-Business-Applications-Slides.pdf"],"2017803":["http://media.blackhat.com/us-13/US-13-Polyakov-Practical-Pentesting-of-ERPs-and-Business-Applications-Slides.pdf"],"2017804":["http://media.blackhat.com/us-13/US-13-Polyakov-Practical-Pentesting-of-ERPs-and-Business-Applications-Slides.pdf"],"2017805":["http://media.blackhat.com/us-13/US-13-Polyakov-Practical-Pentesting-of-ERPs-and-Business-Applications-Slides.pdf"],"2017806":["http://media.blackhat.com/us-13/US-13-Polyakov-Practical-Pentesting-of-ERPs-and-Business-Applications-Slides.pdf"],"2017807":["http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet"],"2017808":["http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet"],"2017816":["http://blogs.technet.com/b/mmpc/archive/2013/10/31/upatre-emerging-up-d-at-er-in-the-wild.aspx"],"2017820":["http://blog.spiderlabs.com/2013/12/the-curious-case-of-the-malicious-iis-module.html"],"2017821":["http://blog.spiderlabs.com/2013/12/the-curious-case-of-the-malicious-iis-module.html"],"2017822":["http://blog.spiderlabs.com/2013/12/the-curious-case-of-the-malicious-iis-module.html"],"2017823":["http://www.invincea.com/2013/12/e-k-i-a-adobe-reader-exploit-cve-2013-3346-kernel-ndproxy-sys-zero-day-eop/"],"2017825":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-1823","http://blogs.cisco.com/security/the-internet-of-everything-including-malware/"],"2017853":["http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html"],"2017854":["http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html"],"2017855":["http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf","http://www.fireeye.com/blog/technical/malware-research/2013/12/operation-ke3chang-targeted-attacks-against-ministries-of-foreign-affairs.html"],"2017856":["http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf","http://www.fireeye.com/blog/technical/malware-research/2013/12/operation-ke3chang-targeted-attacks-against-ministries-of-foreign-affairs.html"],"2017857":["http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf","http://www.fireeye.com/blog/technical/malware-research/2013/12/operation-ke3chang-targeted-attacks-against-ministries-of-foreign-affairs.html"],"2017858":["http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf","http://www.fireeye.com/blog/technical/malware-research/2013/12/operation-ke3chang-targeted-attacks-against-ministries-of-foreign-affairs.html"],"2017859":["http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf","http://www.fireeye.com/blog/technical/malware-research/2013/12/operation-ke3chang-targeted-attacks-against-ministries-of-foreign-affairs.html"],"2017860":["http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf","http://jsunpack.jeek.org/dec/go?report=e5f9dae61673a75db6dcb2475cb6ea8f22f66e9a"],"2017867":["http://www.secureworks.com/cyber-threat-intelligence/threats/spam-campaign-delivers-liftoh-downloader/"],"2017868":["http://www.secureworks.com/cyber-threat-intelligence/threats/spam-campaign-delivers-liftoh-downloader/"],"2017869":["http://www.secureworks.com/cyber-threat-intelligence/threats/spam-campaign-delivers-liftoh-downloader/"],"2017870":["http://www.secureworks.com/cyber-threat-intelligence/threats/spam-campaign-delivers-liftoh-downloader/"],"2017871":["http://research.zscaler.com/2013/12/bitcoin-mining-operation-seen-across.html","http://www.btcguild.com/new_protocol.php","http://mining.bitcoin.cz/stratum-mining"],"2017872":["http://research.zscaler.com/2013/12/bitcoin-mining-operation-seen-across.html","http://www.btcguild.com/new_protocol.php","http://mining.bitcoin.cz/stratum-mining"],"2017873":["http://research.zscaler.com/2013/12/bitcoin-mining-operation-seen-across.html","http://www.btcguild.com/new_protocol.php","http://mining.bitcoin.cz/stratum-mining"],"2017875":["http://blog.spiderlabs.com/2013/12/the-curious-case-of-the-malicious-iis-module-prologue-method-of-entry-analysis.html"],"2017876":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231"],"2017877":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231"],"2017878":["http://en.bitcoin.it/wiki/Getblocktemplate"],"2017879":["http://en.bitcoin.it/wiki/Getblocktemplate"],"2017880":["http://www.threatexpert.com/report.aspx?md5=7cc162a2ba136baaa38a9ccf46d97a06"],"2017881":["http://www.threatexpert.com/report.aspx?md5=7cc162a2ba136baaa38a9ccf46d97a06"],"2017882":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6397","http://www.agarri.fr/kom/archives/2013/11/27/compromising_an_unreachable_solr_server_with_cve-2013-6397/index.html"],"2017891":["http://www.threatexpert.com/report.aspx?md5=43e89125ad40b18d22e01f997da8929a"],"2017892":["http://www.threatexpert.com/report.aspx?md5=43e89125ad40b18d22e01f997da8929a"],"2017893":["http://www.kahusecurity.com/2013/analyzing-dotkachef-exploit-pack/"],"2017894":["http://www.kahusecurity.com/2013/analyzing-dotkachef-exploit-pack/"],"2017895":["http://www.threatexpert.com/report.aspx?md5=a3e0f51356d48124fba25485d1871b28","http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-asprox-reborn.pdf","http://blog.fortinet.com/post/changes-in-the-asprox-botnet"],"2017896":["http://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-browser-exploit-using-BrowserExploitServer"],"2017897":["http://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-browser-exploit-using-BrowserExploitServer"],"2017898":["http://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-browser-exploit-using-BrowserExploitServer"],"2017903":["http://www.threatexpert.com/report.aspx?md5=0032856449dbef5e63b8ed2f7a61fff9"],"2017911":["http://www.threatexpert.com/report.aspx?md5=9abbb5ea3f55b5182687db69af6cba66"],"2017912":["http://www.threatexpert.com/report.aspx?md5=9abbb5ea3f55b5182687db69af6cba66"],"2017913":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=a2469f4913f1607e4207ba0a8768491c"],"2017914":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=be92836bee1e8abc1d19d1c552e6c115"],"2017915":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=a88e0e5a2c8fd31161b5e4a31e1307a0"],"2017916":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=a88e0e5a2c8fd31161b5e4a31e1307a0"],"2017917":["http://www.threatexpert.com/report.aspx?md5=f582667d5ce743436fb24771eb22a0e8","http://www.arbornetworks.com/asert/2013/12/a-business-of-ferrets/"],"2017918":["http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks"],"2017919":["http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks"],"2017920":["http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks"],"2017921":["http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks"],"2017922":["http://www.threatexpert.com/report.aspx?md5=25623fa3a64f6bed301822f8fe6aa9b5"],"2017923":["http://github.com/elvanderb/TCP-32764"],"2017924":["http://github.com/elvanderb/TCP-32764"],"2017925":["http://www.torproject.org/docs/bridges.html.en","http://www.threatexpert.com/report.aspx?md5=2e3f7f9b3b4c29aceccab693aeccfa5a"],"2017926":["http://www.threatexpert.com/report.aspx?md5=e87f0db605517e851d571af2e78c5966"],"2017927":["http://www.threatexpert.com/report.aspx?md5=e87f0db605517e851d571af2e78c5966"],"2017929":["http://www.torproject.org/docs/bridges.html.en"],"2017934":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=a2469f4913f1607e4207ba0a8768491c"],"2017935":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=3b1abb60bafbab204aeddf8acdf58ac9"],"2017936":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=3b1abb60bafbab204aeddf8acdf58ac9"],"2017937":["http://developers.google.com/search-appliance/documentation/50/help_mini/crawl_headers","http://www.threatexpert.com/report.aspx?md5=98b58bd8a5138a31105e118e755a3773","http://www.threatexpert.com/report.aspx?md5=c07a6035e9c7fed2467afab1a9dbcf40"],"2017938":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=6a6ef7b4c7e8300a73b206e32e14ce3c"],"2017940":["http://www.threatexpert.com/report.aspx?md5=cca1713888b0534954234cf31dd5a7d4"],"2017941":["http://www.threatexpert.com/report.aspx?md5=6e0a6c4a06a446f70ae1463129711122"],"2017942":["http://www.threatexpert.com/report.aspx?md5=c13c3e331f05d61a7204fb4599b07709"],"2017943":["http://www.threatexpert.com/report.aspx?md5=05ddaa5b6b56123e792fd67bb03376bc"],"2017944":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=9fae15fa8ab6bb8d78d609bdceafe28e"],"2017945":["http://www.threatexpert.com/report.aspx?md5=e44962d7dec79c09a767a1d3e8ce02d8","http://www.virustotal.com/en/file/1a1ff0fc6af6f7922bae906728e1919957998157f3a0cf1f1a0d3292f0eecd85/analysis/"],"2017946":["http://www.threatexpert.com/report.aspx?md5=406fea6262d8ee05e0ab4247c1083443","http://www.virustotal.com/en/file/b0baed750f09ff058e5bd28d6443da833496dc1d1ed674ee6b2caf91889f648e/analysis/1389133969/"],"2017949":["http://blog.bannasties.com/2013/08/vulnerability-scans/"],"2017950":["http://blog.bannasties.com/2013/08/vulnerability-scans/"],"2017959":["http://labs.umbrella.com/2013/10/24/mysterious-dga-lets-investigate-sgraph/","http://www.anubisnetworks.com/unknowndga17-the-mevade-connection/"],"2017960":["http://www.anubisnetworks.com/unknowndga17-the-mevade-connection/"],"2017964":["http://www.threatexpert.com/report.aspx?md5=bad7cd3c534c95867f5dbe5c5169a4da"],"2017965":["http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks","http://en.wikipedia.org/wiki/Ephemeral_port"],"2017966":["http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks","http://en.wikipedia.org/wiki/Ephemeral_port"],"2017967":["http://www.threatexpert.com/report.aspx?md5=bb7bbb0646e705ab036d73d920983256"],"2017968":["http://www.securelist.com/en/blog/208214213/The_Icefog_APT_Hits_US_Targets_With_Java_Backdoor"],"2017969":["http://www.securityfocus.com/archive/1/530743/30/0/threaded","http://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2017-003/?fid=8911","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5521"],"2017970":["http://xylibox.com/2014/01/trojwowspy-a.html"],"2017972":["http://www.securelist.com/en/blog/208214213/The_Icefog_APT_Hits_US_Targets_With_Java_Backdoor","http://jsunpack.jeek.org/dec/go?report=6b63068d3259f5032a301e0d3f935b4d3f2e2998"],"2017974":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=edd8c8009fc1ce2991eef6069ae6bf82"],"2017983":["http://www.threatexpert.com/report.aspx?md5=6d93fc6132ae6938013cdd95354bff4e"],"2017988":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=ece8808981043f830bacc4133d68e394"],"2017992":["http://www.threatexpert.com/report.aspx?md5=d75055c45e2c5293c3e0fbffb299ea6d"],"2017994":["http://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24761/en_US/McAfee%20Labs%20Threat%20Advisory-VBSAutorun%20Worm.pdf"],"2017999":["http://www.fireeye.com/blog/technical/2014/01/android-hehe-malware-now-disconnects-phone-calls.html"],"2018000":["http://www.fireeye.com/blog/technical/2014/01/android-hehe-malware-now-disconnects-phone-calls.html"],"2018001":["http://www.fireeye.com/blog/technical/2014/01/android-hehe-malware-now-disconnects-phone-calls.html"],"2018002":["http://www.fireeye.com/blog/technical/2014/01/android-hehe-malware-now-disconnects-phone-calls.html"],"2018003":["http://www.fireeye.com/blog/technical/2014/01/android-hehe-malware-now-disconnects-phone-calls.html"],"2018004":["http://www.fireeye.com/blog/technical/2014/01/android-hehe-malware-now-disconnects-phone-calls.html"],"2018007":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231"],"2018008":["http://www.threatexpert.com/report.aspx?md5=37782108e8b7f331a6fdeabef9c8a774","http://www.threatexpert.com/report.aspx?md5=10fa9c6c27e6eb512d12dee8181e182f"],"2018010":["http://www.threatexpert.com/report.aspx?md5=209e6701da137084c2f60c90d64505f2"],"2018012":["http://en.wikipedia.org/wiki/Vagaa"],"2018013":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=1f46b1e0a7fe83d24352e98b3ab3fc3f"],"2018014":["http://www.threatexpert.com/report.aspx?md5=4cab48eec2b882ec33db2e2a13ecffe6"],"2018015":["http://www.threatexpert.com/report.aspx?md5=243dda18666ae2a64685e51d82c5ad69"],"2018016":["http://www.threatexpert.com/report.aspx?md5=243dda18666ae2a64685e51d82c5ad69"],"2018017":["http://www.threatexpert.com/report.aspx?md5=91f885e08d627097fb1116a3d4634b82","http://stopmalvertising.com/malware-reports/analysis-of-the-predator-pain-keylogger.html"],"2018018":["http://www.threatexpert.com/report.aspx?md5=d95845c510ec1f5ad38cb9ccab16c38b"],"2018019":["http://www.threatexpert.com/report.aspx?md5=d95845c510ec1f5ad38cb9ccab16c38b"],"2018022":["http://www.threatexpert.com/report.aspx?md5=914c58df5d868f7c3438921d682f7fe5"],"2018023":["http://www.threatexpert.com/report.aspx?md5=04948b6045730d4ec626f79504c7f9ad","http://www.threatexpert.com/report.aspx?md5=9fff65c23fe403d25c08a5cdd3dc775d"],"2018024":["http://www.threatexpert.com/report.aspx?md5=b2651071fbd14bff5fb39bd90f447d27"],"2018025":["http://www.threatexpert.com/report.aspx?md5=b2651071fbd14bff5fb39bd90f447d27"],"2018026":["http://www.threatexpert.com/report.aspx?md5=b2651071fbd14bff5fb39bd90f447d27"],"2018027":["http://threatexpert.com/report.aspx?md5=f45b1b82c849fbbea3374ae7e9200092"],"2018028":["http://www.arbornetworks.com/asert/2014/01/can-i-play-with-madness/","http://www.threatexpert.com/report.aspx?md5=f1ed53c4665d2893fd116a5b0297fc68"],"2018032":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=2b0f0479b14069b378fb454c92086897"],"2018033":["http://www.threatexpert.com/report.aspx?md5=313535d09865f3629423cd0e9b2903b2","http://www.virustotal.com/en/file/75c454bbcfc06375ad1e8b45d4167d7830083202f06c6309146e9a4870cddfba/analysis/"],"2018034":["http://www.threatexpert.com/report.aspx?md5=74bfd81b345a6ef36be5fcf6964af6e1"],"2018037":["http://malwaremustdie.blogspot.jp/2014/01/and-another-detonating-method-of-todays.html"],"2018046":["http://www.threatexpert.com/report.aspx?md5=13cbc8d458c6dd30e94f46b00f8bda00"],"2018047":["http://blogs.mcafee.com/mcafee-labs/neverquest-banking-trojan-wild"],"2018048":["http://malwaretips.com/blogs/trojandownloader-win32-adload-da-virus/"],"2018049":["http://www.threatexpert.com/report.aspx?md5=112c6db4fb8a9aa18d0cc105662af5a4"],"2018050":["http://www.threatexpert.com/report.aspx?md5=112c6db4fb8a9aa18d0cc105662af5a4"],"2018051":["http://www.threatexpert.com/report.aspx?md5=3cf3d4d5de51a8c37e11595159179571"],"2018054":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=a037b3241c0b957efe6037b25570292f"],"2018057":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=3ae76f6b76e743fd8063e1831236ce24"],"2018058":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018059":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018060":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018061":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018062":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018063":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018064":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018065":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018066":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018067":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018068":["http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/"],"2018069":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231"],"2018071":["http://nakedsecurity.sophos.com/2014/01/31/android-banking-malware-with-a-twist-in-the-delivery/"],"2018072":["http://www.threatexpert.com/report.aspx?md5=0f352448103f7d487e265220006a1c32"],"2018073":["http://www.threatexpert.com/report.aspx?md5=0f352448103f7d487e265220006a1c32"],"2018074":["http://www.threatexpert.com/report.aspx?md5=e8e9eb1cd4be7ab27743887be2aa28e9"],"2018075":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=db1c4342f617798bcb2ba5655d32bf67"],"2018076":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=0be9e3f4507a8ee23bb0c2b6c218d1cc"],"2018077":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=794eac549f98320b818037b8074da320"],"2018078":["http://www.threatexpert.com/report.aspx?md5=1df0ceab582ae94c83d7d2c79389e178"],"2018079":["http://www.threatexpert.com/report.aspx?md5=9d11cfb7799089823483b72daec5fd2b","http://www.threatexpert.com/report.aspx?md5=a01451eae2d47872ce796bb85f116710"],"2018084":["http://www.threatexpert.com/report.aspx?md5=c305a0af3fe84525a993130b7854e3e0"],"2018085":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=b316680fd2578a2781ee9497888bd1e4"],"2018087":["http://msdn.microsoft.com/en-us/library/windows/desktop/bb776392%28v=vs.85%29.aspx","http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-cpl-malware.pdf"],"2018088":["http://beefproject.com"],"2018091":["http://www.securelist.com/en/blog/8177/CVE_2014_0497_a_0_day_vulnerability"],"2018092":["http://netinfiltration.com"],"2018093":["http://netinfiltration.com"],"2018094":["http://www.threatexpert.com/report.aspx?md5=5474129345d9756649c871f9c8b46287","http://www.threatexpert.com/report.aspx?md5=ff5608e00d5e6e81af9c993461479e43"],"2018095":["http://www.threatexpert.com/report.aspx?md5=3eaaf0de35579e5af89ae3dd81d0c592","http://www.threatexpert.com/report.aspx?md5=ac030896aad1b6b0eeb00952dee24c3f"],"2018096":["http://research.zscaler.com/2014/02/new-zbot-variant-goes-above-and-beyond.html","http://techhelplist.com/index.php/tech-tutorials/41-misc/465-asprox-botnet-advertising-fraud-general-overview-1","http://www.threatexpert.com/report.aspx?md5=df5ab239bdf09a8716cabbdfa1d6a724"],"2018097":["http://research.zscaler.com/2014/02/new-zbot-variant-goes-above-and-beyond.html","http://techhelplist.com/index.php/tech-tutorials/41-misc/465-asprox-botnet-advertising-fraud-general-overview-1","http://www.threatexpert.com/report.aspx?md5=df5ab239bdf09a8716cabbdfa1d6a724"],"2018098":["http://research.zscaler.com/2014/02/new-zbot-variant-goes-above-and-beyond.html","http://techhelplist.com/index.php/tech-tutorials/41-misc/465-asprox-botnet-advertising-fraud-general-overview-1","http://www.threatexpert.com/report.aspx?md5=df5ab239bdf09a8716cabbdfa1d6a724"],"2018100":["http://www.threatexpert.com/report.aspx?md5=08881eb702a1525f7792c3fef19ae9ff"],"2018101":["http://www.threatexpert.com/report.aspx?md5=dd6a13ba9177a18a8cf16b52ff643abc"],"2018102":["http://www.threatexpert.com/report.aspx?md5=0425a66e3b268ef8cbdd481d8e44b227"],"2018103":["http://www.securelist.com/en/downloads/vlpdfs/unveilingthemask_v1.0.pdf"],"2018104":["http://www.securelist.com/en/downloads/vlpdfs/unveilingthemask_v1.0.pdf"],"2018105":["http://www.securelist.com/en/downloads/vlpdfs/unveilingthemask_v1.0.pdf"],"2018106":["http://www.securelist.com/en/downloads/vlpdfs/unveilingthemask_v1.0.pdf"],"2018107":["http://blog.sucuri.net/2014/02/joomla-jomsocial-remote-code-execution-vulnerability.html"],"2018108":["http://www.threatexpert.com/report.aspx?md5=aa9686c3161242ba61b779aa325e9d24","http://www.threatexpert.com/report.aspx?md5=88e721f62470f8bd267810fbaa29104f","http://intelcrawler.com/about/press10"],"2018109":["http://www.threatexpert.com/report.aspx?md5=a99d5d1652dfcda190c3d412828dcf6d","http://www.threatexpert.com/report.aspx?md5=82d9cab2692ae13fc5b835ea2cbb36d7","http://anubis.iseclab.org/action=result&task_id=1b92f08cdbfb73e64450fd07ec88849b3"],"2018110":["http://www.threatexpert.com/report.aspx?md5=2f6f13eced7fce495168059530246d77","http://blog.avast.com/2014/01/15/win3264blackbeard-pigeon-stealthiness-techniques-in-64-bit-windows-part-1/"],"2018112":["http://www.threatexpert.com/report.aspx?md5=c9d54e9086357491bd1fdf8d8d804dce"],"2018113":["http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0050"],"2018114":["http://www.threatexpert.com/report.aspx?md5=21f8b9d9a6fa3a0cd3a3f0644636bf09","http://usa.visa.com/download/merchants/Alert-ChewbaccaMalware-030614.pdf","http://symantec.com/security_response/earthlink_writeup.jsp?docid=2013-121813-2446-99"],"2018115":["http://www.cyphort.com/blog/cyphort-tracks-down-new-variants-of-target-malware/"],"2018116":["http://intelcrawler.com/about/press08"],"2018117":["http://community.emc.com/community/connect/rsaxchange/netwitness/blog/2013/12/30/detecting-sinkholed-domains-in-your-environment"],"2018118":["http://itbucket.org/LaNMaSteR53/recon-ng/overview"],"2018119":["http://www.secureworks.com/cyber-threat-intelligence/threats/updates-to-the-citadel-trojan/"],"2018120":["http://blog.avast.com/2014/01/15/win3264blackbeard-pigeon-stealthiness-techniques-in-64-bit-windows-part-1/"],"2018121":["http://www.threatexpert.com/report.aspx?md5=fb570e6d68e708daeceae5dfc544fba2"],"2018122":["http://blog.emsisoft.com/2014/02/03/malware-analysis-ransomware-linkup-blocks-dns-and-mines-bitcoins/"],"2018123":["http://www.virustotal.com/en/file/f80fc95e44d90a8e02de4fde0ea5e58227cbbde7b6d3848c1f8afbd5ed0affe7/analysis/","http://www.threatexpert.com/report.aspx?md5=1d331ef7d24f6316947e94f737d1f219"],"2018124":["http://intelcrawler.com/about/press08"],"2018125":["http://www.threatexpert.com/report.aspx?md5=2e760350a5c692bd94c7c6d1233af72c"],"2018128":["http://www.threatexpert.com/report.aspx?md5=aa9686c3161242ba61b779aa325e9d24","http://www.threatexpert.com/report.aspx?md5=88e721f62470f8bd267810fbaa29104f","http://intelcrawler.com/about/press10"],"2018129":["http://www.threatexpert.com/report.aspx?md5=f27bf471d2f2c0a76331d25fc4761e10","http://www.threatexpert.com/report.aspx?md5=792b725b6a2a52e4eecde846b39eea7d"],"2018130":["http://www.threatexpert.com/report.aspx?md5=f27bf471d2f2c0a76331d25fc4761e10","http://www.threatexpert.com/report.aspx?md5=792b725b6a2a52e4eecde846b39eea7d"],"2018131":["http://isc.sans.edu/forums/diary/Linksys+Worm+Captured/17630"],"2018132":["http://isc.sans.edu/forums/diary/Linksys+Worm+Captured/17630","http://devttys0.com/2014/02/wrt120n-fprintf-stack-overflow/"],"2018133":["http://www.threatexpert.com/report.aspx?md5=dc7284b199d212e73c26a21a0913c69d"],"2018134":["http://www.threatexpert.com/report.aspx?md5=030f3840d2729243280d3cea3d99d8e6"],"2018136":["http://isc.sans.edu/forums/diary/Linksys+Worm+TheMoon+Summary+What+we+know+so+far/17633"],"2018137":["http://blog.fortinet.com/Fake-KakaoTalk-Security-Plug-in/"],"2018138":["http://blog.fortinet.com/Fake-KakaoTalk-Security-Plug-in/"],"2018139":["http://blog.fortinet.com/Fake-KakaoTalk-Security-Plug-in/"],"2018140":["http://blog.fortinet.com/Fake-KakaoTalk-Security-Plug-in/"],"2018142":["http://www.threatexpert.com/report.aspx?md5=63586aef2be494150a492d822147055a"],"2018143":["http://www.threatexpert.com/report.aspx?md5=dd762c69049fbd00c22f70f109baa26e"],"2018147":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0322"],"2018150":["http://www.threatexpert.com/report.aspx?md5=dd3e5b41238a73d627c6c48108a15452"],"2018153":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=29aabeba14f6b5950edcd2a5d99acc94"],"2018154":["http://www.threatexpert.com/report.aspx?md5=dfd6b93dac698dccd9ef565a172123f3"],"2018155":["http://isc.sans.edu/forums/diary/Linksys+Worm+Captured/17630","http://exploit-db.com/exploits/31683/","http://devttys0.com/2014/02/wrt120n-fprintf-stack-overflow/"],"2018156":["http://www.securityfocus.com/archive/1/531107"],"2018157":["http://www.securityfocus.com/archive/1/531107"],"2018158":["http://www.securityfocus.com/archive/1/531107"],"2018159":["http://www.securityfocus.com/archive/1/531107"],"2018160":["http://www.securityfocus.com/archive/1/531107"],"2018164":["http://cert-bund.de/ebury-faq"],"2018165":["http://www.threatexpert.com/report.aspx?md5=6a814cacb0c4b464d85ab874f68a5344"],"2018166":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=52849773bc0d08eb9dfcb0df2b7caf33"],"2018167":["http://www.threatexpert.com/report.aspx?md5=398b6622a2c86d472a4340d3e79e654b"],"2018168":["http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/mediawiki_thumb.rb","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1610"],"2018169":["http://www.threatexpert.com/report.aspx?md5=663d7774b6727a070b558676cee9fe43","http://www.fireeye.com/blog/technical/targeted-attack/2014/02/operation-greedywonk-multiple-economic-and-foreign-policy-sites-compromised-serving-up-flash-zero-day-exploit.html"],"2018174":["http://www.threatexpert.com/report.aspx?md5=d93b888e08693119a1b0dd3983b8d1ec"],"2018176":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-5014","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-5015","http://cxsecurity.com/issue/WLB-2014020199"],"2018181":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=9af77f89a565143983fa008bbd8eedee"],"2018183":["http://www.threatexpert.com/report.aspx?md5=ca15e5e96aee8b18ca6f3c185a690cea"],"2018184":["http://www.threatexpert.com/report.aspx?md5=ca15e5e96aee8b18ca6f3c185a690cea"],"2018185":["http://www.threatexpert.com/report.aspx?md5=43839d131dff01e9b752d91c2c8f68a8"],"2018186":["http://www.threatexpert.com/report.aspx?md5=43839d131dff01e9b752d91c2c8f68a8"],"2018187":["http://www.threatexpert.com/report.aspx?md5=43839d131dff01e9b752d91c2c8f68a8"],"2018188":["http://www.threatexpert.com/report.aspx?md5=43839d131dff01e9b752d91c2c8f68a8"],"2018193":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=aa717cce1ccfc766e0c8ad7a217f4be3"],"2018195":["http://www.threatexpert.com/report.aspx?md5=efa0bed2695446eab679083a9f0f89c6"],"2018197":["http://www.threatexpert.com/report.aspx?md5=2fae46d1a71a893834a01ed3106b8036"],"2018198":["http://www.threatexpert.com/report.aspx?md5=494d0fb7efaabaf9c69edbc58360671f","http://www.threatexpert.com/report.aspx?md5=1fd3e714669ac8a3bc4af33a3e6cf21f","http://www.virusradar.com/en/Win32_Kryptik.BSYO/description"],"2018200":["http://microsoft.com/security/portal/threat/encyclopedia/entry.aspx?name=TROJAN%3AWIN32/MATSNU.L","http://www.threatexpert.com/report.aspx?md5=38b1862a42a6453d8ccdf1c2d2eff018"],"2018201":["http://www.threatexpert.com/report.aspx?md5=f01260fff3d6fb705fc8afaa3ea54564"],"2018204":["http://www.anubisnetworks.com/the-return-of-qakbot/","http://www.threatexpert.com/report.aspx?md5=e9201c8b126ac40229e9ce3f82f5c608","http://www.threatexpert.com/report.aspx?md5=749a7bf2ad84212bd78e46d240a4f434"],"2018205":["http://www.threatexpert.com/report.aspx?md5=494d0fb7efaabaf9c69edbc58360671f","http://www.threatexpert.com/report.aspx?md5=1fd3e714669ac8a3bc4af33a3e6cf21f","http://www.virusradar.com/en/Win32_Kryptik.BSYO/description"],"2018208":["http://github.com/jseidl/GoldenEye"],"2018210":["http://www.threatexpert.com/report.aspx?md5=d28e9e62c83ef2308ddcdbad91fe9cb9"],"2018211":["http://blogs.cisco.com/security/dynamic-detection-of-malicious-ddns/","http://labs.umbrella.com/2013/04/15/on-the-trail-of-malicious-dynamic-dns-domains/"],"2018212":["http://blogs.cisco.com/security/dynamic-detection-of-malicious-ddns/","http://labs.umbrella.com/2013/04/15/on-the-trail-of-malicious-dynamic-dns-domains/"],"2018213":["http://blogs.cisco.com/security/dynamic-detection-of-malicious-ddns/","http://labs.umbrella.com/2013/04/15/on-the-trail-of-malicious-dynamic-dns-domains/"],"2018214":["http://blogs.cisco.com/security/dynamic-detection-of-malicious-ddns/","http://labs.umbrella.com/2013/04/15/on-the-trail-of-malicious-dynamic-dns-domains/"],"2018215":["http://blogs.cisco.com/security/dynamic-detection-of-malicious-ddns/","http://labs.umbrella.com/2013/04/15/on-the-trail-of-malicious-dynamic-dns-domains/"],"2018216":["http://blogs.cisco.com/security/dynamic-detection-of-malicious-ddns/","http://labs.umbrella.com/2013/04/15/on-the-trail-of-malicious-dynamic-dns-domains/"],"2018217":["http://isc.sans.edu/diary/Fiesta!/17739"],"2018218":["http://isc.sans.edu/diary/Fiesta!/17739"],"2018228":["http://fireeye.com/blog/technical/targeted-attack/2014/08/operation-poisoned-hurricane.html","http://alienvault.com/open-threat-exchange/blog/the-connection-between-the-plugx-chinese-gang-and-the-latest-internet-explo","http://securelist.com/blog/incidents/57197/the-rush-for-cve-2013-3906-a-hot-commodity/","http://fireeye.com/blog/technical/cyber-exploits/2013/11/exploit-proliferation-additional-threat-groups-acquire-cve-2013-3906.html"],"2018230":["http://www.threatexpert.com/report.aspx?md5=4b779acb1a0e726cee73fc2ca8a6a0be"],"2018232":["http://www.team-cymru.com/ReadingRoom/Whitepapers/2013/TeamCymruSOHOPharming.pdf"],"2018243":["http://www.threatexpert.com/report.aspx?md5=6557d6518c3f6bcb8b1b2de77165c962"],"2018244":["http://www.threatexpert.com/report.aspx?md5=6557d6518c3f6bcb8b1b2de77165c962"],"2018245":["http://blog.spiderlabs.com/2014/03/gamut-spambot-analysis-.html","http://www.threatexpert.com/report.aspx?md5=f00f3f47062646f900aa327b1d5ca3a1"],"2018246":["http://blog.spiderlabs.com/2014/03/gamut-spambot-analysis-.html","http://www.threatexpert.com/report.aspx?md5=f00f3f47062646f900aa327b1d5ca3a1"],"2018247":["http://info.baesystemsdetica.com/rs/baesystems/images/snake_whitepaper.pdf"],"2018248":["http://info.baesystemsdetica.com/rs/baesystems/images/snake_whitepaper.pdf"],"2018249":["http://www.alienvault.com/open-threat-exchange/blog/botnet-bruteforcing-point-of-sale-via-remote-desktop/"],"2018250":["http://www.alienvault.com/open-threat-exchange/blog/botnet-bruteforcing-point-of-sale-via-remote-desktop/"],"2018253":["http://www.threatexpert.com/report.aspx?md5=c0c1f1a69a1b59c6f2dab18135a73919","http://www.threatexpert.com/report.aspx?md5=e310cf7385ae4d15956e461c6d118c91","http://www.threatexpert.com/report.aspx?md5=d316d208a66248c09986896f671f1db1","http://www.alienvault.com/open-threat-exchange/blog/botnet-bruteforcing-point-of-sale-via-remote-desktop/"],"2018254":["http://www.threatexpert.com/report.aspx?md5=5d9d5b9089ad464e51ff391b14da1953"],"2018255":["http://www.threatexpert.com/report.aspx?md5=c6e161a948f4474849d5740b2f27964a"],"2018257":["http://blog.spiderlabs.com/2014/03/gamut-spambot-analysis-.html","http://www.threatexpert.com/report.aspx?md5=f00f3f47062646f900aa327b1d5ca3a1"],"2018263":["http://console-cowboys.blogspot.com/2014/03/the-curious-case-of-ninjamonkeypiratela.html"],"2018264":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018265":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018266":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018267":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018268":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018269":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018270":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018271":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018272":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018273":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018274":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018275":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018276":["http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf","http://github.com/eset/malware-ioc"],"2018281":["http://www.threatexpert.com/report.aspx?md5=154a2366cd3e39e8625f5f737f9da8f1","http://www.threatexpert.com/report.aspx?md5=9475f91a426ac45d1f074373034cbea6"],"2018283":["http://www.threatexpert.com/report.aspx?md5=154a2366cd3e39e8625f5f737f9da8f1","http://www.threatexpert.com/report.aspx?md5=e01c79d227c6315150f7ff0afe40db4c"],"2018284":["http://www.threatexpert.com/report.aspx?md5=00e7afce84c84cd70fe329d8bb8c0731"],"2018285":["http://www.threatexpert.com/report.aspx?md5=185e930a19ad1a99c226d59ef563e28c","http://blog.trendmicro.com/trendlabs-security-intelligence/the-siesta-campaign-a-new-targeted-attack-awakens/","http://fireeye.com/blog/technical/targeted-attack/2014/03/a-detailed-examination-of-the-siesta-campaign.html"],"2018287":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=ece8808981043f830bacc4133d68e394"],"2018288":["http://www.exploit-db.com/exploits/31459/"],"2018289":["http://www.exploit-db.com/exploits/31459/"],"2018290":["http://blog.spiderlabs.com/2014/03/coldfusion-admin-compromise-analysis-cve-2010-2861.html"],"2018291":["http://www.fireeye.com/blog/technical/2014/03/from-windows-to-droids-an-insight-in-to-multi-vector-attack-mechanisms-in-rats.html","http://www.threatexpert.com/report.aspx?md5=815576890789003a7575c2948508c6b1"],"2018292":["http://www.fireeye.com/blog/technical/2014/03/from-windows-to-droids-an-insight-in-to-multi-vector-attack-mechanisms-in-rats.html"],"2018293":["http://www.fireeye.com/blog/technical/2014/03/from-windows-to-droids-an-insight-in-to-multi-vector-attack-mechanisms-in-rats.html"],"2018294":["http://www.fireeye.com/blog/technical/2014/03/from-windows-to-droids-an-insight-in-to-multi-vector-attack-mechanisms-in-rats.html"],"2018295":["http://www.threatexpert.com/report.aspx?md5=6faa7077de347ee0fa8c991934c2c3a5","http://www.threatexpert.com/report.aspx?md5=a1fe3a7ff1ec997411b71212483eea33","http://www.threatexpert.com/report.aspx?md5=97c0000473c5004d2e8c0464e322f429"],"2018296":["http://www.threatexpert.com/report.aspx?md5=bd850c21254c33cd9f6be41aafc6bf46"],"2018300":["http://www.threatexpert.com/report.aspx?md5=6ca1690720b3726bc76ef0e7310c9ee7"],"2018301":["http://www.threatexpert.com/report.aspx?md5=55668102739536c1b00bce9e02d8b587"],"2018306":["http://securehoney.net/blog/how-to-dissect-android-flappy-bird-malware.html","http://www.threatexpert.com/report.aspx?md5=6c357ac34d061c97e6237ce9bd1fe003"],"2018307":["http://www.threatexpert.com/report.aspx?md5=20c7226185ed7999e330a46d3501dccb"],"2018308":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1761","http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095-recommendation-to-stay-protected-and-for-detections.aspx"],"2018309":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1761","http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095-recommendation-to-stay-protected-and-for-detections.aspx"],"2018310":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1761","http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095-recommendation-to-stay-protected-and-for-detections.aspx"],"2018311":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1761","http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095-recommendation-to-stay-protected-and-for-detections.aspx"],"2018312":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1761","http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095-recommendation-to-stay-protected-and-for-detections.aspx"],"2018313":["http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095-recommendation-to-stay-protected-and-for-detections.aspx"],"2018314":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1761","http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095-recommendation-to-stay-protected-and-for-detections.aspx"],"2018315":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-2539"],"2018316":["http://vrt-blog.snort.org/2014/03/decoding-domain-generation-algorithms.html"],"2018320":["http://www.fireeye.com/blog/technical/malware-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html","http://www.threatexpert.com/report.aspx?md5=aaf73666cbd750ed22b80ed836d2b1e4"],"2018321":["http://www.fireeye.com/blog/technical/malware-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html","http://www.threatexpert.com/report.aspx?md5=b362f833c9d6e5bed19aeec5a5b868ea"],"2018322":["http://community.emc.com/community/connect/rsaxchange/netwitness/blog/2014/03/25/captcha-protected-malware-downloader"],"2018323":["http://webroot.com/blog/2014/03/25/deceptive-ads-expose-users-adware-linkularwin32-speedupmypc-puas-potentially-unwanted-applications/"],"2018324":["http://blog.malwarebytes.org/online-security/2014/03/soundcloud-downloader-always-read-the-eulas/","http://www.threatexpert.com/report.aspx?md5=2e20e446943ecd01d3a668083d81d1fc"],"2018325":["http://www.threatexpert.com/report.aspx?md5=a45d3564d1fa27161b33712f035a5962","http://www.fireeye.com/blog/technical/2013/10/know-your-enemy-tracking-a-rapidly-evolving-apt-actor.html"],"2018326":["http://exploit-db.com/exploits/17734/","http://blog.spiderlabs.com/2014/03/honeypot-alert-jce-joomla-extension-attacks.html"],"2018331":["http://www.threatexpert.com/report.aspx?md5=cb6cb201eab321f7a827bb3cb1b311b6"],"2018332":["http://www.threatexpert.com/report.aspx?md5=cb6cb201eab321f7a827bb3cb1b311b6"],"2018333":["http://www.threatexpert.com/report.aspx?md5=23246f740cffc0bd9eb5be2e7703568a"],"2018336":["http://techhelplist.com/index.php/tech-tutorials/41-misc/438-asprox-botnet-trojan-run-malware-spamming-1","http://stopmalvertising.com/tag/asprox.html"],"2018340":["http://www.threatexpert.com/report.aspx?md5=3a03a20bfefe3fdd01659d47d2ed76c8"],"2018341":["http://www.threatexpert.com/report.aspx?md5=73d2dd466df92b77a4c34adcd13e8b50","http://community.emc.com/community/connect/rsaxchange/netwitness/blog/2014/03/28/new-kazy-variant-kazy-forces"],"2018343":["http://isc.sans.edu/forums/diary/More+Device+Malware+This+is+why+your+DVR+attacked+my+Synology+Disk+Station+and+now+with+Bitcoin+Miner/17879"],"2018344":["http://isc.sans.edu/forums/diary/More+Device+Malware+This+is+why+your+DVR+attacked+my+Synology+Disk+Station+and+now+with+Bitcoin+Miner/17879"],"2018345":["http://www.threatexpert.com/report.aspx?md5=cb6cb201eab321f7a827bb3cb1b311b6"],"2018353":["http://www.threatexpert.com/report.aspx?md5=f8ff430aee52da3b4b1759700be9aead","http://www.welivesecurity.com/2014/04/02/win32sality-newest-component-a-routers-primary-dns-changer-named-win32rbrute/"],"2018354":["http://www.threatexpert.com/report.aspx?md5=f8ff430aee52da3b4b1759700be9aead","http://www.welivesecurity.com/2014/04/02/win32sality-newest-component-a-routers-primary-dns-changer-named-win32rbrute/"],"2018355":["http://www.threatexpert.com/report.aspx?md5=f8ff430aee52da3b4b1759700be9aead","http://www.welivesecurity.com/2014/04/02/win32sality-newest-component-a-routers-primary-dns-changer-named-win32rbrute/"],"2018356":["http://www.threatexpert.com/report.aspx?md5=055a9be75e469f8817c9311390a449f6","http://www.welivesecurity.com/2014/04/02/win32sality-newest-component-a-routers-primary-dns-changer-named-win32rbrute/"],"2018364":["http://help.ovh.co.uk/SslOnHosting","http://www.threatexpert.com/report.aspx?md5=63079a2471fc18323f355ec28f36303c","http://www.threatexpert.com/report.aspx?md5=20b1c30ef1f5dae656529b277e5b73fb"],"2018367":["http://www.threatexpert.com/report.aspx?md5=65e5b8e84772f55d761a85bf53c14169","http://www.threatexpert.com/report.aspx?md5=cfda690ebe7bccc5c3063487f6e54086"],"2018368":["http://www.threatexpert.com/report.aspx?md5=129563c2ab034af094422db408d7d74f"],"2018369":["http://www.fidelissecurity.com/webfm_send/377","http://pastebin.com/XAG1Hnfd"],"2018370":["http://pastebin.com/m44e60e60","http://www.fidelissecurity.com/webfm_send/377"],"2018371":["http://pastebin.com/m44e60e60","http://www.fidelissecurity.com/webfm_send/377"],"2018372":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018373":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018374":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018375":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018376":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018377":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018378":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018379":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3aWin32%2fMecklow.A&ThreatID=-2147325849","http://www.threatexpert.com/report.aspx?md5=3422e76cf4c99ec1091f8c342a3aedaa","http://www.kahusecurity.com/2011/apec-spearphish-2/"],"2018380":["http://www.threatexpert.com/report.aspx?md5=df9ce5d06498419a3c93ad95a2ed82fd","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3aWin32%2fMecklow.A&ThreatID=-2147325849","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_ixeshe.pdf"],"2018382":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018383":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018384":["http://www.threatexpert.com/report.aspx?md5=94d5d99b910f9184573a01873fdc42fc"],"2018385":["http://www.threatexpert.com/report.aspx?md5=94d5d99b910f9184573a01873fdc42fc"],"2018388":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018389":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160","http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/","http://heartbleed.com/","http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"],"2018390":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FPcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=4f0d365408b439eb9aaf0b2352abb662"],"2018392":["http://doc.emergingthreats.net/bin/view/Main/2008953"],"2018393":["http://blogs.mcafee.com/mcafee-labs/plasma-http-botnet-steals-stored-passwords-chrome-filezilla","http://www.threatexpert.com/report.aspx?md5=ffbf380abaa7c56b45edd2784feecf36"],"2018395":["http://www.threatexpert.com/report.aspx?md5=9db28205c8dd40efcf7f61e155a96de5"],"2018404":["http://www.threatexpert.com/report.aspx?md5=67d52ae285ac82f959b3675550de8a2d","http://www.threatexpert.com/report.aspx?md5=e668a501bd107de161378a9fd9c5d1f2"],"2018412":["http://www.threatexpert.com/report.aspx?md5=0b450a92f29181065bc6601333f01b07","http://www.threatexpert.com/report.aspx?md5=548fbf4dde27e725c0a1544f61362b50","http://arbornetworks.com/asert/2014/04/trojan-eclipse-a-bad-moon-rising"],"2018416":["http://digitalpbk.blogspot.com/2009/10/ftpchk3-virus-php-pl-hacked-website.html","http://labs.mwrinfosecurity.com/system/assets/131/original/Journey-to-the-Centre-of-the-Breach.pdf"],"2018417":["http://digitalpbk.blogspot.com/2009/10/ftpchk3-virus-php-pl-hacked-website.html","http://labs.mwrinfosecurity.com/system/assets/131/original/Journey-to-the-Centre-of-the-Breach.pdf"],"2018418":["http://www.threatexpert.com/report.aspx?md5=19e17898e99af83e5fff9c3bad553bb2"],"2018419":["http://www.threatexpert.com/report.aspx?md5=aa696180cd0369e264ed8e9137a4f254"],"2018420":["http://www.threatexpert.com/report.aspx?md5=0d7dd2a6c69f2ae7e575ee8640432c4b"],"2018423":["http://www.arbornetworks.com/asert/2014/04/trojan-eclipse-a-bad-moon-rising/"],"2018426":["http://www.circl.lu/pub/tr-23/"],"2018427":["http://www.circl.lu/pub/tr-23/"],"2018428":["http://www.securelist.com/en/blog/8212/New_Flash_Player_0_day_CVE_2014_0515_used_in_watering_hole_attacks"],"2018434":["http://community.websense.com/blogs/securitylabs/archive/2014/04/28/cve-2014-1776-using-crash-reports-to-find-possible-exploited-vulnerabilities.aspx","http://www.websense.com/assets/reports/websense-crash-report-en.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1776"],"2018435":["http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanDownloader%3AWin32%2FHicrazyk.A&ThreatID=-2147281007","http://www.threatexpert.com/report.aspx?md5=ddb8110ec415b7b6f43c0ef2b4076d45"],"2018436":["http://community.websense.com/blogs/securitylabs/archive/2014/04/28/cve-2014-1776-using-crash-reports-to-find-possible-exploited-vulnerabilities.aspx","http://www.websense.com/assets/reports/websense-crash-report-en.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1776"],"2018438":["http://osint.bambenekconsulting.com/manual/vpnoverdns.txt"],"2018443":["http://vrt-blog.snort.org/2014/05/continued-analysis-of-lightsout-exploit.html"],"2018447":["http://vrt-blog.snort.org/2014/05/continued-analysis-of-lightsout-exploit.html"],"2018448":["http://www.facebook.com/notes/protect-the-graph/sefnit-is-back/1448087102098103"],"2018452":["http://www.threatexpert.com/report.aspx?md5=3c53c9f7ab32a09de89bb44e5f91f9af"],"2018456":["http://blog.malwaremustdie.org/2014/05/elf-shared-so-dynamic-library-malware.html"],"2018459":["http://blog.malwaremustdie.org/2014/05/elf-shared-so-dynamic-library-malware.html"],"2018462":["http://blogs.mcafee.com/mcafee-labs/targeted-attacks-japanese-firm-use-old-activex-vulnerability","http://www.threatexpert.com/report.aspx?md5=2b91011e122364148698a249c2f4b7fe","http://www.threatexpert.com/report.aspx?md5=6c040be9d91083ffba59405f9b2c89bf"],"2018465":["http://www.symantec.com/security_response/writeup.jsp?docid=2013-070113-1904-99&tabid=3","http://www.crowdstrike.com/blog/adwind-rat-rebranding/index.html"],"2018466":["http://www.symantec.com/security_response/writeup.jsp?docid=2013-070113-1904-99&tabid=3","http://www.crowdstrike.com/blog/adwind-rat-rebranding/index.html"],"2018467":["http://www.threatexpert.com/report.aspx?md5=9972e686d36f1e98ba9bb82b5528255a"],"2018468":["http://www.threatexpert.com/report.aspx?md5=9972e686d36f1e98ba9bb82b5528255a"],"2018474":["http://www.secureworks.com/resources/blog/research/hellobridge-trojan-uses-heartbleed-news-to-lure-victims/"],"2018475":["http://www.secureworks.com/resources/blog/research/hellobridge-trojan-uses-heartbleed-news-to-lure-victims/"],"2018477":["http://www.threatexpert.com/report.aspx?md5=86b5491831522f3c7bdcdacb17417514","http://www.threatexpert.com/report.aspx?md5=2bebb36872b4829f553326e102d014ed"],"2018478":["http://www.threatexpert.com/report.aspx?md5=86b5491831522f3c7bdcdacb17417514","http://www.threatexpert.com/report.aspx?md5=2bebb36872b4829f553326e102d014ed"],"2018479":["http://www.threatexpert.com/report.aspx?md5=28173e257188ce3b3cc663be661bc2c4","http://www.threatexpert.com/report.aspx?md5=2bebb36872b4829f553326e102d014ed"],"2018482":["http://blog.malwaremustdie.org/2014/05/threat-analysis-zendran-elf-ddos-scheme.html","http://capsop.com/lightaidra-cc-investigation/"],"2018483":["http://blog.malwaremustdie.org/2014/05/threat-analysis-zendran-elf-ddos-scheme.html","http://capsop.com/lightaidra-cc-investigation/"],"2018484":["http://blog.malwaremustdie.org/2014/05/threat-analysis-zendran-elf-ddos-scheme.html","http://capsop.com/lightaidra-cc-investigation/"],"2018485":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=9214f110f356e0ccccbab16266ae2a06"],"2018486":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=2acd1b235e12dc9b961e7236f6db8144"],"2018487":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=3063e7406947d00b792cb013ca667a69"],"2018488":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=17274afd768cd0cbc2aa236cf82ab951"],"2018491":["http://welivesecurity.com/2014/05/20/miniduke-still-duking/"],"2018494":["http://www.threatexpert.com/report.aspx?md5=fe56b5a28eac390aa8cfb1402360958b","http://sslbl.abuse.ch"],"2018495":["http://bouk.co/blog/elasticsearch-rce/"],"2018496":["http://www.threatexpert.com/report.aspx?md5=fa50062b7763487b3dd6f9ed0a2f3549","http://pastebin.com/qnLmpKuQ"],"2018499":["http://www.threatexpert.com/report.aspx?md5=6213597f40ecb3e7cf2ab3ee5c8b1c70"],"2018504":["http://community.emc.com/community/connect/rsaxchange/netwitness/blog/2014/05/16/zeuscoiner-detection-zeus-variant-engages-in-bitcoining"],"2018507":["http://www.threatexpert.com/report.aspx?md5=3b440e052da726942763d11cf9e3f72c"],"2018508":["http://www.threatexpert.com/report.aspx?md5=b13db8b21289971b3c88866d202fad49"],"2018512":["http://www.threatexpert.com/report.aspx?md5=a74b1602a50b9c7d3262e3f80a6a2e68"],"2018513":["http://www.threatexpert.com/report.aspx?md5=37b91123a58a48975770241445392aeb"],"2018515":["http://www.threatexpert.com/report.aspx?md5=9c087d528beefd22743666af772465fc"],"2018516":["http://www.threatexpert.com/report.aspx?md5=759db11b07f3a370338f2e0a28eb1def","http://www.virusradar.com/en/Win32_Spy.Banker.AAQD/description"],"2018518":["http://securelist.com/en/descriptions/10316591/Trojan.Win32.VBKrypt.cugq","http://mcafee.com/threat-intelligence/malware/default.aspx?id=456326","http://sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Agent-RDK/detailed-analysis.aspx","http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya"],"2018519":["http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://www.arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya/"],"2018520":["http://www.threatexpert.com/report.aspx?md5=92608e6ff795862f83d891ad8337b387"],"2018522":["http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://www.arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya/"],"2018523":["http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://www.arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya/"],"2018524":["http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://www.arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya/"],"2018525":["http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://www.arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya/"],"2018526":["http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://www.arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya/"],"2018527":["http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://www.arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya/"],"2018528":["http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://www.arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya/"],"2018529":["http://www.threatexpert.com/report.aspx?md5=a95dacba360e45fc03769ea55c546a7b","http://www.arbornetworks.com/asert/2014/06/the-best-of-both-worlds-soraya/"],"2018532":["http://www.threatexpert.com/report.aspx?md5=810b4464785d8d007ca0c86c046ac0ef"],"2018533":["http://www.threatexpert.com/report.aspx?md5=37e36531e6dbc3ad0954fd9bb4588fad"],"2018541":["http://circl.lu/pub/tr-24/"],"2018543":["http://www.threatexpert.com/report.aspx?md5=0400671fd3804fbf3fd1d6cf707bced4","http://www.threatexpert.com/report.aspx?md5=1dfaeb7b985d2ba039cd158f63b8ae54"],"2018546":["http://www.arbornetworks.com/asert/2014/06/illuminating-the-etumbot-apt-backdoor/","http://www.threatexpert.com/report.aspx?md5=ca838b98ca0f516858a8a523dcd1338d"],"2018547":["http://www.arbornetworks.com/asert/2014/06/illuminating-the-etumbot-apt-backdoor/","http://www.threatexpert.com/report.aspx?md5=ca838b98ca0f516858a8a523dcd1338d"],"2018548":["http://www.arbornetworks.com/asert/2014/06/illuminating-the-etumbot-apt-backdoor/","http://www.threatexpert.com/report.aspx?md5=ca838b98ca0f516858a8a523dcd1338d"],"2018549":["http://www.arbornetworks.com/asert/2014/06/illuminating-the-etumbot-apt-backdoor/","http://www.threatexpert.com/report.aspx?md5=ca838b98ca0f516858a8a523dcd1338d"],"2018550":["http://www.arbornetworks.com/asert/2014/06/illuminating-the-etumbot-apt-backdoor/","http://www.threatexpert.com/report.aspx?md5=ca838b98ca0f516858a8a523dcd1338d"],"2018551":["http://www.arbornetworks.com/asert/2014/06/illuminating-the-etumbot-apt-backdoor/","http://www.threatexpert.com/report.aspx?md5=ca838b98ca0f516858a8a523dcd1338d"],"2018552":["http://www.threatexpert.com/report.aspx?md5=82d4850a02375a7447d2d0381b642a72","http://www.threatexpert.com/report.aspx?md5=ff5a7a610746ab5492cc6ab284138852","http://arbornetworks.com/asert/wp-content/uploads/2014/06/ASERT-Threat-Intelligence-Brief-2014-07-Illuminating-Etumbot-APT.pdf"],"2018553":["http://blogs.rsa.com/new-pandemiya-trojan-emerges-alternative-zeus-based-variants"],"2018554":["http://resources.crowdstrike.com/putterpanda/","http://www.threatexpert.com/report.aspx?md5=544fca6eb8181f163e2768c81f2ba0b3"],"2018555":["http://resources.crowdstrike.com/putterpanda/"],"2018556":["http://www.threatexpert.com/report.aspx?md5=9fcbc6def809520e77dd7af984f82fd5","http://www.threatexpert.com/report.aspx?md5=71e752dd4c4df15a910c17eadb8b15ba"],"2018557":["http://www.threatexpert.com/report.aspx?md5=9aa08a2700074c7a8a81e49dc8396e00","http://www.threatexpert.com/report.aspx?md5=50f1fc1085f18a25c09c08566fc1a457"],"2018558":["http://www.threatexpert.com/report.aspx?md5=3fc81e102825a74b27faabbcd9408993","http://contagiodump.blogspot.com/2012/01/blackhole-ramnit-samples-and-analysis.html","http://www.threatexpert.com/report.aspx?md5=5740a73856128270b37ec4afae870d12"],"2018559":["http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002"],"2018560":["http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002"],"2018561":["http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002"],"2018565":["http://www.threatexpert.com/report.aspx?md5=408e8969cd0abd153eab6696f8add363"],"2018566":["http://www.threatexpert.com/report.aspx?md5=0392fb51816dd9583f9cb206a2cf02d9","http://bluecoat.com/security-blog/2014-06-10/snake-grass-python-based-malware-used-targeted-attacks"],"2018567":["http://www.threatexpert.com/report.aspx?md5=f761060ced467394a6f87fd2204c6a74","http://bluecoat.com/security-blog/2014-06-10/snake-grass-python-based-malware-used-targeted-attacks"],"2018574":["http://www.fireeye.com/blog/technical/malware-research/2014/06/a-not-so-civic-duty-asprox-botnet-campaign-spreads-court-dates-and-malware.html"],"2018578":["http://phishme.com/project-dyre-new-rat-slurps-bank-credentials-bypasses-ssl/"],"2018579":["http://www.threatexpert.com/report.aspx?md5=b61145a54698753cecf8748359c9d81e"],"2018580":["http://www.threatexpert.com/report.aspx?md5=bef57db893b54c5605d0e3e7d50d6d70","http://www.threatexpert.com/report.aspx?md5=bf555378d935de805f39c2d2d965a888","http://securitykitten.github.io/an-evening-with-n3utrino/"],"2018582":["http://welivesecurity.com/2014/01/17/boaxxe-adware-a-good-advert-sells-the-product-without-drawing-attention-to-itself-part-2/","http://blogs.technet.com/b/mmpc/archive/2014/05/13/msrt-may-2014-miuref.aspx"],"2018584":["http://fireeye.com/blog/technical/2014/06/what-are-you-doing-dsencrypt-malware.html","http://www.threatexpert.com/report.aspx?md5=04d24eb45d3278400b5fee5c1b06226c"],"2018585":["http://arstechnica.com/security/2014/06/at-least-32000-servers-broadcast-admin-passwords-in-the-clear-advisory-warns/"],"2018586":["http://arstechnica.com/security/2014/06/at-least-32000-servers-broadcast-admin-passwords-in-the-clear-advisory-warns/"],"2018587":["http://arstechnica.com/security/2014/06/at-least-32000-servers-broadcast-admin-passwords-in-the-clear-advisory-warns/"],"2018588":["http://arstechnica.com/security/2014/06/at-least-32000-servers-broadcast-admin-passwords-in-the-clear-advisory-warns/"],"2018590":["http://www.threatexpert.com/report.aspx?md5=c610d46d97c1b80f027f56d227a003f7"],"2018596":["http://www.threatexpert.com/report.aspx?md5=b61145a54698753cecf8748359c9d81e","http://phishme.com/project-dyre-new-rat-slurps-bank-credentials-bypasses-ssl/"],"2018598":["http://www.threatexpert.com/report.aspx?md5=280ffd0653d150906a65cd513fcafc27","http://www.threatexpert.com/report.aspx?md5=f1c8cc93d4e0aabd4713621fe271abc8","http://arbornetworks.com/asert/2014/06/the-citadel-and-gameover-campaigns-of-5cb682c10440b2ebaf9f28c1fe438468/"],"2018599":["http://www.threatexpert.com/report.aspx?md5=280ffd0653d150906a65cd513fcafc27","http://www.threatexpert.com/report.aspx?md5=f1c8cc93d4e0aabd4713621fe271abc8","http://arbornetworks.com/asert/2014/06/the-citadel-and-gameover-campaigns-of-5cb682c10440b2ebaf9f28c1fe438468/"],"2018601":["http://thehackerblog.com/every-c99-php-shell-is-backdoored-aka-free-shells/"],"2018602":["http://thehackerblog.com/every-c99-php-shell-is-backdoored-aka-free-shells/"],"2018603":["http://thehackerblog.com/every-c99-php-shell-is-backdoored-aka-free-shells/"],"2018604":["http://www.threatexpert.com/report.aspx?md5=65125129418e07ce1000aa677b66b72f"],"2018605":["http://cxsecurity.com/issue/WLB-2014060134"],"2018607":["http://phpcrawl.cuab.de/"],"2018612":["http://www.exploit-db.com/exploits/33809/"],"2018614":["http://www.threatexpert.com/report.aspx?md5=f9f30307ca22d092c02701c108aa6402"],"2018615":["http://www.threatexpert.com/report.aspx?md5=f9f30307ca22d092c02701c108aa6402"],"2018616":["http://www.threatexpert.com/report.aspx?md5=f9f30307ca22d092c02701c108aa6402"],"2018618":["http://cert.pl/news/8478/langswitch_lang/en"],"2018623":["http://stopmalvertising.com/rootkits/analysis-of-a-triple-click-fraud-threat.html"],"2018624":["http://stopmalvertising.com/rootkits/analysis-of-a-triple-click-fraud-threat.html"],"2018625":["http://stopmalvertising.com/rootkits/analysis-of-a-triple-click-fraud-threat.html"],"2018626":["http://stopmalvertising.com/rootkits/analysis-of-a-triple-click-fraud-threat.html"],"2018629":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf"],"2018630":["http://www.threatexpert.com/report.aspx?md5=a78e904a05d4a9e6a15b6f56b261eab9"],"2018631":["http://secureworks.com/resources/blog/research/apt-campaign-leverages-the-cueisfry-trojan-and-microsoft-word-vulnerability-cve-2014-1761/","http://www.threatexpert.com/report.aspx?md5=1c29b24d4d4ef7568f519c470b51bbed"],"2018632":["http://blog.trendmicro.com/trendlabs-security-intelligence/antifulai-targeted-attack-exploits-ichitaro-vulnerability/"],"2018633":["http://blog.trendmicro.com/trendlabs-security-intelligence/antifulai-targeted-attack-exploits-ichitaro-vulnerability/"],"2018634":["http://blog.trendmicro.com/trendlabs-security-intelligence/antifulai-targeted-attack-exploits-ichitaro-vulnerability/"],"2018636":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=5b50cc5215694841b9faea0fde472648"],"2018637":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=f80fc82b5ff8f65f02ba7af363f84264"],"2018638":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=c8564898ab2598a075cbb478d104e750"],"2018639":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=3134e62b117f9994e173c262b1bcbca5"],"2018641":["http://www.threatexpert.com/report.aspx?md5=ceb6684ffce35dcbfae4afde3b6fd4bd"],"2018643":["http://www.threatexpert.com/report.aspx?md5=e1cbdba0c57ddb5ab70aa1306dbacaa9"],"2018644":["http://www.threatexpert.com/report.aspx?md5=9a705a2c25a8b30de80e59dbb9adab83"],"2018645":["http://www.threatexpert.com/report.aspx?md5=dd141287cb45a2067592eeb9d3aa7162"],"2018646":["http://www.threatexpert.com/report.aspx?md5=7f5709c924bb1417a180a4fa8311a2e9"],"2018648":["http://www.exploit-db.com/exploits/33991/"],"2018649":["http://www.threatexpert.com/report.aspx?md5=03092adccde639ba26ef2e192c49f62d"],"2018650":["http://www.threatexpert.com/report.aspx?md5=03092adccde639ba26ef2e192c49f62d"],"2018652":["http://www.exploit-db.com/exploits/33989/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-2424"],"2018653":["http://www.threatexpert.com/report.aspx?md5=b67e23e4a0248c71b71e73e37d52c906"],"2018654":["http://www.threatexpert.com/report.aspx?md5=b67e23e4a0248c71b71e73e37d52c906"],"2018656":["http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-4671"],"2018657":["http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-4671"],"2018658":["http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-4671"],"2018659":["http://www.threatexpert.com/report.aspx?md5=24d9f082b849b4c698e6b012500d441a"],"2018660":["http://www.threatexpert.com/report.aspx?md5=24d9f082b849b4c698e6b012500d441a"],"2018661":["http://www.threatexpert.com/report.aspx?md5=5a99a6a6cd8600ea88a8fcc1409b82f4"],"2018663":["http://www.threatexpert.com/report.aspx?md5=45bf9f6e19649d3e1642854ecd82623c"],"2018664":["http://www.threatexpert.com/report.aspx?md5=d92075280872b9fe4f541f090bf0076c"],"2018666":["http://www.threatexpert.com/report.aspx?md5=5e5e46145409fb4a5c8a004217eef836"],"2018667":["http://blog.malcovery.com/blog/breaking-gameover-zeus-returns","http://www.threatexpert.com/report.aspx?md5=5e5e46145409fb4a5c8a004217eef836"],"2018669":["http://circl.lu/pub/tr-25/"],"2018670":["http://circl.lu/pub/tr-25/"],"2018675":["http://deependresearch.org/2014/07/another-linux-ddos-bot-via-cve-2012-1823.html"],"2018676":["http://www.threatexpert.com/report.aspx?md5=3a128a9e8668c0181d214c20898f4a00"],"2018677":["http://www.threatexpert.com/report.aspx?md5=193494912a6f549c0da40bf22c3384ee"],"2018678":["http://www.threatexpert.com/report.aspx?md5=79772d72082a082a0048569ba2dfe5a3"],"2018679":["http://www.threatexpert.com/report.aspx?md5=01f4b1d9b2aafb86d5ccfa00e277fb9d"],"2018680":["http://fortinet.com/sites/default/files/whitepapers/soraya_WP.pdf"],"2018681":["http://www.threatexpert.com/report.aspx?md5=87cdd25ac537280cc6751050050cae9c"],"2018682":["http://www.threatexpert.com/report.aspx?md5=87cdd25ac537280cc6751050050cae9c"],"2018683":["http://www.threatexpert.com/report.aspx?md5=2a835747b7442b1d58ab30abc90d3b0f","http://phishme.com/project-dyre-new-rat-slurps-bank-credentials-bypasses-ssl/"],"2018685":["http://www.threatexpert.com/report.aspx?md5=57a0af91f3b35ef1cf54502e77cc2904","http://www.welivesecurity.com/2014/07/16/win32aibatook/"],"2018687":["http://welivesecurity.com/2014/07/16/win32aibatook/","http://www.threatexpert.com/report.aspx?md5=d5e8adfefbcc3667734b8df4ae066be6"],"2018688":["http://www.threatexpert.com/report.aspx?md5=e774a7e6ca28487db649458f48230199","http://stopmalvertising.com/malware-reports/analysis-of-the-predator-pain-keylogger.html"],"2018692":["http://sslbl.abuse.ch"],"2018696":["http://sslbl.abuse.ch"],"2018719":["http://sslbl.abuse.ch"],"2018738":["http://www.cyphort.com/blog/nighthunter-massive-campaign-steal-credentials-revealed"],"2018739":["http://garwarner.blogspot.com/2014/07/e-zpass-spam-leads-to-location-aware.html","http://blog.malcovery.com/blog/more-information-on-this-weeks-e-zpass-scam"],"2018740":["http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-4671"],"2018742":["http://www.threatexpert.com/report.aspx?md5=d04a7f30c83290b86cac8d762dcc2df5","http://www.threatexpert.com/report.aspx?md5=eba3a996f5b014b2d410f4bf32b8530b"],"2018743":["http://malwr.com/analysis/NjdkMTczMDQ0MDQ0NGNmZWE0OTgzYTY2YzU5OGY2YmI/"],"2018744":["http://malwr.com/analysis/NjdkMTczMDQ0MDQ0NGNmZWE0OTgzYTY2YzU5OGY2YmI/"],"2018745":["http://sslbl.abuse.ch"],"2018748":["http://www.fireeye.com/blog/technical/2014/07/the-little-signature-that-could-the-curious-case-of-cz-solution.html"],"2018749":["http://www.threatexpert.com/report.aspx?md5=4d1d43789e038c6a03c07083ca0b0809","http://phishme.com/project-dyre-new-rat-slurps-bank-credentials-bypasses-ssl/"],"2018750":["http://www.threatexpert.com/report.aspx?md5=19190ef53877979191f6889c6a795f31"],"2018753":["http://www.threatexpert.com/report.aspx?md5=7203a56c3888e819c602e758fce823fa","http://www.threatexpert.com/report.aspx?md5=77e33e8a53e2a0dbc06c921de9b71142"],"2018754":["http://isc.sans.edu/diary/+WordPress+brute+force+attack+via+wp.getUsersBlogs/18427"],"2018755":["http://isc.sans.edu/diary/+WordPress+brute+force+attack+via+wp.getUsersBlogs/18427"],"2018761":["http://www.threatexpert.com/report.aspx?md5=1c5eb2ea27210cf19c6ab24b7cc104b9"],"2018762":["http://www.threatexpert.com/report.aspx?md5=ee600bdcc45989750dee846b5049f935","http://www.threatexpert.com/report.aspx?md5=1051f7176fe0a50414649d369e752e98"],"2018763":["http://virustotal.com/file/17b1639c08352cc37baac08f23137563546750292131896f37fd8be8c9412407/analysis/"],"2018764":["http://www.threatexpert.com/report.aspx?md5=0c4d7d9138de7d7919e3b3c33ac2f851"],"2018765":["http://www.threatexpert.com/report.aspx?md5=5d232faca6d2b082b450b8ee4e238483"],"2018767":["http://www.threatexpert.com/report.aspx?md5=73705a4a8b03e5f866fac821aaec273a"],"2018768":["http://www.threatexpert.com/report.aspx?md5=73705a4a8b03e5f866fac821aaec273a"],"2018769":["http://blog.lookout.com/blog/2014/07/16/scarepakage/","http://contagiominidump.blogspot.com/2014/07/android-scarepackage-ransomware.html","http://www.threatexpert.com/report.aspx?md5=645a60e6f4393e4b7e2ae16758dd3a11"],"2018770":["http://www.threatexpert.com/report.aspx?md5=2ddb6cb347eb7939545a1801c72f1f3f"],"2018771":["http://www.threatexpert.com/report.aspx?md5=2ddb6cb347eb7939545a1801c72f1f3f"],"2018772":["http://www.threatexpert.com/report.aspx?md5=2ddb6cb347eb7939545a1801c72f1f3f"],"2018773":["http://www.threatexpert.com/report.aspx?md5=b94e213153a1929db2f414f23d891d76","http://www.threatexpert.com/report.aspx?md5=324ff262da1233ef874ff29213cf8f19"],"2018774":["http://blog.lookout.com/blog/2014/07/16/scarepakage/","http://contagiominidump.blogspot.com/2014/07/android-scarepackage-ransomware.html","http://www.threatexpert.com/report.aspx?md5=645a60e6f4393e4b7e2ae16758dd3a11"],"2018775":["http://www.threatexpert.com/report.aspx?md5=7e3e28320d209a586917668e3b8eac40"],"2018781":["http://welivesecurity.com/2014/07/22/androidsimplocker/","http://www.threatexpert.com/report.aspx?md5=b98cac8f1ce9284f9882ba007878caf1"],"2018782":["http://www.internetscanningproject.org"],"2018784":["http://www.threatexpert.com/report.aspx?md5=5eada3ed47d7557df375d8798d2e0a8b"],"2018787":["http://www.threatexpert.com/report.aspx?md5=dc4d0bd7fb9e647501c3b0d75aa2be65"],"2018792":["http://www.threatexpert.com/report.aspx?md5=54b715f6608d4457a9d22cfdd8bddbe6","http://adaptivemobile.com/blog/selfmite-worm","http://computerworld.com/s/article/9249430/Self_propagating_SMS_worm_Selfmite_targets_Android_devices"],"2018793":["http://blogs.rsa.com/wp-content/uploads/2015/07/Bolware-Fraud-Ring-RSA-Research-July-2-FINALr2.pdf"],"2018798":["http://www.threatexpert.com/report.aspx?md5=422ce789b284eb5aa32124a6bbe86000"],"2018799":["http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Trojan%3aWin32/Gatak","http://www.malwaresigs.com/2013/01/30/trojan-gatak-post-compromise/"],"2018800":["http://isc.sans.edu/forums/diary/Interesting+HTTP+User+Agent+chroot-apach0day+/18453"],"2018808":["http://www.threatexpert.com/report.aspx?md5=917a2a3d8c30282acbe7b1ff121a4336"],"2018852":["http://www.threatexpert.com/report.aspx?md5=c4fe829fc49bb9efec92fe4a8a5d29fc"],"2018853":["http://isc.sans.edu/forums/diary/E-ZPass+phishing+scam/18389"],"2018856":["http://www.threatexpert.com/report.aspx?md5=49aca228674651cba776be727bdb7e60"],"2018857":["http://www.threatexpert.com/report.aspx?md5=d0c74483f20c608a0a89c5ba05c2197f"],"2018867":["http://www.threatexpert.com/report.aspx?md5=f9556acf36168414ad7d5650eeee7972","http://www.threatexpert.com/report.aspx?md5=69e28b658520528a1473f51e62698c87"],"2018869":["http://www.fireeye.com/blog/technical/threat-intelligence/2014/07/spy-of-the-tiger.html"],"2018872":["http://www.threatexpert.com/report.aspx?md5=de81fab8ec96bef76db828f4c1a42e4d"],"2018874":["http://www.threatexpert.com/report.aspx?md5=de81fab8ec96bef76db828f4c1a42e4d"],"2018875":["http://www.threatexpert.com/report.aspx?md5=de81fab8ec96bef76db828f4c1a42e4d"],"2018876":["http://www.threatexpert.com/report.aspx?md5=de81fab8ec96bef76db828f4c1a42e4d"],"2018877":["http://www.threatexpert.com/report.aspx?md5=de81fab8ec96bef76db828f4c1a42e4d"],"2018878":["http://www.threatexpert.com/report.aspx?md5=de81fab8ec96bef76db828f4c1a42e4d"],"2018879":["http://www.threatexpert.com/report.aspx?md5=de81fab8ec96bef76db828f4c1a42e4d"],"2018880":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=984ec607cbaefdd2ce977c9a07a3e175"],"2018882":["http://blog.cassidiancybersecurity.com/post/2014/07/The-Eye-of-the-Tiger2","http://www.threatexpert.com/report.aspx?md5=12854bb8d1e6a590e1bd578267e4f8c9"],"2018883":["http://blog.cassidiancybersecurity.com/post/2014/07/The-Eye-of-the-Tiger2","http://www.threatexpert.com/report.aspx?md5=c0656b66b9f4180e59e1fd2f9f1a85f2"],"2018884":["http://fireeye.com/blog/technical/threat-intelligence/2014/07/spy-of-the-tiger.html"],"2018887":["http://www.threatexpert.com/report.aspx?md5=ef819779fc4bee6117c124fb752abf57"],"2018888":["http://www.threatexpert.com/report.aspx?md5=6df6553b115d9ed837161a9e67146ecf"],"2018889":["http://www.threatexpert.com/report.aspx?md5=799600122930bbc64b7dac987ea8bb39","http://vinsula.com/2014/07/20/sayad-flying-kitten-infostealer-malware/"],"2018890":["http://www.threatexpert.com/report.aspx?md5=799600122930bbc64b7dac987ea8bb39","http://vinsula.com/2014/07/20/sayad-flying-kitten-infostealer-malware/"],"2018891":["http://www.threatexpert.com/report.aspx?md5=f085395253a40ce8ca077228c2322010","http://securityblog.s21sec.com/2014/08/kronos-is-here.html"],"2018892":["http://www.threatexpert.com/report.aspx?md5=9c40169371adbee467587ab55a61e883"],"2018893":["http://www.threatexpert.com/report.aspx?md5=9c40169371adbee467587ab55a61e883"],"2018895":["http://securelist.com/files/2014/07/Kaspersky_Lab_crouching_yeti_appendixes_eng_final.pdf"],"2018896":["http://www.malware-traffic-analysis.net/2014/07/28/index.html"],"2018897":["http://www.threatexpert.com/report.aspx?md5=27aef1d328da442d3bd02c50c1a6b651"],"2018899":["http://www.threatexpert.com/report.aspx?md5=437a5cb57567c2691ce61a700682eab7"],"2018900":["http://www.threatexpert.com/report.aspx?md5=34c7f12b4e8f2b81143453af12442ee0","http://www.threatexpert.com/report.aspx?md5=48bbae6ee277b5693b40ecf51919d3a6"],"2018901":["http://www.threatexpert.com/report.aspx?md5=34c7f12b4e8f2b81143453af12442ee0","http://www.threatexpert.com/report.aspx?md5=48bbae6ee277b5693b40ecf51919d3a6"],"2018902":["http://sslbl.abuse.ch"],"2018904":["http://tools.ietf.org/html/rfc3489"],"2018905":["http://tools.ietf.org/html/rfc3489"],"2018906":["http://tools.ietf.org/html/rfc3489"],"2018907":["http://tools.ietf.org/html/rfc3489"],"2018908":["http://tools.ietf.org/html/rfc5389"],"2018912":["http://sslbl.abuse.ch"],"2018914":["http://www.malware-traffic-analysis.net/2014/08/06/index.html"],"2018918":["http://thehackernews.com/2014/08/xiaomi-phones-secretly-sending-users.html"],"2018919":["http://thehackernews.com/2014/08/xiaomi-phones-secretly-sending-users.html"],"2018926":["http://secureworks.com/cyber-threat-intelligence/threats/malware-analysis-of-the-lurk-downloader/"],"2018927":["http://secureworks.com/cyber-threat-intelligence/threats/malware-analysis-of-the-lurk-downloader/"],"2018928":["http://www.threatexpert.com/report.aspx?md5=e6c91ab176887e5c79bb59277c651dfd"],"2018933":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-2820"],"2018935":["http://www.threatexpert.com/report.aspx?md5=9c98ef776a651cc4269acde3755d3a5a"],"2018936":["http://www.threatexpert.com/report.aspx?md5=954acc71ffaa7010c603d74e76dfc70b","http://www.joewein.net/spam/spam-joejob.htm"],"2018939":["http://sslbl.abuse.ch"],"2018942":["http://sslbl.abuse.ch"],"2018943":["http://sslbl.abuse.ch"],"2018944":["http://sslbl.abuse.ch"],"2018945":["http://www.threatexpert.com/report.aspx?md5=28726f772f6b4b63fb40696a28afafc9","http://malware.dontneedcoffee.com/2014/08/scarepackageknstant.html"],"2018946":["http://www.threatexpert.com/report.aspx?md5=28726f772f6b4b63fb40696a28afafc9","http://malware.dontneedcoffee.com/2014/08/scarepackageknstant.html"],"2018947":["http://sslbl.abuse.ch"],"2018949":["http://www.threatexpert.com/report.aspx?md5=17d2b62f2fa20f407485437de17787fb","http://www.threatexpert.com/report.aspx?md5=bec091077138a1cac49db00495d456e7"],"2018953":["http://www.threatexpert.com/report.aspx?md5=3e44252394078c8fd792da1583525d0c","http://pastebin.com/0dAciksC","http://pastebin.com/C0arvGxU"],"2018958":["http://www.threatexpert.com/report.aspx?md5=3ed744b12a77359576af10a265154081","http://www.threatexpert.com/report.aspx?md5=a2049adc2834d797b37f45382608f2b4"],"2018959":["http://doc.emergingthreats.net/bin/view/Main/2000419"],"2018960":["http://securelist.com/blog/incidents/66135/zerolocker-wont-come-to-your-rescue/","http://webroot.com/blog/2014/08/14/zero-locker/","http://symantec.com/security_response/writeup.jsp?docid=2014-081521-4509-99"],"2018961":["http://securelist.com/blog/incidents/66135/zerolocker-wont-come-to-your-rescue/","http://webroot.com/blog/2014/08/14/zero-locker/","http://symantec.com/security_response/writeup.jsp?docid=2014-081521-4509-9"],"2018962":["http://securelist.com/blog/incidents/66135/zerolocker-wont-come-to-your-rescue/","http://webroot.com/blog/2014/08/14/zero-locker/","http://symantec.com/security_response/writeup.jsp?docid=2014-081521-4509-9"],"2018964":["http://www.threatexpert.com/report.aspx?md5=909b91071c60fc68c27789d912ccf68a"],"2018968":["http://securelist.com/blog/research/66108/el-machete/","http://www.threatexpert.com/report.aspx?md5=a8602b4c35f426107c9667d804470745"],"2018969":["http://trustedsec.com/downloads/social-engineer-toolkit/","http://securelist.com/blog/research/66108/el-machete/"],"2018970":["http://trustedsec.com/downloads/social-engineer-toolkit/","http://securelist.com/blog/research/66108/el-machete/"],"2018972":["http://trustedsec.com/downloads/social-engineer-toolkit/","http://securelist.com/blog/research/66108/el-machete/"],"2018973":["http://www.threatexpert.com/report.aspx?md5=70bb2e450fe927ee32884cda6fe948b5"],"2018975":["http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html"],"2018976":["http://blog.spiderlabs.com/2012/01/hoic-ddos-analysis-and-detection.html"],"2018977":["http://www.threatexpert.com/report.aspx?md5=23fc64a5cac4406d7143ea26e8c4c7ab","http://blog.spiderlabs.com/2012/01/hoic-ddos-analysis-and-detection.html"],"2018978":["http://www.threatexpert.com/report.aspx?md5=23fc64a5cac4406d7143ea26e8c4c7ab","http://blog.spiderlabs.com/2012/01/hoic-ddos-analysis-and-detection.html"],"2018979":["http://www.threatexpert.com/report.aspx?md5=98a3a68f76ed2eba763eb7bfb6648562"],"2018984":["http://www.threatexpert.com/report.aspx?md5=f92e9e3e86856b5c0ee465f77a440abb","http://researchcenter.paloaltonetworks.com/2014/08/attacks-east-asia-using-google-code-command-control/","http://www.fireeye.com/blog/technical/targeted-attack/2014/08/operation-poisoned-hurricane.html"],"2018985":["http://www.threatexpert.com/report.aspx?md5=56c16ad7da8cecb429dccb168aef46b7"],"2018994":["http://www.threatexpert.com/report.aspx?md5=f5fbdb120594f4da7f638122d6635933"],"2018999":["http://stopmalvertising.com/malware-reports/analysis-of-tuscas.html"],"2019000":["http://www.threatexpert.com/report.aspx?md5=a22af4fc7fe011069704a15296634ca6"],"2019001":["http://www.threatexpert.com/report.aspx?md5=a22af4fc7fe011069704a15296634ca6"],"2019002":["http://www.threatexpert.com/report.aspx?md5=a22af4fc7fe011069704a15296634ca6"],"2019003":["http://www.threatexpert.com/report.aspx?md5=a22af4fc7fe011069704a15296634ca6"],"2019009":["http://sslbl.abuse.ch"],"2019010":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks","http://en.wikipedia.org/wiki/Ephemeral_port"],"2019011":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks","http://en.wikipedia.org/wiki/Ephemeral_port"],"2019012":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks","http://en.wikipedia.org/wiki/Ephemeral_port"],"2019013":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks","http://en.wikipedia.org/wiki/Ephemeral_port"],"2019014":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks","http://en.wikipedia.org/wiki/Ephemeral_port"],"2019015":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks","http://en.wikipedia.org/wiki/Ephemeral_port"],"2019016":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks"],"2019017":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks"],"2019018":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks"],"2019019":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks"],"2019020":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks"],"2019021":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks"],"2019022":["http://community.rapid7.com/community/metasploit/blog/2014/08/25/r7-2014-12-more-amplification-vulnerabilities-in-ntp-allow-even-more-drdos-attacks"],"2019069":["http://sslbl.abuse.ch"],"2019070":["http://sslbl.abuse.ch"],"2019079":["http://sslbl.abuse.ch"],"2019080":["http://www.threatexpert.com/report.aspx?md5=a22af4fc7fe011069704a15296634ca6"],"2019081":["http://www.threatexpert.com/report.aspx?md5=a22af4fc7fe011069704a15296634ca6"],"2019082":["http://www.threatexpert.com/report.aspx?md5=a22af4fc7fe011069704a15296634ca6"],"2019083":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=23bb9c2ed95e942f886d544fefd20d70"],"2019084":["http://fireeye.com/blog/technical/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html","http://www.threatexpert.com/report.aspx?md5=a8cf815c3800202d448d035300985dc7"],"2019085":["http://www.exploit-db.com/exploits/34448/"],"2019087":["http://www.security-assessment.com/files/documents/advisory/F5_Unauthenticated_rsync_access_to_Remote_Root_Code_Execution.pdf"],"2019088":["http://www.security-assessment.com/files/documents/advisory/F5_Unauthenticated_rsync_access_to_Remote_Root_Code_Execution.pdf"],"2019089":["http://www.security-assessment.com/files/documents/advisory/F5_Unauthenticated_rsync_access_to_Remote_Root_Code_Execution.pdf"],"2019090":["http://www.security-assessment.com/files/documents/advisory/F5_Unauthenticated_rsync_access_to_Remote_Root_Code_Execution.pdf"],"2019094":["http://www.alienvault.com/open-threat-exchange/blog/scanbox-a-reconnaissance-framework-used-on-watering-hole-attacks"],"2019102":["http://community.rapid7.com/community/metasploit/blog/2014/08/29/weekly-metasploit-update"],"2019104":["http://www.threatexpert.com/report.aspx?md5=0d5ad9759753cb4639cd405eddbe2a16"],"2019106":["http://sslbl.abuse.ch"],"2019107":["http://sslbl.abuse.ch"],"2019108":["http://sslbl.abuse.ch"],"2019109":["http://sslbl.abuse.ch"],"2019111":["http://securelist.com/blog/incidents/66358/web-based-attack-targeting-home-routers-the-brazilian-way/"],"2019112":["http://securelist.com/blog/incidents/66358/web-based-attack-targeting-home-routers-the-brazilian-way/"],"2019113":["http://www.threatexpert.com/report.aspx?md5=6e59861931fa2796ee107dc27bfdd480","http://fireeye.com/blog/technical/botnet-activities-research/2014/09/darwins-favorite-apt-group-2.html"],"2019114":["http://fireeye.com/blog/technical/botnet-activities-research/2014/09/darwins-favorite-apt-group-2.html"],"2019115":["http://www.fireeye.com/blog/technical/botnet-activities-research/2014/09/darwins-favorite-apt-group-2.html"],"2019120":["http://sslbl.abuse.ch"],"2019122":["http://sslbl.abuse.ch"],"2019123":["http://www.welivesecurity.com/2014/09/04/torrentlocker-now-targets-uk-royal-mail-phishing/"],"2019124":["http://www.welivesecurity.com/2014/09/04/torrentlocker-now-targets-uk-royal-mail-phishing/"],"2019125":["http://www.threatexpert.com/report.aspx?md5=6096ace9002792e625a0cdb6aec3f379"],"2019126":["http://www.threatexpert.com/report.aspx?md5=6096ace9002792e625a0cdb6aec3f379"],"2019127":["http://www.threatexpert.com/report.aspx?md5=e256976cedda8c9d07a21ca0e5c2f86c"],"2019128":["http://www.threatexpert.com/report.aspx?md5=19484a240a16c7faea84dcac0c38d118"],"2019129":["http://www.threatexpert.com/report.aspx?md5=5eaae2d6a4b5d338b83ea5d97af93672"],"2019135":["http://sslbl.abuse.ch"],"2019136":["http://fireeye.com/blog/technical/malware-research/2014/09/forced-to-adapt-xslcmd-backdoor-now-on-os-x.html"],"2019137":["http://exploit-db.com/exploits/34511/"],"2019138":["http://malware-traffic-analysis.net/2014/08/01/index3.html"],"2019139":["http://packetstormsecurity.com/files/128118/wphugeitig-sql.txt"],"2019140":["http://www.threatexpert.com/report.aspx?md5=0559c56d6dcf6ffe9ca18f43e225e3ce"],"2019141":["http://www.threatexpert.com/report.aspx?md5=c86f7ec18b78055a431f7cd1dca65b82"],"2019142":["http://www.threatexpert.com/report.aspx?md5=4ad55877464aa92e49231d913d00eb69"],"2019143":["http://www.threatexpert.com/report.aspx?md5=4aa02ca6a3f04cf445924a6d657d10e5"],"2019144":["http://blogs.cisco.com/security/kyle-and-stan/"],"2019145":["http://blogs.cisco.com/security/kyle-and-stan/"],"2019147":["http://sslbl.abuse.ch"],"2019148":["http://sslbl.abuse.ch"],"2019149":["http://sslbl.abuse.ch"],"2019150":["http://sslbl.abuse.ch"],"2019151":["http://sslbl.abuse.ch"],"2019152":["http://sslbl.abuse.ch"],"2019153":["http://sslbl.abuse.ch"],"2019155":["http://www.threatexpert.com/report.aspx?md5=236bde81355e075e7ed6bcdc60daefcb"],"2019156":["http://blogs.cisco.com/security/kyle-and-stan/"],"2019157":["http://sites.utexas.edu/iso/2014/09/09/arbitrary-file-deletion-as-root-in-webmin/"],"2019158":["http://www.threatexpert.com/report.aspx?md5=bdf12366779ce94178c2d1e495565d2b"],"2019159":["http://www.threatexpert.com/report.aspx?md5=ceb5b99c13b107cf07331bcbddb43b1f","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-pos-ram-scraper-malware.pdf"],"2019160":["http://www.threatexpert.com/report.aspx?md5=87cfa0addda5c0e0fc34f3847408e557","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-pos-ram-scraper-malware.pdf"],"2019161":["http://www.threatexpert.com/report.aspx?md5=87cfa0addda5c0e0fc34f3847408e557","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-pos-ram-scraper-malware.pdf"],"2019162":["http://www.threatexpert.com/report.aspx?md5=21f8b9d9a6fa3a0cd3a3f0644636bf09","http://www.symantec.com/security_response/earthlink_writeup.jsp?docid=2013-121813-2446-99"],"2019163":["http://www.threatexpert.com/report.aspx?md5=3959fb5b5909d9c6fb9c9a408d35f67a","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-pos-ram-scraper-malware.pdf"],"2019164":["http://www.threatexpert.com/report.aspx?md5=3959fb5b5909d9c6fb9c9a408d35f67a","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-pos-ram-scraper-malware.pdf"],"2019165":["http://www.threatexpert.com/report.aspx?md5=838ab7aacac590ea2e170888b2502a63"],"2019166":["http://www.threatexpert.com/report.aspx?md5=aba20c8289b37b10d42979730674a2ca"],"2019168":["http://www.threatexpert.com/report.aspx?md5=1e644fe146f62bd2fc585b8df6712ff6"],"2019169":["http://www.threatexpert.com/report.aspx?md5=1e644fe146f62bd2fc585b8df6712ff6"],"2019171":["http://www.threatexpert.com/report.aspx?md5=9a2a00f4bba2f3e0b1211a1f0cb48896"],"2019172":["http://www.threatexpert.com/report.aspx?md5=0eab12cebbf1c8f25d82c65f34aab9d7"],"2019173":["http://www.threatexpert.com/report.aspx?md5=edefcbba2944872f31454fcb98802488"],"2019174":["http://www.threatexpert.com/report.aspx?md5=1c32f9f05234cac7dd7a83e3925a3105","http://researchcenter.paloaltonetworks.com/2014/09/appbuyer-new-ios-malware-steals-apple-id-password-buy-apps/"],"2019175":["http://www.threatexpert.com/report.aspx?md5=1c32f9f05234cac7dd7a83e3925a3105","http://researchcenter.paloaltonetworks.com/2014/09/appbuyer-new-ios-malware-steals-apple-id-password-buy-apps/"],"2019177":["http://www.threatexpert.com/report.aspx?md5=d8059b555dde05e184c0b16bbff523f1"],"2019178":["http://www.threatexpert.com/report.aspx?md5=5dd6e69b1e9049f295e314b523679d98"],"2019179":["http://www.threatexpert.com/report.aspx?md5=c14690b90459744a300a02f45b32168a","http://quequero.org/2014/09/win32-blackberrybbc-malware-analysis/"],"2019181":["http://1337day.com/exploit/22581"],"2019186":["http://www.threatexpert.com/report.aspx?md5=2f52d3921613b2fe06c9eb9051d45e60"],"2019187":["http://www.threatexpert.com/report.aspx?md5=a3e0f51356d48124fba25485d1871b28","http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-asprox-reborn.pdf","http://blog.fortinet.com/post/changes-in-the-asprox-botnet"],"2019190":["http://www.threatexpert.com/report.aspx?md5=6e4a990b1540fa6b5896034b976ccecf"],"2019191":["http://www.threatexpert.com/report.aspx?md5=6f2dc4ba05774f3e5ebf6c502db48a71"],"2019192":["http://sslbl.abuse.ch"],"2019196":["http://www.threatexpert.com/report.aspx?md5=ca2f3e2568ac5c01ecf2747f778e13a1"],"2019197":["http://www.threatexpert.com/report.aspx?md5=ae9899722707fc2c9716138580787026","http://arbornetworks.com/asert/2014/09/lets-talk-about-newposthings/"],"2019198":["http://www.threatexpert.com/report.aspx?md5=4196c67648003a18f61573a77b6d3be6","http://arbornetworks.com/asert/2014/09/lets-talk-about-newposthings/"],"2019199":["http://www.threatexpert.com/report.aspx?md5=ae9899722707fc2c9716138580787026","http://arbornetworks.com/asert/2014/09/lets-talk-about-newposthings/"],"2019200":["http://www.threatexpert.com/report.aspx?md5=1da03b89c25c9f8999edb8c1abb0c4ed"],"2019201":["http://www.threatexpert.com/report.aspx?md5=33439543cae709aa7efa58f94e4b2a62"],"2019202":["http://www.threatexpert.com/report.aspx?md5=00ccc1f7741bb31b6022c6f319c921ee"],"2019203":["http://www.threatexpert.com/report.aspx?md5=c150f9738142278e2d39417a7ef53cae"],"2019204":["http://www.threatexpert.com/report.aspx?md5=16549f8a09fd5724f2107a8f18dca10b"],"2019205":["http://sslbl.abuse.ch"],"2019206":["http://sslbl.abuse.ch"],"2019207":["http://www.threatexpert.com/report.aspx?md5=b4dd0283c73d0b288e7322b95df0cb1b"],"2019208":["http://www.threatexpert.com/report.aspx?md5=b4dd0283c73d0b288e7322b95df0cb1b"],"2019211":["http://www.threatexpert.com/report.aspx?md5=bef57db893b54c5605d0e3e7d50d6d70","http://www.threatexpert.com/report.aspx?md5=bf555378d935de805f39c2d2d965a888","http://securitykitten.github.io/an-evening-with-n3utrino/"],"2019212":["http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3476&p=23965#p23965","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823"],"2019213":["http://www.threatexpert.com/report.aspx?md5=bf019054fced52ff03ed8d371dfd371d"],"2019214":["http://www.threatexpert.com/report.aspx?md5=bbc68c34bb2dac3ae382ecf785bdb441"],"2019215":["http://www.threatexpert.com/report.aspx?md5=bbc68c34bb2dac3ae382ecf785bdb441"],"2019216":["http://www.threatexpert.com/report.aspx?md5=bbc68c34bb2dac3ae382ecf785bdb441"],"2019217":["http://www.threatexpert.com/report.aspx?md5=bbc68c34bb2dac3ae382ecf785bdb441"],"2019218":["http://www.threatexpert.com/report.aspx?md5=bbc68c34bb2dac3ae382ecf785bdb441"],"2019219":["http://www.threatexpert.com/report.aspx?md5=bbc68c34bb2dac3ae382ecf785bdb441"],"2019220":["http://www.threatexpert.com/report.aspx?md5=bbc68c34bb2dac3ae382ecf785bdb441"],"2019221":["http://www.threatexpert.com/report.aspx?md5=bbc68c34bb2dac3ae382ecf785bdb441"],"2019222":["http://www.threatexpert.com/report.aspx?md5=bbc68c34bb2dac3ae382ecf785bdb441"],"2019227":["http://www.threatexpert.com/report.aspx?md5=2ceda25b44378583dfb6df64b92ac654"],"2019228":["http://www.threatexpert.com/report.aspx?md5=6424fb3317b4be3d00e4d489122c9a48"],"2019229":["http://www.threatexpert.com/report.aspx?md5=b5badeb16414cba66999742601c092b8"],"2019230":["http://www.threatexpert.com/report.aspx?md5=1044af21a7c4cbc291ab418a47de52b4","http://seculert.com/blog/2014/09/tiny-tinba-trojan-could-pose-big-threat.html","http://garage4hackers.com/entry.php?b=3086"],"2019231":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019232":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019233":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019234":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019235":["http://www.threatexpert.com/report.aspx?md5=776d6c20a7016cb0f0db354785fe0d71"],"2019236":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019237":["http://access.redhat.com/articles/1200223","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019239":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019240":["http://www.itee.uq.edu.au/~cristina/students/david/honoursThesis96/bff.htm","http://doc.emergingthreats.net/bin/view/Main/2000418"],"2019241":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019242":["http://www.threatexpert.com/report.aspx?md5=5924bcc045bb7039f55c6ce29234e29a"],"2019243":["http://www.threatexpert.com/report.aspx?md5=3cffb955c08f6c1546bfeae37a215787","http://symantec.com/security_response/writeup.jsp?docid=2014-091718-2034-99&tabid=2"],"2019244":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019245":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019246":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019247":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019248":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019249":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019250":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019251":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019252":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019253":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019254":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019255":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019256":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019257":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019258":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019259":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019260":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019261":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019262":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019263":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019264":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019265":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019266":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019267":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019268":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019269":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019270":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019271":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019272":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019273":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019275":["http://www.threatexpert.com/report.aspx?md5=0fa515ad9fd1031b7a7891a46f72f122"],"2019276":["http://www.threatexpert.com/report.aspx?md5=75a2e3c9f8783dfc953f6aeb8a9eda2f"],"2019279":["http://sslbl.abuse.ch"],"2019280":["http://sslbl.abuse.ch"],"2019281":["http://f-secure.com/documents/996508/1030745/blackenergy_whitepaper.pdf","http://www.threatexpert.com/report.aspx?md5=948cd0bf83a670c05401c8b67d2eb310"],"2019282":["http://www.threatexpert.com/report.aspx?md5=1821351d67a3dce1045be09e88461fe9"],"2019283":["http://f-secure.com/documents/996508/1030745/blackenergy_whitepaper.pdf","http://www.threatexpert.com/report.aspx?md5=72372ffac0ee73dc8b6d237878e119c1"],"2019289":["http://github.com/zaf/sipshock"],"2019290":["http://github.com/zaf/sipshock"],"2019291":["http://www.invisiblethreat.ca/2014/09/cve-2014-6271/"],"2019292":["http://www.invisiblethreat.ca/2014/09/cve-2014-6271/"],"2019293":["http://marc.info/?l=qmail&m=141183309314366&w=2"],"2019294":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019295":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019296":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019297":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019298":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019299":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019300":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019301":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019302":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019303":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019304":["http://research.zscaler.com/2014/09/shellshock-attacks-spotted-in-wild.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019305":["http://www.threatexpert.com/report.aspx?md5=edaaaa6527a6f42c96f27ce2e427cd39"],"2019306":["http://www.threatexpert.com/report.aspx?md5=edaaaa6527a6f42c96f27ce2e427cd39"],"2019307":["http://www.threatexpert.com/report.aspx?md5=510b4db9aa400583e7927afa5f956179"],"2019308":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019309":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019310":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2019312":["http://www.threatexpert.com/report.aspx?md5=5469af0daa10f8acbe552cd2f1f6a6bb"],"2019313":["http://www.threatexpert.com/report.aspx?md5=5469af0daa10f8acbe552cd2f1f6a6bb"],"2019316":["http://sslbl.abuse.ch"],"2019318":["http://malware.lu/articles/2014/09/29/analysis-of-code4hk.html"],"2019319":["http://www.threatexpert.com/report.aspx?md5=a3dd0964ee346db49192836569b41203"],"2019320":["http://www.threatexpert.com/report.aspx?md5=27ec921595f9e05e7e8933e71d336fa7"],"2019322":["http://news.ycombinator.com/item?id=8385332"],"2019323":["http://news.ycombinator.com/item?id=8385332"],"2019328":["http://sslbl.abuse.ch"],"2019329":["http://sslbl.abuse.ch"],"2019331":["http://www.threatexpert.com/report.aspx?md5=2cba795aff750259a2fc447cdd6ea1c7","http://lacoon.com/lacoon-discovers-xsser-mrat-first-advanced-ios-trojan/"],"2019332":["http://www.threatexpert.com/report.aspx?md5=2cba795aff750259a2fc447cdd6ea1c7","http://lacoon.com/lacoon-discovers-xsser-mrat-first-advanced-ios-trojan/"],"2019333":["http://www.threatexpert.com/report.aspx?md5=2cba795aff750259a2fc447cdd6ea1c7","http://lacoon.com/lacoon-discovers-xsser-mrat-first-advanced-ios-trojan/"],"2019334":["http://www.threatexpert.com/report.aspx?md5=2cba795aff750259a2fc447cdd6ea1c7","http://lacoon.com/lacoon-discovers-xsser-mrat-first-advanced-ios-trojan/"],"2019335":["http://gist.github.com/jedisct1/88c62ee34e6fa92c31dc","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019340":["http://www.eff.org/deeplinks/2014/09/computercop-dangerous-internet-safety-software-hundreds-police-agencies"],"2019341":["http://malware-traffic-analysis.net/2014/10/01/index.html"],"2019342":["http://www.threatexpert.com/report.aspx?md5=27b8d15950022f53ca4ca7004932cf2b"],"2019344":["http://malware-traffic-analysis.net/2014/10/01/index.html"],"2019345":["http://malware-traffic-analysis.net/2014/10/01/index.html"],"2019352":["http://malware-traffic-analysis.net/2014/10/03/index.html"],"2019353":["http://www.threatexpert.com/report.aspx?md5=01be3fc3243d582d9f93d01401c4f95e"],"2019355":["http://stopmalvertising.com/malware-reports/anatomy-of-a-net-click-fraud-bot.html","http://www.threatexpert.com/report.aspx?md5=17b077840ab874a8370c98c840b6c671"],"2019357":["http://stopmalvertising.com/malware-reports/anatomy-of-a-net-click-fraud-bot.html","http://www.threatexpert.com/report.aspx?md5=17b077840ab874a8370c98c840b6c671"],"2019360":["http://sslbl.abuse.ch"],"2019361":["http://sslbl.abuse.ch"],"2019363":["http://sslbl.abuse.ch"],"2019364":["http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"],"2019365":["http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"],"2019367":["http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/"],"2019368":["http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/"],"2019369":["http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/"],"2019370":["http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/"],"2019371":["http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/"],"2019372":["http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/"],"2019373":["http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/"],"2019374":["http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/"],"2019376":["http://www.threatexpert.com/report.aspx?md5=958804a1191cb281a3a967de17763cf4"],"2019377":["http://www.threatexpert.com/report.aspx?md5=dfeaae9cb1bc24ac467411955e48483b","http://csis.dk/en/csis/news/4472/"],"2019378":["http://www.threatexpert.com/report.aspx?md5=cd2d9c7bd5de6d12718785f495ce1bb4","http://csis.dk/en/csis/news/4472/"],"2019379":["http://www.threatexpert.com/report.aspx?md5=5e7cbe7e62a6c5de45092ad0c4852d1a","http://csis.dk/en/csis/news/4472/"],"2019380":["http://www.threatexpert.com/report.aspx?md5=5f3530edbe1fce44e05ad0c96e54efb4","http://www.threatexpert.com/report.aspx?md5=279fc5e6181d58f883a15d5089ce541b","http://krebsonsecurity.com/2013/01/three-men-charged-in-connection-with-gozi-trojan/","http://csis.dk/en/csis/news/4472/"],"2019381":["http://www.threatexpert.com/report.aspx?md5=9134651a7c642798414d867874bdfe2f","http://csis.dk/en/csis/news/4472/"],"2019382":["http://www.threatexpert.com/report.aspx?md5=3a9f4fc34e121fc2e5c0d7775091714c"],"2019388":["http://sslbl.abuse.ch"],"2019389":["http://exploit-db.com/exploits/34896/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019396":["http://www.threatexpert.com/report.aspx?md5=8d2e901583b60631dc333d4b396e158b"],"2019401":["http://www.oracle.com/technetwork/java/javase/8u-relnotes-2225394.html"],"2019402":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271","http://packetstormsecurity.com/files/128650"],"2019403":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271","http://packetstormsecurity.com/files/128650"],"2019412":["http://www.f-secure.com/weblog/archives/00002721.html"],"2019413":["http://www.threatexpert.com/report.aspx?md5=05823d6ec6d2a483f94ae1794a06c1a6"],"2019414":["http://sslbl.abuse.ch"],"2019415":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3566","http://blog.fox-it.com/2014/10/15/poodle/","http://www.openssl.org/~bodo/ssl-poodle.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3566","http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566","http://www.imperialviolet.org/2014/10/14/poodle.html"],"2019416":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3566","http://blog.fox-it.com/2014/10/15/poodle/","http://www.openssl.org/~bodo/ssl-poodle.pdf","http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566","http://www.imperialviolet.org/2014/10/14/poodle.html"],"2019418":["http://blog.fox-it.com/2014/10/15/poodle/","http://www.openssl.org/~bodo/ssl-poodle.pdf","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3566","http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566","http://www.imperialviolet.org/2014/10/14/poodle.html"],"2019419":["http://www.threatexpert.com/report.aspx?md5=38f4f489bd7e59ed91dc6ff95f37999f"],"2019420":["http://blog.crowdstrike.com/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-4141"],"2019421":["http://blog.crowdstrike.com/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-4113"],"2019422":["http://pastebin.com/F2Dk9LbX"],"2019423":["http://pastebin.com/F2Dk9LbX"],"2019424":["http://pastebin.com/F2Dk9LbX"],"2019425":["http://pastebin.com/F2Dk9LbX"],"2019426":["http://pastebin.com/F2Dk9LbX"],"2019427":["http://pastebin.com/F2Dk9LbX"],"2019428":["http://pastebin.com/F2Dk9LbX"],"2019429":["http://pastebin.com/F2Dk9LbX"],"2019430":["http://pastebin.com/F2Dk9LbX"],"2019431":["http://pastebin.com/F2Dk9LbX"],"2019432":["http://pastebin.com/F2Dk9LbX"],"2019433":["http://pastebin.com/F2Dk9LbX"],"2019434":["http://pastebin.com/F2Dk9LbX"],"2019435":["http://pastebin.com/F2Dk9LbX"],"2019436":["http://pastebin.com/F2Dk9LbX"],"2019437":["http://pastebin.com/F2Dk9LbX"],"2019438":["http://pastebin.com/F2Dk9LbX"],"2019439":["http://pastebin.com/F2Dk9LbX"],"2019440":["http://pastebin.com/F2Dk9LbX"],"2019441":["http://pastebin.com/F2Dk9LbX"],"2019442":["http://pastebin.com/F2Dk9LbX"],"2019443":["http://pastebin.com/F2Dk9LbX"],"2019444":["http://pastebin.com/F2Dk9LbX"],"2019445":["http://pastebin.com/F2Dk9LbX"],"2019446":["http://pastebin.com/F2Dk9LbX"],"2019447":["http://pastebin.com/F2Dk9LbX"],"2019448":["http://pastebin.com/F2Dk9LbX"],"2019449":["http://pastebin.com/F2Dk9LbX"],"2019450":["http://pastebin.com/F2Dk9LbX"],"2019451":["http://pastebin.com/F2Dk9LbX"],"2019452":["http://pastebin.com/F2Dk9LbX"],"2019453":["http://pastebin.com/F2Dk9LbX"],"2019454":["http://www.threatexpert.com/report.aspx?md5=a5dc57aea5f397c2313e127a6e01aa00","http://blog.gdatasoftware.com/blog/article/new-frameworkpos-variant-exfiltrates-data-via-dns-requests.html"],"2019455":["http://www.threatexpert.com/report.aspx?md5=a5dc57aea5f397c2313e127a6e01aa00","http://blog.gdatasoftware.com/blog/article/new-frameworkpos-variant-exfiltrates-data-via-dns-requests.html"],"2019458":["http://www.threatexpert.com/report.aspx?md5=b8e0b97c8e9faa6e5daa8f0cac845516"],"2019459":["http://www.threatexpert.com/report.aspx?md5=b8e0b97c8e9faa6e5daa8f0cac845516"],"2019460":["http://blog.imperva.com/2014/10/nosql-ssji-authentication-bypass.html","http://docs.mongodb.org/manual/reference/operator/query/ne/"],"2019466":["http://sslbl.abuse.ch"],"2019467":["http://www.threatexpert.com/report.aspx?md5=4e83c405f35efd128ab8c324c12dbde9"],"2019470":["http://www.threatexpert.com/report.aspx?md5=ae773f234152fb5df1ab35116dbb82bd"],"2019471":["http://www.threatexpert.com/report.aspx?md5=ef54080af1782dd29356032b7ff20849"],"2019477":["http://sslbl.abuse.ch"],"2019478":["http://www.threatexpert.com/report.aspx?md5=68459c32587e08d953d319ceb2d0888b"],"2019481":["http://pwc.blogs.com/cyber_security_updates/2014/10/orcarat-a-whale-of-a-tale.html"],"2019482":["http://pwc.blogs.com/cyber_security_updates/2014/10/orcarat-a-whale-of-a-tale.html"],"2019483":["http://pwc.blogs.com/cyber_security_updates/2014/10/orcarat-a-whale-of-a-tale.html"],"2019484":["http://pwc.blogs.com/cyber_security_updates/2014/10/orcarat-a-whale-of-a-tale.html"],"2019485":["http://www.threatexpert.com/report.aspx?md5=1fedcd44951c3dfb861fa83ddcec2b84"],"2019490":["http://community.rapid7.com/community/metasploit/blog/2014/10/21/r7-2014-17-nat-pmp-implementation-and-configuration-vulnerabilities"],"2019491":["http://community.rapid7.com/community/metasploit/blog/2014/10/21/r7-2014-17-nat-pmp-implementation-and-configuration-vulnerabilities"],"2019492":["http://community.rapid7.com/community/metasploit/blog/2014/10/21/r7-2014-17-nat-pmp-implementation-and-configuration-vulnerabilities"],"2019493":["http://www.threatexpert.com/report.aspx?md5=f4c26252042b9d520cd832b8b4a66de0"],"2019494":["http://www.threatexpert.com/report.aspx?md5=1754d4765a05e4637d2dcdbd1c28eaf1"],"2019495":["http://www.threatexpert.com/report.aspx?md5=5159780c47b8df01d5eb00d858b4d35a"],"2019496":["http://www.threatexpert.com/report.aspx?md5=f66bf24aa5516e335873c758d007ed3c"],"2019498":["http://www.threatexpert.com/report.aspx?md5=8d2dec745b9ac380beb2a0ea66427d06"],"2019502":["http://blog.cylance.com/emerging-threat-alert-cve-2014-4114","http://www.threatexpert.com/report.aspx?md5=37ca2ecb5e1fc89f73c6adc188ff685d"],"2019504":["http://blog.trendmicro.com/trendlabs-security-intelligence/sandworm-to-blacken-the-scada-connection"],"2019505":["http://blog.trendmicro.com/trendlabs-security-intelligence/sandworm-to-blacken-the-scada-connection"],"2019509":["http://pastebin.com/HK8riv9Q","http://www.binarydefense.com/bds/active-shellshock-smtp-botnet-campaign/","http://www.threatexpert.com/report.aspx?md5=77a6c50a06b59df0f3d099b1819a01d9"],"2019510":["http://www.threatexpert.com/report.aspx?md5=6ae7b0d04e2fd64a50703910d0eff9cc"],"2019511":["http://www.threatexpert.com/report.aspx?md5=d933bef7e1118b181add31eb5edc5c73"],"2019515":["http://www.threatexpert.com/report.aspx?md5=ee363de2168aab353c829434189350e4"],"2019516":["http://sslbl.abuse.ch"],"2019517":["http://sslbl.abuse.ch"],"2019520":["http://www.threatexpert.com/report.aspx?md5=e5395918babb67b495a094040efff909"],"2019521":["http://www.threatexpert.com/report.aspx?md5=e5395918babb67b495a094040efff909"],"2019522":["http://www.threatexpert.com/report.aspx?md5=2841fb14060f579e46a301baf234a1e7"],"2019523":["http://www.threatexpert.com/report.aspx?md5=bd3fd9f55900e2c63d5f4977053e8f68"],"2019524":["http://secunia.com/advisories/20300/"],"2019526":["http://www.securityfocus.com/bid/5789","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1149","http://www.osvdb.org/displayvuln.php?osvdb_id=3356"],"2019534":["http://www.threatexpert.com/report.aspx?md5=7c373c607c8724f8be461d61016ed272","http://www.fireeye.com/resources/pdfs/apt28.pdf","http://securelist.com/blog/research/72924/sofacy-apt-hits-high-profile-targets-with-updated-toolset/"],"2019535":["http://www.threatexpert.com/report.aspx?md5=3983c859a217740bf9c5dd67a4647a9d","http://www.threatexpert.com/report.aspx?md5=771bfe5d64138ef4e11e969b408ee0d7","http://thegoldenmessenger.blogspot.de/2012/12/3-disclosure-of-another-0day-malware.html","http://www.fireeye.com/resources/pdfs/apt28.pdf"],"2019536":["http://www.threatexpert.com/report.aspx?md5=3983c859a217740bf9c5dd67a4647a9d","http://www.threatexpert.com/report.aspx?md5=771bfe5d64138ef4e11e969b408ee0d7","http://thegoldenmessenger.blogspot.de/2012/12/3-disclosure-of-another-0day-malware.html","http://fireeye.com/resources/pdfs/apt28.pdf"],"2019537":["http://www.fireeye.com/resources/pdfs/apt28.pdf","http://www.threatexpert.com/report.aspx?md5=6fc8602c8b3a18765bb6d2307d8a4ae1"],"2019538":["http://vxsecurity.sg/2014/10/25/technical-teardown-hongkong-protest-malware/"],"2019539":["http://www.fireeye.com/resources/pdfs/apt28.pdf","http://www.threatexpert.com/report.aspx?md5=272f0fde35dbdfccbca1e33373b3570d"],"2019546":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019547":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019548":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019549":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019550":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019551":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019552":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019553":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019554":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019555":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019556":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019557":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019558":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019559":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019560":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019561":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019562":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019563":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019564":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019565":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019566":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019567":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019568":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019569":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019570":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019571":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019572":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019573":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019574":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019575":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019576":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019577":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019578":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019579":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019580":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019581":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019582":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019583":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019584":["http://www.fireeye.com/resources/pdfs/apt28.pdf"],"2019585":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019586":["http://fireeye.com/resources/pdfs/apt28.pdf"],"2019587":["http://blogs.cisco.com/talos/opening-zxshell/"],"2019588":["http://blogs.cisco.com/talos/opening-zxshell/"],"2019589":["http://www.threatexpert.com/report.aspx?md5=184a9d13616702154fb10ff9c5d67041"],"2019590":["http://www.threatexpert.com/report.aspx?md5=09d4c2f1f24fbdcb1c286b2f4c5589d2"],"2019592":["http://www.threatexpert.com/report.aspx?md5=2b825e46ae60a9d15b5a731e57410425"],"2019593":["http://www.threatexpert.com/report.aspx?md5=afc4d73bde2a536d7a9b7596288ce180"],"2019601":["http://www.threatexpert.com/report.aspx?md5=0c2cb38062e0fb6b040518a384418b7b"],"2019602":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=5f0c10c1705783d3f32742bce3b2aea5"],"2019603":["http://sslbl.abuse.ch"],"2019604":["http://sslbl.abuse.ch"],"2019605":["http://www.threatexpert.com/report.aspx?md5=2d8211ad47b36893b6e1b3fdceb00012"],"2019607":["http://kernelmode.info/forum/viewtopic.php?f=16&t=3563"],"2019609":["http://www.threatexpert.com/report.aspx?md5=5808cc73c78263a8114eb205f510f6a7","http://blog.malwarebytes.org/exploits-2/2014/10/exposing-the-flash-eitest-malware-campaign/"],"2019610":["http://blog.malwarebytes.org/exploits-2/2014/10/exposing-the-flash-eitest-malware-campaign/"],"2019613":["http://support.microsoft.com/kb/286310"],"2019614":["http://support.microsoft.com/kb/286310"],"2019615":["http://support.microsoft.com/kb/286310"],"2019616":["http://support.microsoft.com/kb/286310"],"2019617":["http://support.microsoft.com/kb/286310"],"2019618":["http://support.microsoft.com/kb/286310"],"2019619":["http://support.microsoft.com/kb/286310"],"2019620":["http://support.microsoft.com/kb/286310"],"2019621":["http://www.novetta.com/files/9914/1446/8050/Hikit_Analysis-Final.pdf"],"2019622":["http://www.threatexpert.com/report.aspx?md5=c6ebffb418813ed68ac5ed9f51f83946"],"2019625":["http://public.gdatasoftware.com/Presse/Publikationen/Whitepaper/EN/GDATA_TooHash_CaseStudy_102014_EN_v1.pdf"],"2019626":["http://public.gdatasoftware.com/Presse/Publikationen/Whitepaper/EN/GDATA_TooHash_CaseStudy_102014_EN_v1.pdf"],"2019627":["http://www.kahusecurity.com/2014/drupal-7-sql-injection-info/"],"2019631":["http://fireeye.com/blog/technical/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html"],"2019633":["http://public.gdatasoftware.com/Presse/Publikationen/Whitepaper/EN/GDATA_TooHash_CaseStudy_102014_EN_v1.pdf"],"2019635":["http://blog.fortinet.com/post/rom-a-new-version-of-the-backoff-pos-malware"],"2019636":["http://www.threatexpert.com/report.aspx?md5=d8e7983004c5545df6de868bc0c5a947"],"2019637":["http://pastebin.com/JpnznR3j","http://www.threatexpert.com/report.aspx?md5=fc230c9f998c196ac6897a979e08c58d"],"2019639":["http://www.threatexpert.com/report.aspx?md5=c6796076a24f35119ebe441725ec9da7"],"2019640":["http://www.symantec.com/security_response/writeup.jsp?docid=2014-110315-1233-99&tabid=2"],"2019641":["http://www.symantec.com/security_response/writeup.jsp?docid=2014-110315-1233-99&tabid=2"],"2019642":["http://malware-traffic-analysis.net/2014/10/27/index2.html"],"2019644":["http://pastebin.com/JpnznR3j","http://www.threatexpert.com/report.aspx?md5=fc230c9f998c196ac6897a979e08c58d"],"2019645":["http://malware-traffic-analysis.net/2014/11/02/index.html","http://www.threatexpert.com/report.aspx?md5=11837229f834d296342b205433e9bc48"],"2019646":["http://malware-traffic-analysis.net/2014/11/02/index.html","http://www.threatexpert.com/report.aspx?md5=11837229f834d296342b205433e9bc48"],"2019648":["http://sslbl.abuse.ch"],"2019649":["http://sslbl.abuse.ch"],"2019651":["http://www.threatexpert.com/report.aspx?md5=c078788d86c653f428fc3a62dd030ede"],"2019652":["http://www.threatexpert.com/report.aspx?md5=b648562ee817b3635fa7725afe28577c"],"2019653":["http://www.threatexpert.com/report.aspx?md5=acad4be4c587b9db9f39268cc4c0c192","http://www.threatexpert.com/report.aspx?md5=b07a6a590c729fcd47ebce37fdd6c90b"],"2019654":["http://www.threatexpert.com/report.aspx?md5=e606e56a222f788ab5cbcf40842cbc39","http://www.threatexpert.com/report.aspx?md5=099dc535bdd09d6a7bc4edabc8ded5de"],"2019660":["http://researchcenter.paloaltonetworks.com/2014/11/wirelurker-new-era-os-x-ios-malware"],"2019661":["http://paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf"],"2019662":["http://paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf"],"2019663":["http://paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf"],"2019664":["http://paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf"],"2019665":["http://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf"],"2019666":["http://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf"],"2019667":["http://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf"],"2019670":["http://sslbl.abuse.ch"],"2019671":["http://sslbl.abuse.ch"],"2019679":["http://www.threatexpert.com/report.aspx?md5=41c0cdde6be5166606008b2d02f3a128"],"2019680":["http://www.threatexpert.com/report.aspx?md5=41c0cdde6be5166606008b2d02f3a128"],"2019682":["http://blog.trendmicro.com/trendlabs-security-intelligence/new-phishing-technique-outfoxes-site-owners-operation-huyao/"],"2019683":["http://www.threatexpert.com/report.aspx?md5=79d1c8c33062324388d3d563f193a43b","http://www.threatexpert.com/report.aspx?md5=ee3c562151cc9181c6d87602bbf0a285","http://www.threatexpert.com/report.aspx?md5=a42797315c50e335f3de87f6cea61b77"],"2019686":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1635","http://labs.integrity.pt/advisories/cve-2014-1635/"],"2019687":["http://securelist.com/blog/research/66779/the-darkhotel-apt/"],"2019688":["http://securelist.com/blog/research/66779/the-darkhotel-apt/"],"2019691":["http://sslbl.abuse.ch"],"2019692":["http://www.threatexpert.com/report.aspx?md5=3083b68cb5c2a345972a5f79e735c7b9"],"2019693":["http://www.threatexpert.com/report.aspx?md5=3083b68cb5c2a345972a5f79e735c7b9"],"2019698":["http://www.threatexpert.com/report.aspx?md5=37f927437de627777c5b571fc46fb218"],"2019704":["http://www.threatexpert.com/report.aspx?md5=e24831e3f808116b30d85731c545e3ee"],"2019705":["http://www.threatexpert.com/report.aspx?md5=31536d977dfc0e158d8f7a365c0543ec"],"2019707":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019708":["http://sslbl.abuse.ch"],"2019709":["http://sslbl.abuse.ch"],"2019710":["http://microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Worm%3AVBS%2FAutorun.J#tab=2"],"2019711":["http://www.mcafee.com/threat-intelligence/malware/default.aspx?id=1607456"],"2019712":["http://microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpyWin32/Keylogger.CI#tab=2","http://www.virustotal.com/en/file/95c65d44a2dd717b27c8008470f95fe46637f624b20d9e19e0c06573b94d20f9/analysis/"],"2019713":["http://www.malware-traffic-analysis.net/2014/10/28/index.html"],"2019715":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019717":["http://www.threatexpert.com/report.aspx?md5=2155b7942ddc6d7a82e7d96a8c594501"],"2019718":["http://researchcenter.paloaltonetworks.com/2014/11/question-wirelurker-attribution-responsible"],"2019719":["http://www.threatexpert.com/report.aspx?md5=b7214b7ff246175e7b6bbe2db600f98e"],"2019720":["http://sslbl.abuse.ch"],"2019721":["http://sslbl.abuse.ch"],"2019728":["http://www.exploit-db.com/exploits/34681/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-5460"],"2019731":["http://researchcenter.paloaltonetworks.com/2014/11/question-wirelurker-attribution-responsible"],"2019732":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019733":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019734":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019735":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019736":["http://malware-traffic-analysis.net/2014/11/14/index.html"],"2019738":["http://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html?m=1"],"2019739":["http://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html?m=1"],"2019740":["http://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html?m=1"],"2019741":["http://www.seculert.com/blog/2014/11/dgas-a-domain-generation-evolution.html"],"2019746":["http://bitmessage.org"],"2019747":["http://blog.trendmicro.com/trendlabs-security-intelligence/bashlite-affects-devices-running-on-busybox/"],"2019748":["http://blog.fox-it.com/2014/11/18/cryptophp-analysis-of-a-hidden-threat-inside-popular-content-management-systems/"],"2019749":["http://blog.fox-it.com/2014/11/18/cryptophp-analysis-of-a-hidden-threat-inside-popular-content-management-systems/"],"2019750":["http://blog.quarkslab.com/abusing-samsung-knox-to-remotely-install-a-malicious-application-story-of-a-half-patched-vulnerability.html","http://cxsecurity.com/issue/WLB-2014110124"],"2019759":["http://www.threatexpert.com/report.aspx?md5=08aab7cdbfc2446fbca2a2f350df4ea2"],"2019760":["http://malware-traffic-analysis.net/2014/08/24/index.html","http://www.damballa.com/wp-content/uploads/2014/11/Behind_Malware_Infection_Chain_Rerdom.pdf"],"2019767":["http://www.threatexpert.com/report.aspx?md5=6829306e92cfa811b12d9b028eb56a2d"],"2019771":["http://www.malware-traffic-analysis.net/2014/11/21/index.html"],"2019773":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019774":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019775":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019776":["http://securelist.com/blog/virus-watch/67699/a-nightmare-on-malware-street/","http://www.threatexpert.com/report.aspx?md5=8e1bdc1c484bc03880c67424d80e351d"],"2019777":["http://securelist.com/blog/virus-watch/67699/a-nightmare-on-malware-street/","http://www.threatexpert.com/report.aspx?md5=8e1bdc1c484bc03880c67424d80e351d"],"2019778":["http://www.fishnetsecurity.com/6labs/blog/cisco-dlsw-leakage-allows-retrieval-packet-contents-remote-routers","http://github.com/tatehansen/dlsw_exploit","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-7992"],"2019779":["http://www.threatexpert.com/report.aspx?md5=e2fd0d2c44e96cab5017bb8a68ca92a6"],"2019780":["http://www.threatexpert.com/report.aspx?md5=c732b52b245444e3f568d372ce399911"],"2019786":["http://sslbl.abuse.ch"],"2019787":["http://sslbl.abuse.ch"],"2019788":["http://securelist.com/blog/virus-watch/67699/a-nightmare-on-malware-street"],"2019789":["http://securelist.com/blog/virus-watch/67699/a-nightmare-on-malware-street"],"2019790":["http://securelist.com/blog/virus-watch/67699/a-nightmare-on-malware-street"],"2019791":["http://securelist.com/blog/virus-watch/67699/a-nightmare-on-malware-street"],"2019792":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019793":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019794":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019795":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019796":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019797":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019801":["http://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities"],"2019802":["http://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities"],"2019803":["http://www.coresecurity.com/advisories/d-link-ip-cameras-multiple-vulnerabilities"],"2019804":["http://www.deependresearch.org/2014/07/another-linux-ddos-bot-via-cve-2012-1823.html"],"2019805":["http://www.threatexpert.com/report.aspx?md5=06947ce839a904d6abcb272ff46e7de1","http://www.symantec.com/security_response/writeup.jsp?docid=2014-111416-1306-99&tabid=2","http://engadget.com/2014/09/30/crackdown-on-spying-apps-leads-to-stealthgenie-ceos-arrest/"],"2019806":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019808":["http://www.fireeye.com/blog/threat-research/2014/11/operation_doubletap.html"],"2019809":["http://www.fireeye.com/blog/threat-research/2014/11/operation_doubletap.html"],"2019810":["http://sslbl.abuse.ch"],"2019811":["http://sslbl.abuse.ch"],"2019812":["http://sslbl.abuse.ch"],"2019813":["http://sslbl.abuse.ch"],"2019814":["http://sslbl.abuse.ch"],"2019815":["http://sslbl.abuse.ch"],"2019818":["http://sslbl.abuse.ch"],"2019819":["http://sslbl.abuse.ch"],"2019824":["http://www.threatexpert.com/report.aspx?md5=8258c3d8bab63cacf143cf034e2e7c1a"],"2019825":["http://www.threatexpert.com/report.aspx?md5=8e29a15caef546aab0f19a9a81732163"],"2019826":["http://www.threatexpert.com/report.aspx?md5=8e29a15caef546aab0f19a9a81732163"],"2019827":["http://www.threatexpert.com/report.aspx?md5=693c007d651bb5a8c6d2a4f5ed65a69c"],"2019828":["http://www.threatexpert.com/report.aspx?md5=ec5d7bc9d84551066fff51e36bc41d4d","http://www.threatexpert.com/report.aspx?md5=13bd584bb12ee5dc15c35f5911912b09"],"2019829":["http://www.fireeye.com/blog/threat-research/2014/11/fin4_stealing_insid.html"],"2019830":["http://securityblog.s21sec.com/2014/11/dridex-learns-new-trick-p2p-over-http.html"],"2019831":["http://blogs.mcafee.com/mcafee-labs/operation-mangal-win32syndicasec-used-targeted-attacks-indian-organizations"],"2019838":["http://www.threatexpert.com/report.aspx?md5=8cc58bc4d63f4b78b635d45aa69108f7"],"2019839":["http://sslbl.abuse.ch"],"2019840":["http://www.threatexpert.com/report.aspx?md5=506cd65bdd06f41f8219cd1ed78eac7d","http://www.threatexpert.com/report.aspx?md5=0c39b39ee4a59a8ac5fc1df500da2a88"],"2019841":["http://www.threatexpert.com/report.aspx?md5=61dacbf1fc20af3afdc432a0dd78eaf3","http://www.threatexpert.com/report.aspx?md5=a3ef217825ce310c41e6edaee2db5eb9","http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Trojan%3AWin32/Swrort.A"],"2019842":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2019843":["http://www.threatexpert.com/report.aspx?md5=13c982c3b9c1ef714770820ffa278d2e"],"2019847":["http://www.threatexpert.com/report.aspx?md5=fd0f57fd1f93c13b7bd63f811ac7939e"],"2019849":["http://logfile.packetninjas.net/related-malware-to-sony-breach"],"2019850":["http://blog.didierstevens.com/2009/07/01/embedding-and-hiding-files-in-pdf-documents/"],"2019851":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019852":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019853":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019854":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019855":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019856":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019857":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019858":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019859":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019860":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019861":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019862":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019863":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019864":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019865":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019866":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019867":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019868":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019869":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019870":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019871":["http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019878":["http://www.threatexpert.com/report.aspx?md5=d1c27ee7ce18675974edf42d4eea25c6","http://www.symantec.com/connect/blogs/destover-destructive-malware-has-links-attacks-south-korea"],"2019879":["http://sslbl.abuse.ch"],"2019882":["http://www.threatexpert.com/report.aspx?md5=c5d2a2287424ab9508ae15261020e48d"],"2019883":["http://www.threatexpert.com/report.aspx?md5=c5d2a2287424ab9508ae15261020e48d"],"2019884":["http://www.threatexpert.com/report.aspx?md5=c5d2a2287424ab9508ae15261020e48d"],"2019885":["http://www.threatexpert.com/report.aspx?md5=c5d2a2287424ab9508ae15261020e48d"],"2019886":["http://www.threatexpert.com/report.aspx?md5=c5d2a2287424ab9508ae15261020e48d"],"2019887":["http://www.threatexpert.com/report.aspx?md5=c5d2a2287424ab9508ae15261020e48d"],"2019888":["http://www.threatexpert.com/report.aspx?md5=c5d2a2287424ab9508ae15261020e48d"],"2019889":["http://www.threatexpert.com/report.aspx?md5=c5d2a2287424ab9508ae15261020e48d"],"2019890":["http://sslbl.abuse.ch"],"2019891":["http://www.threatexpert.com/report.aspx?md5=d37256439d5ab7f25561cc390d8aa1ea"],"2019896":["http://securelist.com/blog/research/67962/the-penquin-turla-2/","http://www.threatexpert.com/report.aspx?md5=19fbd8cbfb12482e8020a887d6427315"],"2019897":["http://github.com/bidord/pykek","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6324"],"2019899":["http://www.insomniasec.com/releases"],"2019900":["http://www.insomniasec.com/releases"],"2019901":["http://www.threatexpert.com/report.aspx?md5=fbeb6ebd498d85b1f404d7bb4acc3b89"],"2019902":["http://www.threatexpert.com/report.aspx?md5=fbeb6ebd498d85b1f404d7bb4acc3b89"],"2019903":["http://www.rapid7.com/db/modules/exploit/linux/http/pandora_fms_sqli"],"2019904":["http://www.fireeye.com/blog/threat-research/2014/10/the-shellshock-aftershock-for-nas-administrators.html","http://blogs.akamai.com/2014/09/environment-bashing.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019905":["http://www.fireeye.com/blog/threat-research/2014/10/the-shellshock-aftershock-for-nas-administrators.html","http://blogs.akamai.com/2014/09/environment-bashing.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6271"],"2019906":["http://sslbl.abuse.ch"],"2019907":["http://www.threatexpert.com/report.aspx?md5=c05453a18b6dc45bc258a377d2161b1c"],"2019909":["http://www.threatexpert.com/report.aspx?md5=194a931aa49583191eedd19478396ebc"],"2019910":["http://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-back-in-style/"],"2019911":["http://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-back-in-style/"],"2019912":["http://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-back-in-style/"],"2019913":["http://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-back-in-style/"],"2019914":["http://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-back-in-style/"],"2019915":["http://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-back-in-style/"],"2019919":["http://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-back-in-style/"],"2019922":["http://code.google.com/p/impacket/source/browse/trunk/examples/goldenPac.py","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6324"],"2019923":["http://www.threatexpert.com/report.aspx?md5=ef2f9909c76d32b51598c54d5685af7e"],"2019924":["http://www.threatexpert.com/report.aspx?md5=ef2f9909c76d32b51598c54d5685af7e"],"2019925":["http://www.threatexpert.com/report.aspx?md5=ef2f9909c76d32b51598c54d5685af7e"],"2019926":["http://www.threatexpert.com/report.aspx?md5=3bbd5ae250b2d912a701f8d74d85353b"],"2019927":["http://www.threatexpert.com/report.aspx?md5=ad99a0a85e1410559030464aac390969"],"2019929":["http://www.threatexpert.com/report.aspx?md5=8994e16b14cde144a9cebdff685d8676","http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019930":["http://www.threatexpert.com/report.aspx?md5=8994e16b14cde144a9cebdff685d8676","http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019931":["http://www.threatexpert.com/report.aspx?md5=9c1aac05bd3212a3abcd7cce9c6c4c77"],"2019932":["http://www.threatexpert.com/report.aspx?md5=1a9a06b11aa537734931f8098bae6b00"],"2019933":["http://www.threatexpert.com/report.aspx?md5=e36469241764b8c954a700146ca4c43f"],"2019934":["http://f-secure.com/weblog/archives/00002777.html","http://www.threatexpert.com/report.aspx?md5=e17da8702b71dfb0ee94dbc9e22eed8d"],"2019936":["http://www.threatexpert.com/report.aspx?md5=d271218da70d0bceb69c477e7d13dcc8"],"2019937":["http://tools.cisco.com/security/center/viewThreatOutbreakAlert.x?alertId=36677"],"2019938":["http://www.threatexpert.com/report.aspx?md5=f71c41b816eadf221e188f6618798969"],"2019941":["http://www.threatexpert.com/report.aspx?md5=647edeb30a04eeb30b7f8921645c7369"],"2019942":["http://www.threatexpert.com/report.aspx?md5=68cfc418c72b58b770bdccf19805703e","http://www0.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019943":["http://www.cylance.com/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf"],"2019944":["http://www.threatexpert.com/report.aspx?md5=9befc43d2019c5614e7372a16e3a5ce5"],"2019945":["http://www.threatexpert.com/report.aspx?md5=801e450679e9d60f8c64675c432aab33","http://www.threatexpert.com/report.aspx?md5=ad2e8210ca7c2b4b433b3fba65e87b94","http://www.threatexpert.com/report.aspx?md5=f6ea10f719885fbcfb6743724faa94f7"],"2019946":["http://www.threatexpert.com/report.aspx?md5=cb53a6e8d65d86076fc0c94dac62aa77"],"2019947":["http://www.threatexpert.com/report.aspx?md5=3b4f77eefd208f699e6a540878e753a8"],"2019948":["http://www.threatexpert.com/report.aspx?md5=fe5dc2a4ee8aa084c9da42cd2d1ded2e"],"2019951":["http://seclists.org/fulldisclosure/2014/Nov/78"],"2019955":["http://www.threatexpert.com/report.aspx?md5=417a42f5e244ce2f340f16fa2fed0412"],"2019958":["http://researchcenter.paloaltonetworks.com/2014/12/coolreaper-revealed-backdoor-coolpad-android-devices/"],"2019959":["http://researchcenter.paloaltonetworks.com/2014/12/coolreaper-revealed-backdoor-coolpad-android-devices/"],"2019960":["http://researchcenter.paloaltonetworks.com/2014/12/coolreaper-revealed-backdoor-coolpad-android-devices/"],"2019961":["http://www.threatexpert.com/report.aspx?md5=f25a8e3f5265a57269590b84a506b672","http://blog.trendmicro.com/trendlabs-security-intelligence/malware-campaign-targets-south-korean-banks-uses-pinterest-as-cc-channel/"],"2019962":["http://sslbl.abuse.ch"],"2019963":["http://www.acunetix.com/"],"2019964":["http://ahnlabasec.tistory.com/1007"],"2019965":["http://techhelplist.com/index.php/spam-list/695-financial-statement-malware"],"2019974":["http://www.threatexpert.com/report.aspx?md5=294752c7c4fcf4252a9e99bb4df7ff5c"],"2019975":["http://www.threatexpert.com/report.aspx?md5=f8bfb82aa92ea6a8e4e0b378781b3859","http://citizenlab.org/2014/12/malware-attack-targeting-syrian-isis-critics"],"2019978":["http://barracudalabs.com/2014/12/new-cryptolocker-spear-phishing-campaign-looks-to-be-the-grinch-that-stole-christmas-in-australia/"],"2019979":["http://barracudalabs.com/2014/12/new-cryptolocker-spear-phishing-campaign-looks-to-be-the-grinch-that-stole-christmas-in-australia/"],"2019981":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2019982":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2019983":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2019984":["http://barracudalabs.com/2014/12/new-cryptolocker-spear-phishing-campaign-looks-to-be-the-grinch-that-stole-christmas-in-australia/"],"2019985":["http://www.threatexpert.com/report.aspx?md5=755dad1f37a9d3fae1352dbbc409102c","http://pwc.blogs.com/cyber_security_updates/2014/12/festive-spearphishing-merry-christmas-from-an-apt-actor.html"],"2019986":["http://www.threatexpert.com/report.aspx?md5=755dad1f37a9d3fae1352dbbc409102c","http://pwc.blogs.com/cyber_security_updates/2014/12/festive-spearphishing-merry-christmas-from-an-apt-actor.html"],"2019987":["http://sslbl.abuse.ch"],"2019988":["http://geti2p.net"],"2019994":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2019995":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2019996":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2019998":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020000":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020001":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020002":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020003":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020004":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020005":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020006":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020007":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020008":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020009":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020010":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020011":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020012":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020013":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020014":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020015":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020016":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020017":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020018":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020019":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020020":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020021":["http://threatconnect.com/news/operation-poisoned-helmand/"],"2020023":["http://www.us-cert.gov/ncas/alerts/TA14-353A"],"2020024":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020025":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020026":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020027":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020028":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020029":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020030":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020031":["http://www.threatexpert.com/report.aspx?md5=1837561f9537d2fcc2b4f0ea6fd3a095"],"2020032":["http://www.threatexpert.com/report.aspx?md5=6b7759565454fb7d02fb5bc638136f31"],"2020034":["http://www.threatexpert.com/report.aspx?md5=1837561f9537d2fcc2b4f0ea6fd3a095","http://www.symantec.com/security_response/writeup.jsp?docid=2014-121000-1027-99&tabid=2"],"2020035":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020036":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020037":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020038":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020039":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020040":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020041":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf","http://www.threatexpert.com/report.aspx?md5=0ad4892ead67e65ec3dd4c978fce7d92"],"2020044":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020045":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020046":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020047":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020048":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020049":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020050":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020051":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020052":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020053":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020054":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020055":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020056":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020057":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020058":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020059":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020060":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020061":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020062":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020063":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2020064":["http://www.threatexpert.com/report.aspx?md5=ac6ea1e500de772341a2075a7d916d63"],"2020065":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020066":["http://fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf"],"2020067":["http://www.threatexpert.com/report.aspx?md5=d2d3c212f430bff2b5f075fa083de047","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2020070":["http://www.threatexpert.com/report.aspx?md5=18fa3ab45c6fa9da218dd4c35688c5f4"],"2020075":["http://sslbl.abuse.ch"],"2020076":["http://www.threatexpert.com/report.aspx?md5=7a1ad388bdcebcbc4cc48a2eff71775f"],"2020078":["http://isc.sans.edu/forums/diary/Rocket+Kitten+Is+it+still+APT+if+you+can+buy+it+off+the+shelf/19123","http://www.threatexpert.com/report.aspx?md5=f89a4d4ae5cca6d69a5256c96111e707"],"2020079":["http://sslbl.abuse.ch"],"2020081":["http://www.threatexpert.com/report.aspx?md5=f5ba42117dd02f50b12542131dcd8b5f"],"2020083":["http://blog.trendmicro.com/trendlabs-security-intelligence/64-bit-version-of-havex-spotted/"],"2020089":["http://www.threatexpert.com/report.aspx?md5=bdd2328d466e563a650bb7ccdb9aca79","http://www.threatexpert.com/report.aspx?md5=ba1404af71ecf3ca8b0e30a2b365f6fd","http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Backdoor%3AWin32%2FHtbot.B"],"2020090":["http://www.threatexpert.com/report.aspx?md5=203cec547d7d7d7b3a51084ad1abd793"],"2020092":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7862","http://seclists.org/fulldisclosure/2015/Jan/2"],"2020093":["http://www.threatexpert.com/report.aspx?md5=bf555378d935de805f39c2d2d965a888","http://securitykitten.github.io/an-evening-with-n3utrino/"],"2020094":["http://www.threatexpert.com/report.aspx?md5=bf555378d935de805f39c2d2d965a888","http://securitykitten.github.io/an-evening-with-n3utrino/"],"2020095":["http://www.threatexpert.com/report.aspx?md5=5f50e810668942e8d694faeabab08260","http://blog.0x3a.com/post/107195908164/analysis-of-steam-stealers-and-the-steam-stealer"],"2020099":["http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4969"],"2020100":["http://mis.fortunecook.ie/too-many-cooks-exploiting-tr069_tal-oppenheim_31c3.pdf"],"2020101":["http://mis.fortunecook.ie/too-many-cooks-exploiting-tr069_tal-oppenheim_31c3.pdf"],"2020104":["http://sslbl.abuse.ch"],"2020105":["http://blogs.cisco.com/security/talos/cryptowall-2"],"2020106":["http://blogs.cisco.com/security/talos/cryptowall-2"],"2020107":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020108":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020109":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020110":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020111":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020112":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020113":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020114":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020115":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020116":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020117":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020118":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020119":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020120":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020121":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020122":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020123":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020124":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020125":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020126":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020127":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020128":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020129":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020130":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020131":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020132":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020133":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020134":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020135":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020136":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020137":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020138":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020139":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020140":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020141":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020142":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020143":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020144":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020145":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020146":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020147":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020148":["http://blog.trendmicro.com/trendlabs-security-intelligence/banking-trojan-dridex-uses-macros-for-infection/"],"2020149":["http://sslbl.abuse.ch"],"2020150":["http://www.threatexpert.com/report.aspx?md5=ad7e8dd9140d02f47eca2d8402e2ecc4"],"2020151":["http://www.threatexpert.com/report.aspx?md5=ad7e8dd9140d02f47eca2d8402e2ecc4"],"2020152":["http://www.threatexpert.com/report.aspx?md5=ad7e8dd9140d02f47eca2d8402e2ecc4"],"2020153":["http://www.threatexpert.com/report.aspx?md5=ad7e8dd9140d02f47eca2d8402e2ecc4"],"2020154":["http://www.threatexpert.com/report.aspx?md5=fcf364abd9c82d89f8d0b4b091276b41"],"2020155":["http://www.threatexpert.com/report.aspx?md5=fcf364abd9c82d89f8d0b4b091276b41"],"2020156":["http://www.threatexpert.com/report.aspx?md5=37d530ffa0bf1129f2db63b75fccce28"],"2020157":["http://www.threatexpert.com/report.aspx?md5=cd74438c04b09baa5c32ad0e5a0306e7"],"2020158":["http://f-secure.com/weblog/archives/00002780.html"],"2020162":["http://www.threatexpert.com/report.aspx?md5=5924bcc045bb7039f55c6ce29234e29a","http://github.com/pop-pop-ret/lizkebab"],"2020163":["http://www.threatexpert.com/report.aspx?md5=5924bcc045bb7039f55c6ce29234e29a","http://github.com/pop-pop-ret/lizkebab"],"2020164":["http://www.threatexpert.com/report.aspx?md5=5924bcc045bb7039f55c6ce29234e29a","http://github.com/pop-pop-ret/lizkebab"],"2020165":["http://www.threatexpert.com/report.aspx?md5=5924bcc045bb7039f55c6ce29234e29a","http://github.com/pop-pop-ret/lizkebab"],"2020166":["http://www.threatexpert.com/report.aspx?md5=5924bcc045bb7039f55c6ce29234e29a","http://github.com/pop-pop-ret/lizkebab"],"2020167":["http://github.com/pop-pop-ret/lizkebab"],"2020168":["http://kernelmode.info/forum/viewtopic.php?f=16&t=3671"],"2020169":["http://blog.dragonthreatlabs.com/2015/01/dtl-12012015-01-hong-kong-swc-attack.html"],"2020170":["http://github.com/enigma0x3/Generate-Macro/blob/master/Generate-Macro.ps1"],"2020171":["http://blog.dragonthreatlabs.com/2015/01/dtl-12012015-01-hong-kong-swc-attack.html"],"2020173":["http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis"],"2020174":["http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis"],"2020175":["http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis"],"2020176":["http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis"],"2020177":["http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis"],"2020178":["http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis"],"2020179":["http://www.threatexpert.com/report.aspx?md5=c83b55ab56f3deb60858cb25d6ded8c4"],"2020181":["http://www.threatexpert.com/report.aspx?md5=7943a103d7b79f87843655e6b2f8e80c"],"2020182":["http://malware.dontneedcoffee.com/2015/01/guess-whos-back-again-cryptowall-30.html"],"2020183":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020184":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020185":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020186":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020187":["http://sslbl.abuse.ch"],"2020188":["http://kernelmode.info/forum/viewtopic.php?f=16&t=3682"],"2020195":["http://www.exploitpack.com"],"2020196":["http://sslbl.abuse.ch"],"2020197":["http://www.threatexpert.com/report.aspx?md5=4c80e5f72a2ab8324b981e37b3b0e5d1"],"2020203":["http://www.threatexpert.com/report.aspx?md5=bc27f28e5fe47b78202fd3108d39aac1","http://www.threatexpert.com/report.aspx?md5=38c89cca7806fde08bba82b3cb533e5a","http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Backdoor%3AWin32/Zeprox.B"],"2020205":["http://www.threatexpert.com/report.aspx?md5=dbcdaf617e19d2a35f763ac996cf8cd7"],"2020206":["http://www.threatexpert.com/report.aspx?md5=35a7f70c5e0cd4814224c96e3c62fa42"],"2020209":["http://www.threatexpert.com/report.aspx?md5=8643a44febdf73159b2d5c437dc40cd3"],"2020210":["http://www.threatexpert.com/report.aspx?md5=49e988b04144b478e3f52b2abe8a5572"],"2020211":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020213":["http://www.threatexpert.com/report.aspx?md5=18dfcf3479bbd3878c0f19b80a01e813"],"2020214":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=0a09c176351398922770153bdd54c594"],"2020215":["http://www.threatexpert.com/report.aspx?md5=05054afcfc6a651a057e47cd0f013c7b"],"2020216":["http://sslbl.abuse.ch"],"2020217":["http://sslbl.abuse.ch"],"2020218":["http://sslbl.abuse.ch"],"2020219":["http://sslbl.abuse.ch"],"2020220":["http://sslbl.abuse.ch"],"2020221":["http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html"],"2020222":["http://www.threatexpert.com/report.aspx?md5=b9096b87cf643c5f86789d995e9e773d"],"2020228":["http://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/"],"2020229":["http://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/"],"2020230":["http://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/"],"2020231":["http://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/"],"2020232":["http://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/"],"2020233":["http://www.threatexpert.com/report.aspx?md5=3c53c9f7ab32a09de89bb44e5f91f9af"],"2020235":["http://malware-traffic-analysis.net/2015/01/15/index.html"],"2020237":["http://www.bluecoat.com/security-blog/2015-01-20/reversing-inception-apt-malware"],"2020238":["http://malwareprotectioncenter.com/2015/01/20/bobrowser"],"2020239":["http://malwareprotectioncenter.com/2015/01/20/bobrowser"],"2020240":["http://malwareprotectioncenter.com/2015/01/20/bobrowser"],"2020241":["http://blog.gdatasoftware.com/blog/article/analysis-of-project-cobra.html"],"2020242":["http://sslbl.abuse.ch"],"2020243":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020244":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020245":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020246":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020247":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020248":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020249":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020250":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020251":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020252":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020253":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020254":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020255":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020256":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020257":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020258":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020259":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020260":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020261":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020262":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020263":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020264":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020265":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020266":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020267":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020268":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020269":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020270":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020271":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020272":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020273":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020274":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020275":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020276":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020277":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020278":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020279":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020280":["http://blogs.cisco.com/security/talos/cryptowall-2","http://researchcenter.paloaltonetworks.com/2014/10/tracking-new-ransomware-cryptowall-2-0/"],"2020281":["http://blogs.cisco.com/security/talos/cryptowall-2","http://researchcenter.paloaltonetworks.com/2014/10/tracking-new-ransomware-cryptowall-2-0/"],"2020282":["http://blogs.cisco.com/security/talos/cryptowall-2","http://researchcenter.paloaltonetworks.com/2014/10/tracking-new-ransomware-cryptowall-2-0/"],"2020284":["http://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/"],"2020285":["http://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/"],"2020286":["http://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/"],"2020287":["http://isc.sans.edu/forums/diary/Traffic+Patterns+For+CryptoWall+30/19203/"],"2020292":["http://blogs.cisco.com/security/talos/cryptowall-2","http://researchcenter.paloaltonetworks.com/2014/10/tracking-new-ransomware-cryptowall-2-0/"],"2020293":["http://www.threatexpert.com/report.aspx?md5=c621055803c68e89f3cb141608fd0894","http://www.threatexpert.com/report.aspx?md5=3c2be5202d2d68047c76bdf7e1dfc2be"],"2020294":["http://phishme.com/evolution-upatre-dyre/"],"2020296":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012","http://www.threatexpert.com/report.aspx?md5=a36db258d0f6f085e8e5030d8e9a9bf4"],"2020297":["http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012","http://www.threatexpert.com/report.aspx?md5=a36db258d0f6f085e8e5030d8e9a9bf4"],"2020298":["http://www.threatexpert.com/report.aspx?md5=15deb1167a383d20b4232503b2f22b24","http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020299":["http://www.threatexpert.com/report.aspx?md5=15deb1167a383d20b4232503b2f22b24","http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2020301":["http://www.threatexpert.com/report.aspx?md5=b9de687cdae55d3c9fcfe6fc8bcdd28f"],"2020302":["http://www.threatexpert.com/report.aspx?md5=b9de687cdae55d3c9fcfe6fc8bcdd28f"],"2020303":["http://www.threatexpert.com/report.aspx?md5=fdcf0e3e3ad69cdd570387c4ce9aa8b3","http://ahnlabasec.tistory.com/1007"],"2020305":["http://kurtaubuchon.blogspot.com.es/2015/01/mc-sqlr-amplification-ms-sql-server.html"],"2020306":["http://kurtaubuchon.blogspot.com.es/2015/01/mc-sqlr-amplification-ms-sql-server.html"],"2020307":["http://sslbl.abuse.ch"],"2020309":["http://securelist.com/blog/research/68438/an-analysis-of-regins-hopscotch-and-legspin"],"2020310":["http://securelist.com/blog/research/68438/an-analysis-of-regins-hopscotch-and-legspin"],"2020313":["http://sslbl.abuse.ch"],"2020314":["http://sslbl.abuse.ch"],"2020315":["http://www.threatexpert.com/report.aspx?md5=636edeba541483421e29b81b35f92841","http://www.threatexpert.com/report.aspx?md5=c5763d0ef12dffa213d265596bd1acf9","http://www.threatexpert.com/report.aspx?md5=5e01557b8650616e005a9949cbf5459a"],"2020316":["http://www.threatexpert.com/report.aspx?md5=636edeba541483421e29b81b35f92841","http://www.threatexpert.com/report.aspx?md5=c5763d0ef12dffa213d265596bd1acf9","http://www.threatexpert.com/report.aspx?md5=5e01557b8650616e005a9949cbf5459a"],"2020322":["http://sslbl.abuse.ch"],"2020324":["http://www.threatexpert.com/report.aspx?md5=a46e609662eb94a726fcb4471b7057d4","http://www.threatexpert.com/report.aspx?md5=2b62cdb6bcec4bff47eff437e4fc46d3","http://github.com/starius/onion2web"],"2020325":["http://openwall.com/lists/oss-security/2015/01/27/9"],"2020326":["http://openwall.com/lists/oss-security/2015/01/27/9"],"2020329":["http://www.threatexpert.com/report.aspx?md5=57e546330fd3a4658dff0e29cbb98214"],"2020330":["http://www.threatexpert.com/report.aspx?md5=57e546330fd3a4658dff0e29cbb98214"],"2020331":["http://sslbl.abuse.ch"],"2020333":["http://welivesecurity.com/2015/01/29/msilagent-pyo-have-botnet-will-travel/"],"2020334":["http://welivesecurity.com/2015/01/29/msilagent-pyo-have-botnet-will-travel/"],"2020335":["http://welivesecurity.com/2015/01/29/msilagent-pyo-have-botnet-will-travel/"],"2020336":["http://welivesecurity.com/2015/01/29/msilagent-pyo-have-botnet-will-travel/"],"2020337":["http://welivesecurity.com/2015/01/29/msilagent-pyo-have-botnet-will-travel/"],"2020338":["http://github.com/wpscanteam/wpscan"],"2020339":["http://www.threatexpert.com/report.aspx?md5=160634d784c256d29563117554685c31","http://community.websense.com/blogs/securitylabs/archive/2015/01/29/new-f0xy-malware-employs-cunning-stealth-amp-trickery.aspx"],"2020340":["http://www.threatexpert.com/report.aspx?md5=160634d784c256d29563117554685c31","http://community.websense.com/blogs/securitylabs/archive/2015/01/29/new-f0xy-malware-employs-cunning-stealth-amp-trickery.aspx"],"2020341":["http://www.threatexpert.com/report.aspx?md5=160634d784c256d29563117554685c31","http://community.websense.com/blogs/securitylabs/archive/2015/01/29/new-f0xy-malware-employs-cunning-stealth-amp-trickery.aspx"],"2020343":["http://www.threatexpert.com/report.aspx?md5=b91315805ef1df07bdbfa07d3a467424","http://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-behind-the-syria-conflict.pdf"],"2020344":["http://www.threatexpert.com/report.aspx?md5=71bae4762a6d2c446584f1ae991a8fbe"],"2020345":["http://www.threatexpert.com/report.aspx?md5=71bae4762a6d2c446584f1ae991a8fbe"],"2020346":["http://www.threatexpert.com/report.aspx?md5=44df02ac28d80deb45f5c7c48b56a858","http://fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-behind-the-syria-conflict.pdf"],"2020348":["http://seclists.org/fulldisclosure/2015/Jan/131","http://www.threatexpert.com/report.aspx?md5=cdcc132fad2e819e7ab94e5e564e8968"],"2020349":["http://seclists.org/fulldisclosure/2015/Jan/131","http://www.threatexpert.com/report.aspx?md5=cdcc132fad2e819e7ab94e5e564e8968"],"2020350":["http://seclists.org/fulldisclosure/2015/Jan/131","http://www.threatexpert.com/report.aspx?md5=cdcc132fad2e819e7ab94e5e564e8968"],"2020353":["http://research.zscaler.com/2015/02/android-banking-trojan-and-sms-stealer.html","http://www.threatexpert.com/report.aspx?md5=ff081c1400a948f2bcc4952fed2c818b"],"2020358":["http://www.threatexpert.com/report.aspx?md5=adb0de790bd3fb88490a60f0dddd90fa"],"2020363":["http://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-update-ios-espionage-app-found/"],"2020364":["http://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-update-ios-espionage-app-found/"],"2020368":["http://blog.sucuri.net/2015/02/zero-day-in-the-fancybox-for-wordpress-plugin.html"],"2020371":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=eb7909105fd05064b14a21465742952c"],"2020372":["http://sslbl.abuse.ch"],"2020374":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020375":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020376":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020377":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020378":["http://www.threatexpert.com/report.aspx?md5=5acc539355258122f8cdc7f5c13368e1"],"2020380":["http://www.threatexpert.com/report.aspx?md5=5acc539355258122f8cdc7f5c13368e1"],"2020381":["http://blog.malwaremustdie.org/2014/09/mmd-0028-2014-fuzzy-reversing-new-china.html"],"2020382":["http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis"],"2020383":["http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis"],"2020384":["http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis"],"2020389":["http://deependresearch.org/2015/02/linuxbackdoorxnote1-indicators.html"],"2020390":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020391":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020393":["http://1337day.com/exploit/22581","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6041","http://github.com/rapid7/metasploit-framework/commit/7f2add2ce30f33e7787310d7abcb1781e8ea8f43"],"2020395":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020396":["http://www.threatexpert.com/report.aspx?md5=9471e926eda81b4f797b6cfe273e4e79"],"2020397":["http://1337day.com/exploit/22581","http://blog.trendmicro.com/trendlabs-security-intelligence/same-origin-policy-bypass-vulnerability-has-wider-reach-than-thought/"],"2020398":["http://1337day.com/exploit/22581","http://blog.trendmicro.com/trendlabs-security-intelligence/same-origin-policy-bypass-vulnerability-has-wider-reach-than-thought/"],"2020400":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020401":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020402":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020404":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020405":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020406":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020410":["http://www.threatexpert.com/report.aspx?md5=85f3b302afa0989a91053af6092f3882"],"2020411":["http://www.threatexpert.com/report.aspx?md5=b2b82fd662dd0ddf53aa37bb9025bf92"],"2020412":["http://www.threatexpert.com/report.aspx?md5=c9025c9835d1b7d6f0dd2390ea7d5e18"],"2020415":["http://phishme.com/dyre-attackers-shift-tactics/"],"2020416":["http://phishme.com/dyre-attackers-shift-tactics/"],"2020418":["http://www.threatexpert.com/report.aspx?md5=7af6d8de2759b8cc534ffd72fdd8a654"],"2020420":["http://www.threatexpert.com/report.aspx?md5=6c41449d6c3efd4c9f98374a0d132ff6"],"2020421":["http://www.threatexpert.com/report.aspx?md5=6c41449d6c3efd4c9f98374a0d132ff6"],"2020430":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020431":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020432":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020433":["http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020434":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020435":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020436":["http://www.threatexpert.com/report.aspx?md5=5efc02d416b15554b25d9acec362148e","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020437":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020438":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020439":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020440":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020441":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020442":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020443":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020444":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020445":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020446":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020447":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020448":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020449":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020450":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020451":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020452":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020453":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020454":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf"],"2020455":["http://www.threatexpert.com/report.aspx?md5=6ae1bb06d10f253116925371c8e3e74b","http://securelist.com/files/2015/02/Carbanak_APT_eng.pdf"],"2020456":["http://securelist.com/files/2015/02/Carbanak_APT_eng.pdf"],"2020457":["http://blogs.cisco.com/security/talos/bad-browser-plug-ins"],"2020458":["http://www.threatexpert.com/report.aspx?md5=53752a41ed21172343f678423d6c9a44"],"2020459":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020461":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020462":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020464":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020465":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020466":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020467":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020468":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020469":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020470":["http://www.threatexpert.com/report.aspx?md5=6948d4f22e8d57369988be219ab70335"],"2020471":["http://motherboard.vice.com/read/meet-babar-a-new-malware-almost-certainly-created-by-france"],"2020472":["http://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"],"2020474":["http://motherboard.vice.com/read/meet-babar-a-new-malware-almost-certainly-created-by-france"],"2020479":["http://www.threatexpert.com/report.aspx?md5=fbfe6c2673aec9098e1fc9bf6d7fc059"],"2020480":["http://www.threatexpert.com/report.aspx?md5=6a15f19a3ccd05f74537464e6df64dab"],"2020485":["http://packetstormsecurity.com/files/130418/dlink-DSL2640B.txt"],"2020486":["http://packetstormsecurity.com/files/130418/dlink-DSL2640B.txt"],"2020487":["http://packetstormsecurity.com/files/130418/dlink-DSL2640B.txt"],"2020488":["http://www.hackersbay.in/2011/02/pwning-routersbsnl.html"],"2020489":["http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html","http://myce.com/news/lenovo-laptops-come-with-preinstalled-advertisement-injecting-adware-74290/"],"2020490":["http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html","http://myce.com/news/lenovo-laptops-come-with-preinstalled-advertisement-injecting-adware-74290/"],"2020491":["http://malware-traffic-analysis.net/2014/09/09/index.html"],"2020492":["http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html","http://myce.com/news/lenovo-laptops-come-with-preinstalled-advertisement-injecting-adware-74290/"],"2020493":["http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html","http://myce.com/news/lenovo-laptops-come-with-preinstalled-advertisement-injecting-adware-74290/"],"2020503":["http://www.threatexpert.com/report.aspx?md5=046e4b3ff7b323f2147f2d5d43b7e5f4","http://www.threatexpert.com/report.aspx?md5=e4ab12da8828a7f1e6c077a2999f8320"],"2020504":["http://www.threatexpert.com/report.aspx?md5=046e4b3ff7b323f2147f2d5d43b7e5f4","http://www.threatexpert.com/report.aspx?md5=e4ab12da8828a7f1e6c077a2999f8320"],"2020505":["http://www.threatexpert.com/report.aspx?md5=df9516919e75853742e63db318e7d346"],"2020558":["http://pwc.blogs.com/cyber_security_updates/2014/10/scanboxframework-whos-affected-and-whos-using-it-1.html"],"2020559":["http://pwc.blogs.com/cyber_security_updates/2014/10/scanbox-framework-whosaffected-and-whos-using-it-1.html"],"2020560":["http://pwc.blogs.com/cyber_security_updates/2014/10/scanbox-framework-whosaffected-and-whos-using-it-1.html"],"2020561":["http://pwc.blogs.com/cyber_security_updates/2014/10/scanbox-framework-whosaffected-and-whos-using-it-1.html"],"2020562":["http://pwc.blogs.com/cyber_security_updates/2014/10/scanbox-framework-whosaffected-and-whos-using-it-1.html"],"2020563":["http://pwc.blogs.com/cyber_security_updates/2014/10/scanbox-framework-whosaffected-and-whos-using-it-1.html"],"2020564":["http://sslbl.abuse.ch"],"2020565":["http://dropbox.com"],"2020567":["http://sslbl.abuse.ch"],"2020568":["http://www.threatexpert.com/report.aspx?md5=e610d3c383a4f1c8a27aaf018b12c370"],"2020569":["http://www.threatexpert.com/report.aspx?md5=754b48c57a00b7c9f0e0640166ac7bb5"],"2020574":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020577":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020578":["http://blog.hboeck.de/archives/866-PrivDog-wants-to-protect-your-privacy-by-sending-data-home-in-clear-text.html","http://blog.lumension.com/9848/whats-worse-than-superfish-meet-privdog-leaving-users-wide-open-to-attacks/"],"2020579":["http://blog.hboeck.de/archives/866-PrivDog-wants-to-protect-your-privacy-by-sending-data-home-in-clear-text.html","http://blog.lumension.com/9848/whats-worse-than-superfish-meet-privdog-leaving-users-wide-open-to-attacks/"],"2020580":["http://blog.hboeck.de/archives/866-PrivDog-wants-to-protect-your-privacy-by-sending-data-home-in-clear-text.html","http://blog.lumension.com/9848/whats-worse-than-superfish-meet-privdog-leaving-users-wide-open-to-attacks/"],"2020581":["http://www.threatexpert.com/report.aspx?md5=34ad24860495397c994f8ae168d0e639"],"2020582":["http://sslbl.abuse.ch"],"2020583":["http://beyondbinary.io/advisory/seagate-nas-rce"],"2020585":["http://exploit-db.com/exploits/36078"],"2020586":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=019ab136fd79147b10ddb3e4162709db"],"2020590":["http://github.com/darkarnium/secpub/tree/master/Multivendor/ncc2"],"2020601":["http://www.threatexpert.com/report.aspx?md5=dfb7dd8b6975b73dc9c731319a05f86d"],"2020602":["http://morphick.net/blog/2015/2/27/mailslot-pos"],"2020603":["http://github.com/darkarnium/secpub/tree/master/Multivendor/ncc2"],"2020605":["http://blog.malwarebytes.org/exploits-2/2015/02/celebrity-chef-jamie-olivers-website-hacked-redirects-to-exploit-kit/"],"2020606":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=5ad0bb62806297fb8bf159d94f82dbb9"],"2020607":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=69ffa441a8c3cf4d8fe643174bebb51d"],"2020608":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=2e99b9462f95154e9f5b94eeed33a6e3"],"2020609":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=1701f8c71b5861a2f2890dc609ef6eda"],"2020610":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=4b70f302c72c94d0b9214808d9f72419"],"2020611":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=61c03cdd39f0618d1643af15594da3e4"],"2020612":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=5a0e030383c472f7d94c0bcd6af71a90"],"2020613":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=4d6e0de81f57461337ccfbcce6dc1056"],"2020614":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=5f42a5b709bf9a1377d2464f936fc841"],"2020617":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020618":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020619":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020620":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020621":["http://www.threatexpert.com/report.aspx?md5=a4a3fab712b04ee901f491d4c704b138"],"2020623":["http://securityintelligence.com/tsukuba-banking-trojan-phishing-in-japanese-waters"],"2020625":["http://sslbl.abuse.ch"],"2020627":["http://www.threatexpert.com/report.aspx?md5=2d71e44c02784d579fb4af18bbbeae6c"],"2020628":["http://www.threatexpert.com/report.aspx?md5=2d71e44c02784d579fb4af18bbbeae6c"],"2020629":["http://www.threatexpert.com/report.aspx?md5=2d71e44c02784d579fb4af18bbbeae6c"],"2020639":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020640":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020641":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020642":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020645":["http://www.threatexpert.com/report.aspx?md5=fc962cb08f62e3d6368500a8e747cf73"],"2020646":["http://www.threatexpert.com/report.aspx?md5=baf71ace207afd3f330c4aba3784e074"],"2020647":["http://sslbl.abuse.ch"],"2020648":["http://jordan-wright.github.io/blog/2015/03/08/elasticsearch-rce-vulnerability-cve-2015-1427"],"2020650":["http://blog.trendmicro.com/trendlabs-security-intelligence/multiplatform-boleto-fraud-hits-users-in-brazil/"],"2020651":["http://blog.trendmicro.com/trendlabs-security-intelligence/multiplatform-boleto-fraud-hits-users-in-brazil/"],"2020652":["http://blog.trendmicro.com/trendlabs-security-intelligence/multiplatform-boleto-fraud-hits-users-in-brazil/"],"2020653":["http://blog.trendmicro.com/trendlabs-security-intelligence/multiplatform-boleto-fraud-hits-users-in-brazil/"],"2020654":["http://blog.trendmicro.com/trendlabs-security-intelligence/multiplatform-boleto-fraud-hits-users-in-brazil/"],"2020655":["http://blog.trendmicro.com/trendlabs-security-intelligence/multiplatform-boleto-fraud-hits-users-in-brazil/"],"2020656":["http://blog.trendmicro.com/trendlabs-security-intelligence/multiplatform-boleto-fraud-hits-users-in-brazil/"],"2020657":["http://trustwave.com/Resources/SpiderLabs-Blog/Attackers-concealing-malicious-macros-in-XML-files/"],"2020661":["http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-0204","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-1637"],"2020670":["http://www.threatexpert.com/report.aspx?md5=499a46c23afe23de49346adf1b4f3a4f","http://www.mogozobo.com/?p=2371"],"2020671":["http://www.threatexpert.com/report.aspx?md5=6b71398418c7c6b01cf8abb105bc884d"],"2020683":["http://www.threatexpert.com/report.aspx?md5=85d925a76909f29c3f370f35faedb9ea"],"2020685":["http://teknoseyir.com/durum/291421"],"2020686":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020687":["http://sslbl.abuse.ch"],"2020688":["http://sslbl.abuse.ch"],"2020689":["http://sslbl.abuse.ch"],"2020690":["http://www.threatexpert.com/report.aspx?md5=5f1997927e94b98982e5ee2cea095956"],"2020691":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=0fc4f20426ab1da2c705a4523d3baa0b"],"2020692":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=06be359c6e6396fe105e8b59ac5a992e"],"2020693":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=20a72c5af06e054ff840915b6632965f"],"2020694":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=6a263de8d3f6d82e73330c84a83057bf"],"2020695":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=0fbca8d9f71265f44513e4f885587301"],"2020696":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=0045ce5ce7d697ecc86f1e44398bf404"],"2020697":["http://sslbl.abuse.ch"],"2020699":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3333"],"2020701":["http://www.threatexpert.com/report.aspx?md5=e89ec5e8f89ee6ae4a6b65157c886614"],"2020702":["http://torrentfreak.com/zombie-pirate-bay-tracker-fuels-chinese-ddos-attacks-150124/"],"2020703":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020704":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020706":["http://www.threatexpert.com/report.aspx?md5=693ca229558aab99e0a9d3385cacc40c"],"2020707":["http://www.bleepingcomputer.com/forums/t/570390/vaultcrypt-uses-batch-files-and-open-source-gnupg-to-hold-your-files-hostage"],"2020708":["http://www.threatexpert.com/report.aspx?md5=3031604f1cf95ee4ccc339c9e4d5b92f"],"2020712":["http://www.threatexpert.com/report.aspx?md5=54c9288cbbf29062d6d873cba844645a"],"2020717":["http://www.threatexpert.com/report.aspx?md5=c075fa8484d52c3978826c2f07ce9a9c"],"2020718":["http://www.threatexpert.com/report.aspx?md5=c075fa8484d52c3978826c2f07ce9a9c"],"2020723":["http://www.threatexpert.com/report.aspx?md5=fe0f997d81d88bc11cc03e4d1fd61ebe"],"2020724":["http://www.threatexpert.com/report.aspx?md5=593af622a90f2038e35ee980e09c1c3c","http://researchcenter.paloaltonetworks.com/2015/03/findpos-new-pos-malware-family-discovered/","http://blogs.cisco.com/security/talos/poseidon"],"2020728":["http://www.threatexpert.com/report.aspx?md5=4e5c28fab23b35dea2d48a1c2db32b56"],"2020729":["http://www.threatexpert.com/report.aspx?md5=ef79985c90675e7abfb6b9a6bc5a6c65"],"2020735":["http://sslbl.abuse.ch"],"2020736":["http://googleonlinesecurity.blogspot.com/2015/03/maintaining-digital-certificate-security.html"],"2020737":["http://www.threatexpert.com/report.aspx?md5=aa9542f02b26a554650a9649d2239181"],"2020739":["http://www.threatexpert.com/report.aspx?md5=83c0b99427c026aad36b0d8204377702"],"2020740":["http://www.threatexpert.com/report.aspx?md5=1d578c11069c7446ca6d05ff7623a972"],"2020745":["http://sslbl.abuse.ch"],"2020746":["http://www.threatexpert.com/report.aspx?md5=6c8c988a8129ff31ad0e764e59b31200"],"2020747":["http://www.threatexpert.com/report.aspx?md5=586ad13656f4595723b481d77b6bfb09"],"2020748":["http://www.threatexpert.com/report.aspx?md5=586ad13656f4595723b481d77b6bfb09"],"2020749":["http://www.threatexpert.com/report.aspx?md5=586ad13656f4595723b481d77b6bfb09"],"2020750":["http://www.threatexpert.com/report.aspx?md5=586ad13656f4595723b481d77b6bfb09"],"2020751":["http://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-browser-exploit-using-BrowserExploitServer"],"2020752":["http://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-browser-exploit-using-BrowserExploitServer"],"2020753":["http://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-browser-exploit-using-BrowserExploitServer"],"2020754":["http://github.com/rapid7/metasploit-framework/wiki/How-to-write-a-browser-exploit-using-BrowserExploitServer"],"2020756":["http://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-8636"],"2020758":["http://www.threatexpert.com/report.aspx?md5=cb2903c89d60947fa4badec41e065d71"],"2020759":["http://now.avg.com/banking-trojan-vawtrak-harvesting-passwords-worldwide/"],"2020760":["http://now.avg.com/banking-trojan-vawtrak-harvesting-passwords-worldwide/"],"2020761":["http://now.avg.com/banking-trojan-vawtrak-harvesting-passwords-worldwide/"],"2020762":["http://now.avg.com/banking-trojan-vawtrak-harvesting-passwords-worldwide/"],"2020763":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=bcb626c7cca304f927ec97450008e600"],"2020764":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=00d4c1faeacaf45cfb02c592efe61a1d"],"2020765":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=2a6c1f4e14533d9f2af8d9e4fcf53338"],"2020766":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=0a2ae5eada44872675561a97ea56c0df"],"2020767":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=ec6b10b55732f68a174bb5b751bff840"],"2020768":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=142b8df89b9ae5019c1f1855d2212e9f"],"2020769":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=8026990bea6f95613f6111b9a5506941"],"2020770":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=262d04177c4bec3215db085fc4c44493"],"2020771":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=d9d1fd5025f47caaaa276d747657e01b"],"2020772":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=8b69118f7c25f79c4c7de5b0830dda39"],"2020773":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=1bb5562b08bae781086095c439fc9e8b"],"2020774":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=9c44da3c6326deb5b802b1494b202a1d"],"2020775":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=178f7f122f1de5c759a6538d78d67277"],"2020776":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=9a3309620c23d821ea4e2f41538454a7"],"2020777":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=1e3f91c46410d5205c7b6f6b53a45cff"],"2020778":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=010c49cb69591e1738b7bdd78a54d8f8"],"2020779":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=844ddc8d762f94e8cf04bbc6eb483121"],"2020780":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=6168f11bb42ff767a224396c2656ea87"],"2020781":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=132c66e47afb0c1b969140713b09d625"],"2020782":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=733d252921fa9b74b268c1e451d2e0c8"],"2020783":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=a2978e52da3503e33c65cd286a322bd2"],"2020784":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=4bd54550a23cb5bf40e0924dea7bad76"],"2020785":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=096fd620508d929b3422c6dca836e718"],"2020786":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=6bc0070240a714175e44dd2d6bf98481"],"2020787":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=4af85987c9aca11196eb1a603b40b18d"],"2020788":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=32652a6c74e5358549a7c536c3080d58"],"2020789":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=e3ac512a1978cec5eb8bc12fbb384e1f"],"2020790":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=3fb6b63928996a2fab06ba634710740b"],"2020791":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=1fa6460563cddcb165511c6b17ff4637"],"2020792":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=3d10b1c4471c7d29e968d9059f844aab"],"2020793":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=1dabf462f9c07878f6cd0b58cabf6538"],"2020794":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=29ac81a0607f6456bc886f6099fdb5c8"],"2020795":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=7403a3a7c924a50cb205c5936cb57821"],"2020796":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=599fc172ebcd9f41557ba1293522f424"],"2020797":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=0928c98b9702e3c8df4e44f31bea56ac"],"2020798":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=0c014b17729784f905f55e43347469ed"],"2020799":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=79dd610cc7a62ad237d21c050eae32ec"],"2020800":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=2499b8a890b084b9d4eb76d2bfaeff56"],"2020801":["http://www.windowstechupdates.com/omg-video-httpskypepopvideo-netvideonskype-user-name-virus/","http://securelist.com/blog/incidents/69065/skyfall-meets-skype/"],"2020802":["http://sslbl.abuse.ch"],"2020806":["http://www.threatexpert.com/report.aspx?md5=2f53b7669482c2d9216a74050630fbb7"],"2020807":["http://www.threatexpert.com/report.aspx?md5=11657162940dcc1c124e607b0f248039","http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020808":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020809":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020810":["http://www.threatexpert.com/report.aspx?md5=cefed502aaf38ee0089c527e7f537eda","http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020811":["http://www.threatexpert.com/report.aspx?md5=cefed502aaf38ee0089c527e7f537eda","http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020812":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020813":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020814":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020815":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020816":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020817":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020818":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020819":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020820":["http://checkpoint.com/downloads/volatile-cedar-technical-report.pdf"],"2020821":["http://www.threatexpert.com/report.aspx?md5=f2ad19a08063171b039accd24b0c27ca"],"2020825":["http://www.threatexpert.com/report.aspx?md5=148112df459ba40b9127f7d4f1c08df2"],"2020826":["http://www.threatexpert.com/report.aspx?md5=28208e19a528bfa95e5662e2d6f2e911","http://blogs.cisco.com/security/dridex-attacks-target-corporate-accounting"],"2020827":["http://www.threatexpert.com/report.aspx?md5=c74d4633e0593879d5e1321d9021e708"],"2020828":["http://www.threatexpert.com/report.aspx?md5=c74d4633e0593879d5e1321d9021e708"],"2020829":["http://www.threatexpert.com/report.aspx?md5=c74d4633e0593879d5e1321d9021e708"],"2020833":["http://www.threatexpert.com/report.aspx?md5=0ebaf8a6292237b33045f5e81947004b"],"2020834":["http://www.threatexpert.com/report.aspx?md5=0ebaf8a6292237b33045f5e81947004b"],"2020835":["http://www.threatexpert.com/report.aspx?md5=0ebaf8a6292237b33045f5e81947004b"],"2020836":["http://www.threatexpert.com/report.aspx?md5=0ebaf8a6292237b33045f5e81947004b"],"2020837":["http://fireeye.com/blog/threat-research/2015/04/a_new_word_document.html"],"2020838":["http://fireeye.com/blog/threat-research/2015/04/a_new_word_document.html"],"2020839":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020843":["http://sslbl.abuse.ch"],"2020844":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020845":["http://www.threatexpert.com/report.aspx?md5=3c10f65f8c1a84c53d94c331a63cad06"],"2020847":["http://ocelot.li/the-malware-campaign-that-went-unnoticed/"],"2020848":["http://ocelot.li/the-malware-campaign-that-went-unnoticed/"],"2020849":["http://www.threatexpert.com/report.aspx?md5=bd69714997e839618a7db82484819552"],"2020850":["http://www.threatexpert.com/report.aspx?md5=bd69714997e839618a7db82484819552"],"2020851":["http://www.threatexpert.com/report.aspx?md5=b4ce43e1c9e74c549e2bae8cd77d5af1"],"2020852":["http://www.threatexpert.com/report.aspx?md5=bd69714997e839618a7db82484819552"],"2020853":["http://videonationsltd.co.uk/2014/11/h-323-cisco-spam-calls/"],"2020854":["http://malware.dontneedcoffee.com/2015/05/an-exploit-kit-dedicated-to-csrf.html"],"2020855":["http://www.threatexpert.com/report.aspx?md5=3c53c9f7ab32a09de89bb44e5f91f9af"],"2020856":["http://www.exploit-db.com/exploits/34583"],"2020857":["http://www.exploit-db.com/exploits/3605"],"2020858":["http://www.s3cur1ty.de/node/640"],"2020859":["http://www.s3cur1ty.de/node/640"],"2020860":["http://www.threatexpert.com/report.aspx?md5=27cd0a3db18fbb6d316fb4542c3a51f3"],"2020861":["http://github.com/hkm/routerpwn.com/blob/master/index.html"],"2020862":["http://securityevaluators.com/knowledge/case_studies/routers/asus_rtn56u.php"],"2020863":["http://securityevaluators.com/knowledge/case_studies/routers/asus_rtn56u.php"],"2020864":["http://sslbl.abuse.ch"],"2020867":["http://www.exploit-db.com/exploits/33136"],"2020868":["http://www.exploit-db.com/exploits/33136"],"2020869":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2020871":["http://securityevaluators.com/knowledge/case_studies/routers/asus_rtn56u.php"],"2020872":["http://pastebin.com/u0MRLmjp"],"2020873":["http://www.gnucitizen.org/blog/router-hacking-challenge"],"2020874":["http://www.rapid7.com/db/modules/exploit/linux/http/netgear_dgn1000b_setup_exec"],"2020875":["http://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-4"],"2020876":["http://malwr.com/analysis/MGY1ZDFhYjE1MzQ4NDAwM2EyZTI5YmY3MWZjMWE5OGM"],"2020877":["http://wepawet.cs.ucsb.edu/view.php?hash=5e14985415814ed1e107c0583a27a1a2&t=1384961238&type=js"],"2020878":["http://www.exploit-db.com/exploits/34584"],"2020879":["http://sebug.net/paper/Exploits-Archives/2008-exploits/0803-exploits/linksys-bypass.txt"],"2020880":["http://www.xexexe.cz/2015/02/bruteforcing-tp-link-routers-with.html"],"2020881":["http://isc.sans.edu/forums/diary/Suspect+Sendori+software/16466","http://www.threatexpert.com/report.aspx?md5=aee8ddf3b36d60d33c571ee798b6bad6"],"2020882":["http://www.threatexpert.com/report.aspx?md5=a6061196c9df9364d48c01bea83d6cb7","http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~EccKrypt-D/detailed-analysis.aspx"],"2020883":["http://fireeye.com/blog/threat-research/2015/04/analysis_of_kriptovo.html","http://www.threatexpert.com/report.aspx?md5=7e47a518561c46123d4facd43effafbf"],"2020884":["http://fireeye.com/blog/threat-research/2015/04/analysis_of_kriptovo.html","http://www.threatexpert.com/report.aspx?md5=c3ab87f85ca07a7d026d3cbd54029bbe"],"2020885":["http://fireeye.com/blog/threat-research/2015/04/analysis_of_kriptovo.html","http://www.threatexpert.com/report.aspx?md5=c3ab87f85ca07a7d026d3cbd54029bbe"],"2020886":["http://fireeye.com/blog/threat-research/2015/04/analysis_of_kriptovo.html","http://www.threatexpert.com/report.aspx?md5=00e3b69b18bfad7980c1621256ee10fa"],"2020887":["http://volexity.com/blog/?p=118"],"2020889":["http://trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/151/operation-source-botnet-takedown-trend-micro-solutions"],"2020890":["http://welivesecurity.com/2015/04/09/operation-buhtrap/","http://www.threatexpert.com/report.aspx?md5=24fac66b3a6d55a83e1309bc530b032e"],"2020891":["http://welivesecurity.com/2015/04/09/operation-buhtrap/","http://www.threatexpert.com/report.aspx?md5=24fac66b3a6d55a83e1309bc530b032e"],"2020892":["http://www.threatexpert.com/report.aspx?md5=07523de32e43f67b1bbd5edc87803d5c"],"2020896":["http://malware.dontneedcoffee.com/2015/05/an-exploit-kit-dedicated-to-csrf.html"],"2020897":["http://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf"],"2020898":["http://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf"],"2020899":["http://devttys0.com/2015/04/hacking-the-d-link-dir-890l/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6563"],"2020900":["http://securelist.com/analysis/69560/the-banking-trojan-emotet-detailed-analysis/"],"2020901":["http://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf"],"2020902":["http://www.threatexpert.com/report.aspx?md5=db2c617a6e53a24fa887e6ecf60a076d"],"2020906":["http://www.threatexpert.com/report.aspx?md5=af0e5a5df0be279aa517e2fd65cadd5c","http://kernelmode.info/forum/viewtopic.php?f=16&t=3581"],"2020907":["http://www.threatexpert.com/report.aspx?md5=c7e34daa9e9160ce433a6cae74867711","http://kernelmode.info/forum/viewtopic.php?f=16&t=3581"],"2020908":["http://www.threatexpert.com/report.aspx?md5=c7e34daa9e9160ce433a6cae74867711","http://kernelmode.info/forum/viewtopic.php?f=16&t=3581"],"2020909":["http://www.threatexpert.com/report.aspx?md5=c7e34daa9e9160ce433a6cae74867711","http://kernelmode.info/forum/viewtopic.php?f=16&t=3581"],"2020910":["http://www.threatexpert.com/report.aspx?md5=227365242cc97fa611fdac295b732d82","http://www.threatexpert.com/report.aspx?md5=b9eec5be1d2f5d0007bd94fdd8c7ea57","http://kernelmode.info/forum/viewtopic.php?f=16&t=3801"],"2020912":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-1635"],"2020913":["http://www.threatexpert.com/report.aspx?md5=93be88ad3816c19d74155f8cd3aae1d2"],"2020914":["http://www.threatexpert.com/report.aspx?md5=93be88ad3816c19d74155f8cd3aae1d2"],"2020915":["http://www.threatexpert.com/report.aspx?md5=1c6269fe48cba5f830a64a50bdf4ffe5","http://www.bleepingcomputer.com/forums/t/547708/torrentlocker-ransomware-cracked-and-decrypter-has-been-made/page-13"],"2020916":["http://blog.cylance.com/redirect-to-smb"],"2020917":["http://blog.cylance.com/redirect-to-smb"],"2020918":["http://www.threatexpert.com/report.aspx?md5=b0416d389b0b59776fe4c4ddeb407239","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/wp-fighterpos.pdf"],"2020919":["http://www.threatexpert.com/report.aspx?md5=b0416d389b0b59776fe4c4ddeb407239","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/wp-fighterpos.pdf"],"2020920":["http://www.threatexpert.com/report.aspx?md5=b0416d389b0b59776fe4c4ddeb407239","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/wp-fighterpos.pdf"],"2020921":["http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/"],"2020922":["http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/"],"2020923":["http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/"],"2020924":["http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/"],"2020925":["http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/"],"2020926":["http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/"],"2020927":["http://www.threatexpert.com/report.aspx?md5=7bc5451341a684aca80a59a463bad973","http://www.threatexpert.com/report.aspx?md5=5443cf2b6c010c57cf740356c9167b77","http://blogs.technet.com/b/mmpc/archive/2015/04/13/bioazih-rat-how-clean-file-metadata-can-help-keep-you-safe.aspx"],"2020928":["http://www.threatexpert.com/report.aspx?md5=e397a68bf4fbb7a9b4d1b6da1fe2172b","http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/"],"2020932":["http://sslbl.abuse.ch"],"2020934":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=43c277dd56f9c6de4b8dc249e12039df"],"2020935":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=43c277dd56f9c6de4b8dc249e12039df"],"2020936":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=43c277dd56f9c6de4b8dc249e12039df"],"2020937":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=43c277dd56f9c6de4b8dc249e12039df"],"2020938":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=43c277dd56f9c6de4b8dc249e12039df"],"2020939":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=b1fe4120e3b38784f9fe57f6bb154517"],"2020940":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=b1fe4120e3b38784f9fe57f6bb154517"],"2020941":["http://www.threatexpert.com/report.aspx?md5=2cea5182d71b768e8b669cacdea39825"],"2020944":["http://www.threatexpert.com/report.aspx?md5=97369af278cc004ce390f68ae94013b6"],"2020945":["http://www.threatexpert.com/report.aspx?md5=0032395c3a980e09c511b6b41ab3da48"],"2020946":["http://www.threatexpert.com/report.aspx?md5=97369af278cc004ce390f68ae94013b6"],"2020947":["http://www.threatexpert.com/report.aspx?md5=981672cd969fe8cb1f887d0526b1ecf2"],"2020948":["http://www.threatexpert.com/report.aspx?md5=6b173406ffccaa6d0287b795f8de2073"],"2020949":["http://blog.fortinet.com/post/hiding-malicious-traffic-under-the-http-404-error"],"2020960":["http://www.threatexpert.com/report.aspx?md5=5d9d5b9089ad464e51ff391b14da1953"],"2020961":["http://sslbl.abuse.ch"],"2020962":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=98a6484533fa12a9ba6b1bd9df1899dc"],"2020963":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=98a6484533fa12a9ba6b1bd9df1899dc"],"2020964":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=98a6484533fa12a9ba6b1bd9df1899dc"],"2020965":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=98a6484533fa12a9ba6b1bd9df1899dc"],"2020966":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=d5a82520ebf38a0c595367ff0ca89fae"],"2020967":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=859f167704b5c138ed9a9d4d3fdc0723"],"2020968":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=181a88c911b10d0fcb4682ae552c0de3"],"2020969":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=0e0182694c381f8b68afc5f3ff4c4653"],"2020970":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=4121414c63079b7fa836be00f8d0a93b"],"2020971":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=1dde02ff744fa4e261168e2008fd613a"],"2020972":["http://securelist.com/blog/69731/the-cozyduke-apt/","http://www.threatexpert.com/report.aspx?md5=9ad55b83f2eec0c19873a770b0c86a2f"],"2020973":["http://www.threatexpert.com/report.aspx?md5=fa2c0e8b486c879f4baee1d5bebdf0a2"],"2020974":["http://www.threatexpert.com/report.aspx?md5=f58a4369b8176edbde4396dc977c9008","http://www.symantec.com/security_response/writeup.jsp?docid=2015-030500-0430-99","http://securelist.com/blog/69731/the-cozyduke-apt/"],"2020976":["http://blog.cylance.com/redirect-to-smb","http://blog.trendmicro.com/trendlabs-security-intelligence/resurrection-of-the-living-dead-the-redirect-to-smb-vulnerability/"],"2020977":["http://blog.cylance.com/redirect-to-smb"],"2020978":["http://www.threatexpert.com/report.aspx?md5=f80af2735fdad5fe14defc4f1df1cc30"],"2021005":["http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability"],"2021012":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=db1c4342f617798bcb2ba5655d32bf67"],"2021013":["http://sslbl.abuse.ch"],"2021014":["http://www.threatexpert.com/report.aspx?md5=8b2b618a463b906a1005ff1ed7d5f875"],"2021015":["http://www.threatexpert.com/report.aspx?md5=331bec58cb113999f83c866de4976b62"],"2021016":["http://sslbl.abuse.ch"],"2021018":["http://seclists.org/fulldisclosure/2015/Apr/72"],"2021019":["http://blogs.mcafee.com/mcafee-labs/taking-a-close-look-at-data-stealing-nionspy-file-infector"],"2021025":["http://thousandeyes.com"],"2021026":["http://thousandeyes.com"],"2021027":["http://www.threatexpert.com/report.aspx?md5=bb9f26d52327979fb9b4d467408eba25"],"2021028":["http://pwc.blogs.com/cyber_security_updates/2015/04/attacks-against-israeli-palestinian-interests.html"],"2021029":["http://pwc.blogs.com/cyber_security_updates/2015/04/attacks-against-israeli-palestinian-interests.html"],"2021030":["http://www.threatexpert.com/report.aspx?md5=dad57ec2d5d99b725acc726b0a644c00","http://seclists.org/fulldisclosure/2015/Jan/131"],"2021031":["http://www.threatexpert.com/report.aspx?md5=f752cfdc6aa1d3eac013201357ada0f6"],"2021032":["http://www.threatexpert.com/report.aspx?md5=f752cfdc6aa1d3eac013201357ada0f6"],"2021041":["http://www.hybrid-analysis.com/sample/650d5a7d247fbe9c7f4d92e901319fec8c83fd07d4f5291f23c30f338a2e2974?environmentId=2#extracted-strings","http://www.threatexpert.com/report.aspx?md5=4a20784de661675d281edbd48a6e2485"],"2021049":["http://www.threatexpert.com/report.aspx?md5=f7556d9ede5d988400b1edbb1a172634"],"2021050":["http://www.threatexpert.com/report.aspx?md5=019765009f7142a89af15aaaac7400cc","http://blog.malwaremustdie.org/2014/06/mmd-0025-2014-itw-infection-of-elf.html"],"2021051":["http://www.welivesecurity.com/wp-content/uploads/2015/04/mumblehard.pdf","http://www.threatexpert.com/report.aspx?md5=86f0b0b74fe8b95b163a1b31d76f7917"],"2021052":["http://www.welivesecurity.com/wp-content/uploads/2015/04/mumblehard.pdf","http://www.threatexpert.com/report.aspx?md5=86f0b0b74fe8b95b163a1b31d76f7917"],"2021053":["http://www.welivesecurity.com/wp-content/uploads/2015/04/mumblehard.pdf","http://www.threatexpert.com/report.aspx?md5=86f0b0b74fe8b95b163a1b31d76f7917"],"2021055":["http://symantec.com/connect/blogs/european-automobile-businesses-fall-prey-carbon-grabber","http://www.threatexpert.com/report.aspx?md5=72bab43e406c9e325e49e27b22853b60","http://blogs.cisco.com/security/talos/rombertik","http://www.threatexpert.com/report.aspx?md5=f504ef6e9a269e354de802872dc5e209"],"2021056":["http://www.seculert.com/blog/2015/04/new-dyre-version-evades-sandboxes.html","http://www.threatexpert.com/report.aspx?md5=999bc5e16312db6abff5f6c9e54c546f"],"2021060":["http://blog.didierstevens.com/2015/03/16/quickpost-metasploit-user-agent-strings"],"2021062":["http://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom-based-xss.html"],"2021063":["http://sslbl.abuse.ch"],"2021065":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=8776e617b59da52bcac43b380a354aa0"],"2021066":["http://videonationsltd.co.uk/2015/04/h-323-cisco-spam-calls/"],"2021077":["http://www.malware-traffic-analysis.net/2015/05/06/index.html","http://www.hybrid-analysis.com/sample/99fc04d82877aea0247286d41186b985ab773b19c8cef8786ffc1fa50e35af29?environmentId=1","http://www.threatexpert.com/report.aspx?md5=a08784f5691a0a8ce6249e1981dea82c"],"2021078":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993"],"2021079":["http://www.threatexpert.com/report.aspx?md5=f1b341d3383b808ecfacfa22dcbe9196"],"2021080":["http://www.threatexpert.com/report.aspx?md5=f1b341d3383b808ecfacfa22dcbe9196"],"2021081":["http://research.zscaler.com/2015/05/compromised-wordpress-sites-leaking.html"],"2021082":["http://research.zscaler.com/2015/05/compromised-wordpress-sites-leaking.html"],"2021083":["http://research.zscaler.com/2015/05/compromised-wordpress-sites-leaking.html"],"2021084":["http://www.threatexpert.com/report.aspx?md5=c3e567e9f45d0b4c1396f3d646598204"],"2021086":["http://sslbl.abuse.ch"],"2021087":["http://sslbl.abuse.ch"],"2021088":["http://www.threatexpert.com/report.aspx?md5=1de834aca8905124e1abcd4f71dea062"],"2021089":["http://github.com/diafygi/webrtc-ips"],"2021091":["http://www.threatexpert.com/report.aspx?md5=d8bd77eebee2e74ea74679bf3f1f7210"],"2021094":["http://www.threatexpert.com/report.aspx?md5=8fc00c6696268ae42411a5ebf9d2576f"],"2021095":["http://www.threatexpert.com/report.aspx?md5=b5c88d5af37afd13f89957150f9311ca"],"2021096":["http://sslbl.abuse.ch"],"2021097":["http://www.threatexpert.com/report.aspx?md5=1225b8c9b52d4828b9031267939e8260"],"2021099":["http://www.threatexpert.com/report.aspx?md5=942fd71fb26b874502f3ba8546e6c164"],"2021100":["http://www.threatexpert.com/report.aspx?md5=9bfae378e38f0eb2dfff87fffa0dfe37"],"2021102":["http://www.threatexpert.com/report.aspx?md5=3cecc935eb92ed03dc9908fc96b0f795"],"2021103":["http://www.threatexpert.com/report.aspx?md5=0442e9d036a40c8cbd41f8f4c9afab1b"],"2021104":["http://www.threatexpert.com/report.aspx?md5=0442e9d036a40c8cbd41f8f4c9afab1b"],"2021105":["http://www.threatexpert.com/report.aspx?md5=0442e9d036a40c8cbd41f8f4c9afab1b"],"2021107":["http://www.threatexpert.com/report.aspx?md5=38cad3170f85c4f9903574941bd282a8"],"2021108":["http://www.threatexpert.com/report.aspx?md5=b7e7186d962d562af6a5d10a25d19b02","http://securelist.com/analysis/publications/69567/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/"],"2021109":["http://sslbl.abuse.ch"],"2021111":["http://www.threatexpert.com/report.aspx?md5=f078e099b1f8afc7c43eb05b4badf9e7"],"2021112":["http://sslbl.abuse.ch"],"2021113":["http://sslbl.abuse.ch"],"2021114":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-tropic-trooper.pdf"],"2021115":["http://www.hybrid-analysis.com/sample/3aed0cac4a7f3053e324276c72bbf3aead783da2eb8b53bf99134a0adbcd3267?environmentId=2","http://www.threatexpert.com/report.aspx?md5=2df314974722ef6b5a66d81292679cb4"],"2021116":["http://github.com/fireeye/iocs/tree/master/APT17"],"2021118":["http://blog.cylance.com/spear-a-threat-actor-resurfaces","http://www.threatexpert.com/report.aspx?md5=e09c8cd6ad3b99f46e083916c5371b6e2acc050d"],"2021119":["http://blog.cylance.com/spear-a-threat-actor-resurfaces","http://www.threatexpert.com/report.aspx?md5=e09c8cd6ad3b99f46e083916c5371b6e2acc050d"],"2021121":["http://sslbl.abuse.ch"],"2021122":["http://www.virustotal.com/en/file/a00eaca44c480843b1a8a11ac8870a931477be08d98f0476d1f8f60433e3f40a/analysis"],"2021123":["http://www.virustotal.com/en/file/a00eaca44c480843b1a8a11ac8870a931477be08d98f0476d1f8f60433e3f40a/analysis"],"2021128":["http://www.threatexpert.com/report.aspx?md5=7d9411f7204782fdbcd0fd0f20956bbc","http://research.zscaler.com/2015/05/rig-exploit-kit-infection-cycle-analysis.html"],"2021129":["http://www.threatexpert.com/report.aspx?md5=7d9411f7204782fdbcd0fd0f20956bbc","http://research.zscaler.com/2015/05/rig-exploit-kit-infection-cycle-analysis.html"],"2021130":["http://www.threatexpert.com/report.aspx?md5=7d9411f7204782fdbcd0fd0f20956bbc","http://research.zscaler.com/2015/05/rig-exploit-kit-infection-cycle-analysis.html"],"2021131":["http://www.threatexpert.com/report.aspx?md5=7d9411f7204782fdbcd0fd0f20956bbc","http://research.zscaler.com/2015/05/rig-exploit-kit-infection-cycle-analysis.html"],"2021132":["http://www.threatexpert.com/report.aspx?md5=154e76a480b22cf24ddac4d2d59c22fe"],"2021133":["http://www.threatexpert.com/report.aspx?md5=154e76a480b22cf24ddac4d2d59c22fe"],"2021134":["http://www.threatexpert.com/report.aspx?md5=2a63b3a621d8e555734582d83b5e06a5"],"2021135":["http://www.joewein.net/spam/spam-joejob.htm"],"2021138":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-3337"],"2021139":["http://kernelmode.info/forum/viewtopic.php?f=16&t=3851"],"2021140":["http://kernelmode.info/forum/viewtopic.php?f=16&t=3851"],"2021142":["http://www.virustotal.com/en/file/65335e9df2d4cb5267bdab0dd9e3d1bcdff957fa4d40e3219fc9267af94a318e/analysis","http://www.threatexpert.com/report.aspx?md5=9766c5eca8d229f1af9dfb9bd97f02a0"],"2021143":["http://www.threatexpert.com/report.aspx?md5=3d652375fd511878f410fb1048e47f83","http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanDownloader%3AMSIL/Autorun.AD","http://www.threatexpert.com/report.aspx?md5=3d652375fd511878f410fb1048e47f83"],"2021144":["http://www.fireeye.com/blog/threat-research/2015/05/nitlovepos_another.html"],"2021145":["http://www.threatexpert.com/report.aspx?md5=440e5c0aee33cba3c4707ada0856ff6d"],"2021147":["http://welivesecurity.com/wp-content/uploads/2015/05/Dissecting-LinuxMoose.pdf"],"2021148":["http://welivesecurity.com/wp-content/uploads/2015/05/Dissecting-LinuxMoose.pdf"],"2021149":["http://welivesecurity.com/wp-content/uploads/2015/05/Dissecting-LinuxMoose.pdf"],"2021150":["http://welivesecurity.com/wp-content/uploads/2015/05/Dissecting-LinuxMoose.pdf"],"2021151":["http://welivesecurity.com/wp-content/uploads/2015/05/Dissecting-LinuxMoose.pdf"],"2021152":["http://welivesecurity.com/wp-content/uploads/2015/05/Dissecting-LinuxMoose.pdf"],"2021153":["http://isc.sans.edu/diary/Possible+Wordpress+Botnet+C&C:+errorcontent.com/19733"],"2021154":["http://sslbl.abuse.ch"],"2021155":["http://www.threatexpert.com/report.aspx?md5=6cdd93dcb1c54a4e2b036d2e13b51216","http://sslbl.abuse.ch"],"2021160":["http://microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Trojan:Win32/Gatak.DR#tab=2"],"2021163":["http://blogs.mcafee.com/mcafee-labs/meet-tox-ransomware-for-the-rest-of-us","http://www.threatexpert.com/report.aspx?md5=91da679f417040558059ccd5b1063688"],"2021164":["http://blogs.mcafee.com/mcafee-labs/meet-tox-ransomware-for-the-rest-of-us","http://www.threatexpert.com/report.aspx?md5=91da679f417040558059ccd5b1063688"],"2021165":["http://blogs.mcafee.com/mcafee-labs/meet-tox-ransomware-for-the-rest-of-us","http://www.threatexpert.com/report.aspx?md5=91da679f417040558059ccd5b1063688"],"2021166":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=aa87ab0c51887b86b48c009931dcc410"],"2021167":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=aa87ab0c51887b86b48c009931dcc410"],"2021168":["http://trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/","http://www.threatexpert.com/report.aspx?md5=aa87ab0c51887b86b48c009931dcc410"],"2021173":["http://www.threatexpert.com/report.aspx?md5=525917c79e22fa9bc54da36b94437a46"],"2021174":["http://securityblog.s21sec.com/2015/05/new-ransomware-in-mobile-environment.html"],"2021175":["http://sslbl.abuse.ch"],"2021176":["http://www.threatexpert.com/report.aspx?md5=ac7b1fdc679fdbd3cb0cd8a3e30ecddb"],"2021178":["http://blog.didierstevens.com/2015/05/11/detecting-network-traffic-from-metasploits-meterpreter-reverse-http-module"],"2021179":["http://cyberx-labs.com/wp-content/uploads/2015/05/BlackEnergy-CyberX-Report_27_May_2015_FINAL.pdf"],"2021180":["http://cyberx-labs.com/wp-content/uploads/2015/05/BlackEnergy-CyberX-Report_27_May_2015_FINAL.pdf"],"2021184":["http://www.threatexpert.com/report.aspx?md5=ddf0981aebeea6ba9abdae6ddf8ed4e2"],"2021185":["http://www.threatexpert.com/report.aspx?md5=0aa69ad64e20bb6cbf72f346ce43ff23","http://www.fireeye.com/blog/threat-research/2014/07/the-service-you-cant-refuse-a-secluded-hijackrat.html"],"2021186":["http://sslbl.abuse.ch"],"2021187":["http://www.symantec.com/security_response/writeup.jsp?docid=2015-060111-2757-99&tabid=2"],"2021188":["http://www.threatexpert.com/report.aspx?md5=fa6f24a18ef772d9cdaa1d6cd1e24d1b","http://researchcenter.paloaltonetworks.com/2015/06/keybase-keylogger-malware-family-exposed/"],"2021189":["http://www.threatexpert.com/report.aspx?md5=dc7b0c078482b68c1ff89da3ac88949b"],"2021190":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2021191":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2021192":["http://sslbl.abuse.ch"],"2021193":["http://sslbl.abuse.ch"],"2021194":["http://www.threatexpert.com/report.aspx?md5=06588acf0112a84fe5f684bbafd7dc00"],"2021196":["http://www.threatexpert.com/report.aspx?md5=c8131a48e834291be6c7402647250e73","http://sslbl.abuse.ch"],"2021197":["http://sslbl.abuse.ch"],"2021198":["http://sslbl.abuse.ch"],"2021199":["http://sslbl.abuse.ch"],"2021200":["http://www.threatexpert.com/report.aspx?md5=3cd598e8e2fd033134d8784251eff59e"],"2021201":["http://www.threatexpert.com/report.aspx?md5=3cd598e8e2fd033134d8784251eff59e"],"2021204":["http://blogs.mcafee.com/mcafee-labs/meet-tox-ransomware-for-the-rest-of-us"],"2021205":["http://www.threatexpert.com/report.aspx?md5=6c7abe2297ee64362e33584f9f654ebd"],"2021208":["http://sslbl.abuse.ch"],"2021209":["http://sslbl.abuse.ch"],"2021210":["http://sslbl.abuse.ch"],"2021211":["http://sslbl.abuse.ch"],"2021212":["http://sslbl.abuse.ch"],"2021213":["http://www.threatexpert.com/report.aspx?md5=25631f5ccec8f155a8760b8568ca22c5"],"2021214":["http://www.threatexpert.com/report.aspx?md5=25631f5ccec8f155a8760b8568ca22c5"],"2021215":["http://www.threatexpert.com/report.aspx?md5=25631f5ccec8f155a8760b8568ca22c5"],"2021220":["http://sslbl.abuse.ch"],"2021221":["http://sslbl.abuse.ch"],"2021222":["http://sslbl.abuse.ch"],"2021223":["http://sslbl.abuse.ch"],"2021224":["http://sslbl.abuse.ch"],"2021226":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/evolution-of-poweliks.pdf","http://www.threatexpert.com/report.aspx?md5=e13234077f513208238203108df30ff4"],"2021227":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/evolution-of-poweliks.pdf","http://www.threatexpert.com/report.aspx?md5=e13234077f513208238203108df30ff4"],"2021228":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/evolution-of-poweliks.pdf","http://www.threatexpert.com/report.aspx?md5=e13234077f513208238203108df30ff4"],"2021229":["http://www.alienvault.com/open-threat-exchange/blog/scanbox-a-reconnaissance-framework-used-on-watering-hole-attacks"],"2021230":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021231":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021232":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021233":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021234":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021235":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021236":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021237":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021238":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021239":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021240":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021241":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021242":["http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/"],"2021246":["http://www.threatexpert.com/report.aspx?md5=adb3242f8efad48ca174a7e46991f507"],"2021247":["http://www.symantec.com/connect/blogs/duqu-20-reemergence-aggressive-cyberespionage-threat"],"2021251":["http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/evolution-of-poweliks.pdf","http://www.threatexpert.com/report.aspx?md5=e13234077f513208238203108df30ff4"],"2021252":["http://www.hybrid-analysis.com/sample/3ebc6999da89eaf44d94195b588cb869d894ca754a248b074893d11f6dd19188?environmentId=4","http://www.threatexpert.com/report.aspx?md5=2c339dbb40b3b19ee275e4c7c1c17a18"],"2021254":["http://www.hybrid-analysis.com/sample/3ebc6999da89eaf44d94195b588cb869d894ca754a248b074893d11f6dd19188?environmentId=4","http://www.threatexpert.com/report.aspx?md5=2c339dbb40b3b19ee275e4c7c1c17a18"],"2021257":["http://www.threatexpert.com/report.aspx?md5=1de834aca8905124e1abcd4f71dea062"],"2021259":["http://www.threatexpert.com/report.aspx?md5=1de834aca8905124e1abcd4f71dea062"],"2021260":["http://www.threatexpert.com/report.aspx?md5=77c99b6f06fe443b72a0efaf8f285e4d"],"2021261":["http://blog.malwarebytes.org/intelligence/2015/06/unusual-exploit-kit-targets-chinese-users-part-2","http://www.threatexpert.com/report.aspx?md5=5a454c795eccf94bf6213fcc4ee65e6d"],"2021262":["http://blog.malwarebytes.org/intelligence/2015/06/unusual-exploit-kit-targets-chinese-users-part-2","http://www.threatexpert.com/report.aspx?md5=5a454c795eccf94bf6213fcc4ee65e6d"],"2021268":["http://www.threatexpert.com/report.aspx?md5=636a911cc059415963da7009277bae17","http://www.secureworks.com/cyber-threat-intelligence/threats/stegoloader-a-stealthy-information-stealer/"],"2021273":["http://www.threatexpert.com/report.aspx?md5=1b4e97af9f327126146338b8cd21dd86"],"2021274":["http://www.threatexpert.com/report.aspx?md5=23ace716ec34bfd9c98efd79b23a01af","http://github.com/pan-unit42/iocs/tree/master/lotusblossom"],"2021275":["http://www.threatexpert.com/report.aspx?md5=23ace716ec34bfd9c98efd79b23a01af","http://github.com/pan-unit42/iocs/tree/master/lotusblossom"],"2021276":["http://www.threatexpert.com/report.aspx?md5=cfa7954722d4277d26e96edc3289a4ce","http://github.com/pan-unit42/iocs/tree/master/lotusblossom"],"2021277":["http://www.threatexpert.com/report.aspx?md5=cf3f36dd3235d2cff5754b19b9e1cb1f","http://github.com/pan-unit42/iocs/tree/master/lotusblossom"],"2021278":["http://www.threatexpert.com/report.aspx?md5=cf3f36dd3235d2cff5754b19b9e1cb1f","http://github.com/pan-unit42/iocs/tree/master/lotusblossom"],"2021279":["http://www.threatexpert.com/report.aspx?md5=8334f346585aa27ac6ae86e5adcaefa2","http://github.com/pan-unit42/iocs/tree/master/lotusblossom"],"2021282":["http://www.threatexpert.com/report.aspx?md5=a54f78d0fe6d1a1a09c22a71646c24b3"],"2021283":["http://www.threatexpert.com/report.aspx?md5=62a4d32dcb1c495c5583488638452ff9"],"2021284":["http://www.threatexpert.com/report.aspx?md5=0ed66982890ec483c3bc6f883e2424fb"],"2021289":["http://www.threatexpert.com/report.aspx?md5=a586db30ab21a02eee9e8ab2ebe8a2b5","http://blog.team-cymru.org/2015/06/poseidon-and-the-backoff-pos-link/"],"2021299":["http://www.threatexpert.com/report.aspx?md5=c45810710617f0149678cc1c6cbec7a6"],"2021300":["http://www.threatexpert.com/report.aspx?md5=c45810710617f0149678cc1c6cbec7a6"],"2021301":["http://www.threatexpert.com/report.aspx?md5=c45810710617f0149678cc1c6cbec7a6"],"2021302":["http://www.threatexpert.com/report.aspx?md5=0d7c227d4616254f9ae4976270f2f398","http://www.threatexpert.com/report.aspx?md5=0d7c227d4616254f9ae4976270f2f398"],"2021303":["http://www.threatexpert.com/report.aspx?md5=0d7c227d4616254f9ae4976270f2f398","http://www.threatexpert.com/report.aspx?md5=0d7c227d4616254f9ae4976270f2f398"],"2021304":["http://www.threatexpert.com/report.aspx?md5=545ee3114faa5abd994f9730713f2261"],"2021314":["http://www.threatexpert.com/report.aspx?md5=40368db3a68f2db17853750e68cfc662","http://sslbl.abuse.ch"],"2021315":["http://sslbl.abuse.ch"],"2021316":["http://blog.malwaremustdie.org/2015/06/the-elf-chinaz-reloaded.html"],"2021321":["http://www.threatexpert.com/report.aspx?md5=e946b3dba7cd9a44fbbcbc3c7c76e440"],"2021325":["http://www.dropboxforum.com/hc/communities/public/questions/203834265-virus"],"2021326":["http://www.threatexpert.com/report.aspx?md5=3c49b5160b981f06bd5242662f8d0a54"],"2021327":["http://www.threatexpert.com/report.aspx?md5=3c49b5160b981f06bd5242662f8d0a54"],"2021328":["http://www.threatexpert.com/report.aspx?md5=3c49b5160b981f06bd5242662f8d0a54"],"2021329":["http://www.threatexpert.com/report.aspx?md5=3c49b5160b981f06bd5242662f8d0a54"],"2021330":["http://www.threatexpert.com/report.aspx?md5=3c49b5160b981f06bd5242662f8d0a54"],"2021331":["http://www.threatexpert.com/report.aspx?md5=3c49b5160b981f06bd5242662f8d0a54"],"2021332":["http://www.threatexpert.com/report.aspx?md5=3c49b5160b981f06bd5242662f8d0a54"],"2021333":["http://www.threatexpert.com/report.aspx?md5=3c49b5160b981f06bd5242662f8d0a54"],"2021334":["http://blog.avast.com/2015/01/06/linux-ddos-trojan-hiding-itself-with-an-embedded-rootkit/#more-33072"],"2021335":["http://blog.avast.com/2015/01/06/linux-ddos-trojan-hiding-itself-with-an-embedded-rootkit/#more-33072"],"2021336":["http://www.threatexpert.com/report.aspx?md5=d818d056bbf7e227151d40c8bd539976","http://blog.checkpoint.com/wp-content/uploads/2015/10/sb-report-threat-intelligence-groundhog.pdf"],"2021339":["http://sslbl.abuse.ch"],"2021340":["http://sslbl.abuse.ch"],"2021341":["http://sslbl.abuse.ch"],"2021342":["http://sslbl.abuse.ch"],"2021343":["http://sslbl.abuse.ch"],"2021344":["http://sslbl.abuse.ch"],"2021345":["http://sslbl.abuse.ch"],"2021346":["http://sslbl.abuse.ch"],"2021347":["http://sslbl.abuse.ch"],"2021348":["http://sslbl.abuse.ch"],"2021349":["http://sslbl.abuse.ch"],"2021350":["http://sslbl.abuse.ch"],"2021351":["http://blog.malwaremustdie.org/2015/06/mmd-0034-2015-new-elf.html"],"2021352":["http://blog.malwaremustdie.org/2015/06/mmd-0034-2015-new-elf.html"],"2021353":["http://sslbl.abuse.ch"],"2021354":["http://sslbl.abuse.ch"],"2021355":["http://sslbl.abuse.ch"],"2021363":["http://www.threatexpert.com/report.aspx?md5=1dd542bf3c1781df9a335f74eacc82a4","http://malwr.com/analysis/YjllZWEzNmQ0MDA4NGNhNGIxYzIzNjU3YjczOTYxZjg/"],"2021370":["http://www.threatexpert.com/report.aspx?md5=0a977dfcb93301f1841dbe2272d3102b"],"2021372":["http://www.threatexpert.com/report.aspx?md5=865164ef97c50bdd8e8740621234a3cf"],"2021375":["http://www.threatexpert.com/report.aspx?md5=22b0d4ff64d3cb3080feb47ce52988e9"],"2021376":["http://pwc.blogs.com/cyber_security_updates/2015/06/unfin4ished-business.html"],"2021377":["http://pwc.blogs.com/cyber_security_updates/2015/06/unfin4ished-business.html"],"2021379":["http://blog.dragonthreatlabs.com/2015/07/dtl-06282015-01-apt-on-taiwan-insight.html"],"2021381":["http://www.threatexpert.com/report.aspx?md5=1e1f44f8a403c4ebc6943eb2dcf731ff","http://securityintelligence.com/new-zberp-trojan-discovered-zeus-zbot-carberp/#.U5Xgpyh4l8u","http://blog.malwarebytes.org/security-threat/2014/02/hiding-in-plain-sight-a-story-about-a-sneaky-banking-trojan/"],"2021382":["http://www.threatexpert.com/report.aspx?md5=1e1f44f8a403c4ebc6943eb2dcf731ff","http://securityintelligence.com/new-zberp-trojan-discovered-zeus-zbot-carberp/#.U5Xgpyh4l8u","http://blog.malwarebytes.org/security-threat/2014/02/hiding-in-plain-sight-a-story-about-a-sneaky-banking-trojan/"],"2021383":["http://www.threatexpert.com/report.aspx?md5=7ba76b0ec1249b19a46e1603e5ab0a90","http://blog.malwarebytes.org/security-threat/2014/02/hiding-in-plain-sight-a-story-about-a-sneaky-banking-trojan/"],"2021385":["http://www.threatexpert.com/report.aspx?md5=0075c4d976984436443b30926ad818dd"],"2021386":["http://www.threatexpert.com/report.aspx?md5=6f39ac1c8c34ab9ba51bf26eba4cc6fb","http://research.zscaler.com/2015/07/fake-batterybotpro-clickfraud-adfruad.html"],"2021387":["http://www.threatexpert.com/report.aspx?md5=6f39ac1c8c34ab9ba51bf26eba4cc6fb","http://research.zscaler.com/2015/07/fake-batterybotpro-clickfraud-adfruad.html"],"2021389":["http://www.threatexpert.com/report.aspx?md5=aaa4304dd5f22a017930a9eeebc8898f"],"2021390":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1315"],"2021391":["http://sslbl.abuse.ch"],"2021392":["http://researchcenter.paloaltonetworks.com/2015/07/new-android-malware-family-evades-antivirus-detection-by-using-popular-ad-libraries/","http://www.threatexpert.com/report.aspx?md5=b0b2cd71b4d15bb5f07b8315d7b27822"],"2021393":["http://sslbl.abuse.ch"],"2021395":["http://www.threatexpert.com/report.aspx?md5=cfbcb83f8515bd169afd0b22488b4430","http://www.volexity.com/blog/?p=158"],"2021396":["http://www.threatexpert.com/report.aspx?md5=cfbcb83f8515bd169afd0b22488b4430","http://www.volexity.com/blog/?p=158"],"2021397":["http://sslbl.abuse.ch"],"2021399":["http://www.threatexpert.com/report.aspx?md5=7ff6912828faedbf39c4c66c7ba0260d","http://www.threatexpert.com/report.aspx?md5=0361c2685bf799c04d796a6d18e1f075","http://blog.checkpoint.com/wp-content/uploads/2015/07/matsnu-malwareid-technical-brief.pdf"],"2021401":["http://www.threatexpert.com/report.aspx?md5=76e54deb6f81edd6b47c854c847d590d"],"2021403":["http://www.threatexpert.com/report.aspx?md5=3f30e3a023a720f0227a0a8653484239","http://www.threatexpert.com/report.aspx?md5=b9d6539f4136b715656f8a515810c90d"],"2021404":["http://www.threatexpert.com/report.aspx?md5=3f30e3a023a720f0227a0a8653484239","http://www.threatexpert.com/report.aspx?md5=b9d6539f4136b715656f8a515810c90d"],"2021408":["http://packetstormsecurity.com/files/132585/CORE-2015-0012.txt"],"2021409":["http://www.threatexpert.com/report.aspx?md5=5a6bd6b5e00333b8d39ff6be13a346f6"],"2021410":["http://www.threatexpert.com/report.aspx?md5=5a6bd6b5e00333b8d39ff6be13a346f6"],"2021411":["http://www.threatexpert.com/report.aspx?md5=40368db3a68f2db17853750e68cfc662","http://sslbl.abuse.ch"],"2021412":["http://www.threatexpert.com/report.aspx?md5=3ae3cb09c8f54210cb4faf7aa76741ee","http://blog.trustlook.com/2015/07/08/most-successful-malware-on-google-play/"],"2021413":["http://www.threatexpert.com/report.aspx?md5=a25ec7749b2de12c2a86167afa88a4dd","http://researchcenter.paloaltonetworks.com/2015/07/unit-42-technical-analysis-seaduke/"],"2021416":["http://morphick.com/blog/2015/7/14/bernhardpos-new-pos-malware-discovered-by-morphick"],"2021417":["http://sslbl.abuse.ch"],"2021419":["http://researchcenter.paloaltonetworks.com/2015/07/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke/"],"2021420":["http://researchcenter.paloaltonetworks.com/2015/07/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke/"],"2021422":["http://researchcenter.paloaltonetworks.com/2015/07/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke/"],"2021423":["http://researchcenter.paloaltonetworks.com/2015/07/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke/"],"2021424":["http://researchcenter.paloaltonetworks.com/2015/07/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke/"],"2021425":["http://researchcenter.paloaltonetworks.com/2015/07/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke/"],"2021426":["http://sslbl.abuse.ch"],"2021431":["http://www.threatexpert.com/report.aspx?md5=112c64f7c07a959a1cbff6621850a4ad","http://isightpartners.com/2015/07/microsoft-office-zero-day-cve-2015-2424-leveraged-by-tsar-team/"],"2021436":["http://sslbl.abuse.ch"],"2021439":["http://www.threatexpert.com/report.aspx?md5=f52ff1dc059f1df95781830d84a12869"],"2021440":["http://www.threatexpert.com/report.aspx?md5=5626771cf6751286de4b90ea4b8df94d","http://researchcenter.paloaltonetworks.com/2015/06/keybase-keylogger-malware-family-exposed/"],"2021441":["http://www.threatexpert.com/report.aspx?md5=5626771cf6751286de4b90ea4b8df94d","http://researchcenter.paloaltonetworks.com/2015/06/keybase-keylogger-malware-family-exposed/"],"2021442":["http://www.threatexpert.com/report.aspx?md5=3eb94c397a395f24b84297593f69710a"],"2021445":["http://sslbl.abuse.ch"],"2021446":["http://sslbl.abuse.ch"],"2021501":["http://www.symantec.com/connect/blogs/butterfly-profiting-high-level-corporate-attacks","http://securelist.com/blog/research/71275/wild-neutron-economic-espionage-threat-actor-returns-with-new-tricks/"],"2021502":["http://www.symantec.com/connect/blogs/butterfly-profiting-high-level-corporate-attacks","http://securelist.com/blog/research/71275/wild-neutron-economic-espionage-threat-actor-returns-with-new-tricks/"],"2021506":["http://blog.trendmicro.com/trendlabs-security-intelligence/an-in-depth-look-at-how-pawn-storms-java-zero-day-was-used"],"2021511":["http://www.threatexpert.com/report.aspx?md5=50bd21aac1f57d90c54683995ec102aa"],"2021512":["http://sslbl.abuse.ch"],"2021513":["http://sslbl.abuse.ch"],"2021514":["http://sslbl.abuse.ch"],"2021515":["http://sslbl.abuse.ch"],"2021516":["http://sslbl.abuse.ch"],"2021517":["http://sslbl.abuse.ch"],"2021518":["http://www.threatexpert.com/report.aspx?md5=a5f7d314e2b996b69751a4e46503c644"],"2021519":["http://sslbl.abuse.ch"],"2021520":["http://www.threatexpert.com/report.aspx?md5=7a015848f24de23da43e2ca9970df11e"],"2021523":["http://www.threatexpert.com/report.aspx?md5=1aca09c5eefb37539e86ec86dd3be72f","http://blog.jpcert.or.jp/2015/07/poisonivy-adapts-to-communicate-through-authentication-proxies.html"],"2021525":["http://sslbl.abuse.ch"],"2021526":["http://blog.malwaremustdie.org/2015/06/the-elf-chinaz-reloaded.html"],"2021527":["http://www.threatexpert.com/report.aspx?md5=7ba76b0ec1249b19a46e1603e5ab0a90","http://blog.malwarebytes.org/security-threat/2014/02/hiding-in-plain-sight-a-story-about-a-sneaky-banking-trojan/"],"2021528":["http://www.threatexpert.com/report.aspx?md5=7a015848f24de23da43e2ca9970df11e"],"2021529":["http://www.threatexpert.com/report.aspx?md5=32230d747829dcf77841f594aa54915a","http://sslbl.abuse.ch"],"2021530":["http://sslbl.abuse.ch"],"2021541":["http://sslbl.abuse.ch"],"2021545":["http://www.threatexpert.com/report.aspx?md5=d87ba0bfce1cdb17fd243b8b1d247e88"],"2021546":["http://sslbl.abuse.ch"],"2021547":["http://www.threatexpert.com/report.aspx?md5=d87ba0bfce1cdb17fd243b8b1d247e88"],"2021551":["http://www.threatexpert.com/report.aspx?md5=ca57b9de1cae18bda994aa4bd093c571","http://www.file-analyzer.net/analysis/4825"],"2021553":["http://sslbl.abuse.ch"],"2021556":["http://www.threatexpert.com/report.aspx?md5=3e215dfa84c271bb431b3de2e5da016a"],"2021557":["http://blog.trendmicro.com/trendlabs-security-intelligence/an-in-depth-look-at-how-pawn-storms-java-zero-day-was-used/"],"2021558":["http://blog.trendmicro.com/trendlabs-security-intelligence/an-in-depth-look-at-how-pawn-storms-java-zero-day-was-used/"],"2021560":["http://blog.trendmicro.com/trendlabs-security-intelligence/an-in-depth-look-at-how-pawn-storms-java-zero-day-was-used/"],"2021563":["http://sslbl.abuse.ch"],"2021565":["http://sslbl.abuse.ch"],"2021566":["http://sslbl.abuse.ch"],"2021567":["http://sslbl.abuse.ch"],"2021568":["http://sslbl.abuse.ch"],"2021569":["http://www.threatexpert.com/report.aspx?md5=3cd598e8e2fd033134d8784251eff59e","http://www.secureworks.com/cyber-threat-intelligence/threats/sakula-malware-family/"],"2021570":["http://www.secureworks.com/cyber-threat-intelligence/threats/sakula-malware-family/"],"2021571":["http://www.secureworks.com/cyber-threat-intelligence/threats/sakula-malware-family/"],"2021576":["http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021577":["http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021578":["http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021579":["http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021580":["http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021581":["http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021582":["http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021583":["http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021584":["http://www.threatexpert.com/report.aspx?md5=c5a8e09295b852a6e32186374b66e1a7","http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021585":["http://www.threatexpert.com/report.aspx?md5=c5a8e09295b852a6e32186374b66e1a7","http://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"],"2021591":["http://researchcenter.paloaltonetworks.com/2015/07/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke/"],"2021592":["http://sslbl.abuse.ch"],"2021593":["http://sslbl.abuse.ch"],"2021594":["http://sslbl.abuse.ch"],"2021596":["http://sslbl.abuse.ch"],"2021597":["http://www.threatexpert.com/report.aspx?md5=3959fb5b5909d9c6fb9c9a408d35f67a","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-pos-ram-scraper-malware.pdf"],"2021598":["http://sslbl.abuse.ch"],"2021599":["http://sslbl.abuse.ch"],"2021601":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-4495"],"2021602":["http://sslbl.abuse.ch"],"2021603":["http://sslbl.abuse.ch"],"2021604":["http://sslbl.abuse.ch"],"2021605":["http://www.threatexpert.com/report.aspx?md5=0c420e1eef4b1f097ffec8d0c0ff438a"],"2021606":["http://nakedsecurity.sophos.com/2015/08/07/firefox-zero-day-hole-used-against-windows-and-linux-to-steal-passwords/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-4495"],"2021607":["http://www.threatexpert.com/report.aspx?md5=03c5bfb5c0c7a936ad62ebe03019edd0"],"2021608":["http://www.threatexpert.com/report.aspx?md5=c7e6ebf91c03a2bcaa8053f149870fad"],"2021609":["http://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/"],"2021610":["http://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/"],"2021611":["http://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/"],"2021612":["http://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/"],"2021616":["http://www.powershellempire.com"],"2021617":["http://blog.fortinet.com/post/locker-an-android-ransomware-full-of-surprises"],"2021618":["http://www.threatexpert.com/report.aspx?md5=a34236628ea04e10430e20ac2b9d7ad2"],"2021622":["http://sslbl.abuse.ch"],"2021623":["http://sslbl.abuse.ch"],"2021624":["http://sslbl.abuse.ch"],"2021625":["http://www.threatexpert.com/report.aspx?md5=1bcea0364088c5308ed217649eeef4d9"],"2021626":["http://www.4armed.com/blog/network-defense-catching-galileo-rcs-using-snort"],"2021627":["http://www.4armed.com/blog/network-defense-catching-galileo-rcs-using-snort"],"2021628":["http://www.4armed.com/blog/network-defense-catching-galileo-rcs-using-snort"],"2021629":["http://www.4armed.com/blog/network-defense-catching-galileo-rcs-using-snort"],"2021631":["http://www.threatexpert.com/report.aspx?md5=789ee114125a6e1db363b505a643c03d"],"2021632":["http://www.threatexpert.com/report.aspx?md5=789ee114125a6e1db363b505a643c03d"],"2021633":["http://sslbl.abuse.ch"],"2021634":["http://sslbl.abuse.ch"],"2021635":["http://sslbl.abuse.ch"],"2021636":["http://sslbl.abuse.ch"],"2021644":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-5718","http://seclists.org/fulldisclosure/2015/Aug/8"],"2021685":["http://www.threatexpert.com/report.aspx?md5=fba4af888ae0e838dd083d4cfebc8f39","http://www.threatexpert.com/report.aspx?md5=d32b6c067e64c141b0c239d23ab1ffd1","http://f-secure.com/weblog/archives/00002795.html"],"2021686":["http://sslbl.abuse.ch"],"2021687":["http://sslbl.abuse.ch"],"2021688":["http://sslbl.abuse.ch"],"2021690":["http://www.threatexpert.com/report.aspx?md5=2c9f2a84a346e29c3b262ca1d2d2f123"],"2021691":["http://www.threatexpert.com/report.aspx?md5=c01991d55133d0057c9b721bb141a5d9"],"2021695":["http://sslbl.abuse.ch"],"2021697":["http://www.threatexpert.com/report.aspx?md5=adabe1b995e6633dee19fdd2fdc4957a"],"2021700":["http://www.threatexpert.com/report.aspx?md5=5cb2e8a9b6935f228623c69f1b17669d"],"2021703":["http://sslbl.abuse.ch"],"2021704":["http://sslbl.abuse.ch"],"2021705":["http://sslbl.abuse.ch"],"2021706":["http://sslbl.abuse.ch"],"2021709":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-2444"],"2021711":["http://www.threatexpert.com/report.aspx?md5=a9f29924410a14dea1eef8d75fed3b39","http://www.malware-traffic-analysis.net/2015/08/24/index2.html"],"2021712":["http://kernelmode.info/forum/viewtopic.php?f=16&t=3159"],"2021713":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-2444"],"2021714":["http://kernelmode.info/forum/viewtopic.php?f=16&t=3159"],"2021715":["http://kernelmode.info/forum/viewtopic.php?f=16&t=3159"],"2021716":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231"],"2021717":["http://sslbl.abuse.ch"],"2021719":["http://kernelmode.info/forum/viewtopic.php?f=16&t=3981"],"2021720":["http://sslbl.abuse.ch"],"2021721":["http://sslbl.abuse.ch"],"2021722":["http://sslbl.abuse.ch"],"2021723":["http://www.threatexpert.com/report.aspx?md5=0a4d0e5d0b69560414bbd20127bd8176"],"2021724":["http://www.threatexpert.com/report.aspx?md5=ee90ec9935c7b8e1a5dad364d4545851"],"2021730":["http://securelist.com/blog/incidents/73914/operation-blockbuster-revealed/","http://operationblockbuster.com/resources/index.html"],"2021731":["http://sslbl.abuse.ch"],"2021732":["http://sslbl.abuse.ch"],"2021733":["http://sslbl.abuse.ch"],"2021734":["http://sslbl.abuse.ch"],"2021735":["http://www.threatexpert.com/report.aspx?md5=26e83fa8b2f3eccfe975cd451933ae63","http://us-cert.gov/ncas/alerts/TA14-300A"],"2021736":["http://www.threatexpert.com/report.aspx?md5=26e83fa8b2f3eccfe975cd451933ae63","http://us-cert.gov/ncas/alerts/TA14-300A"],"2021737":["http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/"],"2021738":["http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/"],"2021739":["http://www.threatexpert.com/report.aspx?md5=0f6a9b15bd9fd719bb96491e16eb2f9c","http://securityintelligence.com/watch-out-for-corebot-new-stealer-in-the-wild/"],"2021741":["http://securityintelligence.com/watch-out-for-corebot-new-stealer-in-the-wild/","http://www.threatexpert.com/report.aspx?md5=f7dff17acec6b79f3cdad6259cfb2d2c"],"2021742":["http://securityintelligence.com/watch-out-for-corebot-new-stealer-in-the-wild/","http://www.threatexpert.com/report.aspx?md5=f7dff17acec6b79f3cdad6259cfb2d2c"],"2021743":["http://www.threatexpert.com/report.aspx?md5=52faadf69c492e5bea1b3ad77fd7e8b1","http://us-cert.gov/ncas/alerts/TA14-300A"],"2021744":["http://www.threatexpert.com/report.aspx?md5=32c17edee5b29e41f31eda05e78b2241"],"2021745":["http://malwareconfig.com/stats/PredatorPain","http://www.threatexpert.com/report.aspx?md5=e5ddca929924e4f34cb18692f09ac424"],"2021746":["http://blog.sucuri.net/2015/12/evolution-of-pseudo-darkleech.html"],"2021747":["http://www.symantec.com/security_response/writeup.jsp?docid=2003-082915-1318-99","http://damballa.com/tvspy-threat-actor-group-reappears/"],"2021748":["http://www.threatexpert.com/report.aspx?md5=ec38ae7c35be4d7f8103bf1db692d2f8"],"2021749":["http://www.threatexpert.com/report.aspx?md5=52faadf69c492e5bea1b3ad77fd7e8b1","http://us-cert.gov/ncas/alerts/TA14-300A"],"2021750":["http://sslbl.abuse.ch"],"2021751":["http://sslbl.abuse.ch"],"2021753":["http://www.threatexpert.com/report.aspx?md5=b0c2a5a3cfef4e759979b7d0869b7612","http://researchcenter.paloaltonetworks.com/2015/09/musical-chairs-multi-year-campaign-involving-new-variant-of-gh0st-malware/"],"2021754":["http://securityintelligence.com/watch-out-for-corebot-new-stealer-in-the-wild/","http://www.threatexpert.com/report.aspx?md5=f32f2209a1986c55750ceb6d8066df9f"],"2021755":["http://labsblog.f-secure.com/2015/09/08/sofacy-recycles-carberp-and-metasploit-code/","http://www.isightpartners.com/2015/07/microsoft-office-zero-day-cve-2015-2424-leveraged-by-tsar-team/"],"2021756":["http://www.exploit-db.com/exploits/38090/"],"2021757":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-1538","http://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/"],"2021758":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-1538","http://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/"],"2021759":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-1538","http://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/"],"2021762":["http://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=854"],"2021763":["http://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=854"],"2021767":["http://sslbl.abuse.ch"],"2021769":["http://sslbl.abuse.ch"],"2021770":["http://sslbl.abuse.ch"],"2021771":["http://sslbl.abuse.ch"],"2021772":["http://www.threatexpert.com/report.aspx?md5=a586db30ab21a02eee9e8ab2ebe8a2b5","http://blog.team-cymru.org/2015/06/poseidon-and-the-backoff-pos-link/"],"2021773":["http://www.threatexpert.com/report.aspx?md5=f22cad1a3985a5183a76324b448e06f2","http://us-cert.gov/ncas/alerts/TA14-300A"],"2021775":["http://www.threatexpert.com/report.aspx?md5=d0e3471f4963496cefd73744e98340aa"],"2021776":["http://sslbl.abuse.ch"],"2021777":["http://sslbl.abuse.ch"],"2021779":["http://sslbl.abuse.ch"],"2021780":["http://sslbl.abuse.ch"],"2021781":["http://sslbl.abuse.ch"],"2021782":["http://sslbl.abuse.ch"],"2021783":["http://sslbl.abuse.ch"],"2021784":["http://sslbl.abuse.ch"],"2021785":["http://fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.html"],"2021788":["http://www.threatexpert.com/report.aspx?md5=2c65085e7c71fa2c02c9b65e9b747e5b","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-iron-tiger.pdf"],"2021789":["http://www.threatexpert.com/report.aspx?md5=2c65085e7c71fa2c02c9b65e9b747e5b","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-iron-tiger.pdf"],"2021790":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-iron-tiger.pdf"],"2021791":["http://www.threatexpert.com/report.aspx?md5=2c65085e7c71fa2c02c9b65e9b747e5b","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-iron-tiger.pdf"],"2021792":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-iron-tiger.pdf"],"2021793":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-iron-tiger.pdf"],"2021794":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-iron-tiger.pdf"],"2021795":["http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-iron-tiger.pdf"],"2021796":["http://www.threatexpert.com/report.aspx?md5=f7146691adea573548fa040fb182f4fe","http://trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-iron-tiger.pdf"],"2021797":["http://sslbl.abuse.ch"],"2021798":["http://sslbl.abuse.ch"],"2021799":["http://sslbl.abuse.ch"],"2021800":["http://www.threatexpert.com/report.aspx?md5=ce19c30ffda76cd63a88eeb8af0340f0","http://welivesecurity.com/2015/09/17/the-trojan-games-odlanor-malware-cheats-at-poker/"],"2021801":["http://sslbl.abuse.ch"],"2021802":["http://sslbl.abuse.ch"],"2021803":["http://sslbl.abuse.ch"],"2021804":["http://sslbl.abuse.ch"],"2021805":["http://www.threatexpert.com/report.aspx?md5=080db9578ea797cd231bc1160d3824f1","http://sslbl.abuse.ch"],"2021806":["http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store"],"2021807":["http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store"],"2021808":["http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store"],"2021809":["http://sslbl.abuse.ch"],"2021810":["http://sslbl.abuse.ch"],"2021812":["http://www.threatexpert.com/report.aspx?md5=f48f626cf746a2c3c73182c752c481b6","http://www.threatexpert.com/report.aspx?md5=8ab21ac9199d3ced2230924b90f49f0d"],"2021813":["http://www.threatexpert.com/report.aspx?md5=f48f626cf746a2c3c73182c752c481b6","http://www.threatexpert.com/report.aspx?md5=8ab21ac9199d3ced2230924b90f49f0d"],"2021814":["http://www.threatexpert.com/report.aspx?md5=f48f626cf746a2c3c73182c752c481b6","http://www.threatexpert.com/report.aspx?md5=8ab21ac9199d3ced2230924b90f49f0d"],"2021815":["http://sslbl.abuse.ch","http://www.threatexpert.com/report.aspx?md5=8217cc4fc3d5781206becbef148154ea"],"2021816":["http://sslbl.abuse.ch","http://www.threatexpert.com/report.aspx?md5=e448572aea062241c80dd2a15562e968"],"2021817":["http://sslbl.abuse.ch"],"2021818":["http://sslbl.abuse.ch"],"2021819":["http://sslbl.abuse.ch","http://www.threatexpert.com/report.aspx?md5=ead31d4cbbd79466359d46694a9d56d3"],"2021822":["http://github.com/XcodeGhostSource/XcodeGhost"],"2021824":["http://sslbl.abuse.ch"],"2021825":["http://sslbl.abuse.ch"],"2021826":["http://sslbl.abuse.ch"],"2021827":["http://sslbl.abuse.ch"],"2021828":["http://www.threatexpert.com/report.aspx?md5=c7872508eededb17cf864886270fd3e9","http://sslbl.abuse.ch"],"2021829":["http://www.threatexpert.com/report.aspx?md5=f870c0d62691fc39194922e4a59fdc1c"],"2021830":["http://www.threatexpert.com/report.aspx?md5=f870c0d62691fc39194922e4a59fdc1c"],"2021831":["http://threatconnect.com/camerashy-resources/"],"2021833":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2021834":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2021835":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2021836":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2021837":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2021838":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2021839":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2021842":["http://www.threatexpert.com/report.aspx?md5=b40fc2d1f343affad7bc02ae9b37cd89"],"2021843":["http://www.threatexpert.com/report.aspx?md5=bfd8db9ed284deb64c9e4fc5bfa758bd","http://www.csis.dk/da/csis/news/4726/"],"2021844":["http://www.threatexpert.com/report.aspx?md5=bfd8db9ed284deb64c9e4fc5bfa758bd","http://www.csis.dk/da/csis/news/4726/"],"2021845":["http://sslbl.abuse.ch"],"2021846":["http://research.zscaler.com/2015/09/compromised-wordpress-campaign-spyware.html"],"2021847":["http://research.zscaler.com/2015/09/compromised-wordpress-campaign-spyware.html"],"2021848":["http://research.zscaler.com/2015/09/compromised-wordpress-campaign-spyware.html"],"2021851":["http://www.threatexpert.com/report.aspx?md5=6f2159e72e7ab7b02e18211ecbed7dd3","http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/"],"2021852":["http://www.threatexpert.com/report.aspx?md5=b8a1012e3afc6eabb7819ce4d8e2b93b"],"2021853":["http://www.threatexpert.com/report.aspx?md5=b8a1012e3afc6eabb7819ce4d8e2b93b"],"2021854":["http://www.threatexpert.com/report.aspx?md5=b8a1012e3afc6eabb7819ce4d8e2b93b"],"2021855":["http://www.threatexpert.com/report.aspx?md5=6f2159e72e7ab7b02e18211ecbed7dd3","http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/"],"2021856":["http://www.threatexpert.com/report.aspx?md5=6f2159e72e7ab7b02e18211ecbed7dd3","http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/"],"2021857":["http://www.threatexpert.com/report.aspx?md5=6f2159e72e7ab7b02e18211ecbed7dd3","http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/"],"2021858":["http://www.threatexpert.com/report.aspx?md5=6f2159e72e7ab7b02e18211ecbed7dd3","http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/"],"2021859":["http://www.threatexpert.com/report.aspx?md5=6f2159e72e7ab7b02e18211ecbed7dd3","http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/"],"2021860":["http://www.threatexpert.com/report.aspx?md5=6f2159e72e7ab7b02e18211ecbed7dd3","http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/"],"2021861":["http://www.threatexpert.com/report.aspx?md5=6f2159e72e7ab7b02e18211ecbed7dd3","http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/"],"2021862":["http://www.threatexpert.com/report.aspx?md5=6f2159e72e7ab7b02e18211ecbed7dd3","http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomware-still-comes-up-short/"],"2021863":["http://www.threatexpert.com/report.aspx?md5=4568bc3e9c1a24ba792666ad1c620560","http://sslbl.abuse.ch"],"2021864":["http://www.threatexpert.com/report.aspx?md5=c55a60bb04a449eb8bc182f52124c341","http://sslbl.abuse.ch"],"2021865":["http://sslbl.abuse.ch"],"2021866":["http://sslbl.abuse.ch"],"2021867":["http://www.threatexpert.com/report.aspx?md5=0453512c8c3bb940e8c40833d1076353","http://www.csis.dk/da/csis/news/4726/"],"2021868":["http://www.threatexpert.com/report.aspx?md5=77ebe2b014baf75e45c3009b0d42fa5d","http://www.csis.dk/da/csis/news/4726/"],"2021869":["http://www.threatexpert.com/report.aspx?md5=eeda4fa2b6f054acfce0dbc25493c366","http://www.csis.dk/da/csis/news/4726/"],"2021871":["http://www.threatexpert.com/report.aspx?md5=dfc2c23663122ac9fc25b708f278c147"],"2021872":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021873":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021874":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021875":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021876":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021877":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021878":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021879":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021880":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021881":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021882":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021883":["http://kernelmode.info/forum/viewtopic.php?f=16&t=4048&p=26845#p26845","http://www.threatexpert.com/report.aspx?md5=a60b96a2cf4b979968fe5ac6259fb197"],"2021884":["http://sslbl.abuse.ch"],"2021885":["http://sslbl.abuse.ch"],"2021887":["http://sslbl.abuse.ch"],"2021888":["http://sslbl.abuse.ch"],"2021889":["http://www.threatexpert.com/report.aspx?md5=ccdffdc551b36980b7cd04e33d5fb100"],"2021893":["http://blog.malwarebytes.org/online-security/2015/10/this-pdf-version-is-not-supported-data-uri-phish"],"2021894":["http://www.threatexpert.com/report.aspx?md5=eeda4fa2b6f054acfce0dbc25493c366","http://www.csis.dk/da/csis/news/4726/"],"2021895":["http://sslbl.abuse.ch"],"2021896":["http://sslbl.abuse.ch"],"2021897":["http://sslbl.abuse.ch"],"2021898":["http://sslbl.abuse.ch"],"2021900":["http://researchcenter.paloaltonetworks.com/2015/10/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/"],"2021901":["http://researchcenter.paloaltonetworks.com/2015/10/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/"],"2021902":["http://sslbl.abuse.ch"],"2021903":["http://sslbl.abuse.ch"],"2021904":["http://sslbl.abuse.ch"],"2021909":["http://sslbl.abuse.ch"],"2021910":["http://sslbl.abuse.ch"],"2021911":["http://sslbl.abuse.ch"],"2021912":["http://pastebin.com/EH1SH9aL"],"2021913":["http://pastebin.com/EH1SH9aL"],"2021914":["http://pastebin.com/EH1SH9aL"],"2021915":["http://pastebin.com/EH1SH9aL"],"2021916":["http://pastebin.com/EH1SH9aL"],"2021917":["http://pastebin.com/EH1SH9aL"],"2021919":["http://www.threatexpert.com/report.aspx?md5=07fd870e4ea8dd6b9503a956b5bb47f3"],"2021920":["http://sslbl.abuse.ch"],"2021921":["http://sslbl.abuse.ch"],"2021922":["http://www.threatexpert.com/report.aspx?md5=92ecb8cedb226a27e354b45a56f0353f"],"2021923":["http://www.threatexpert.com/report.aspx?md5=e93e5af213707ef1888784fa1e709004"],"2021924":["http://sslbl.abuse.ch"],"2021925":["http://sslbl.abuse.ch"],"2021926":["http://sslbl.abuse.ch"],"2021927":["http://fireeye.com/blog/threat-research/2015/10/kemoge_another_mobi.html"],"2021928":["http://fireeye.com/blog/threat-research/2015/10/kemoge_another_mobi.html"],"2021929":["http://fireeye.com/blog/threat-research/2015/10/kemoge_another_mobi.html"],"2021930":["http://www.threatexpert.com/report.aspx?md5=54618b126c69b2f0a3309b7c0ac5ae26","http://blogs.mcafee.com/mcafee-labs/brazilian-banking-malware-hides-in-sql-database/"],"2021931":["http://www.threatexpert.com/report.aspx?md5=54618b126c69b2f0a3309b7c0ac5ae26","http://blogs.mcafee.com/mcafee-labs/brazilian-banking-malware-hides-in-sql-database/"],"2021935":["http://volexity.com/blog/?p=179"],"2021936":["http://volexity.com/blog/?p=179"],"2021937":["http://sslbl.abuse.ch"],"2021938":["http://sslbl.abuse.ch"],"2021940":["http://sslbl.abuse.ch"],"2021944":["http://www.shellshocklabs.com/2015/09/part-1en-hacking-netgear-jwnr2010v5.html"],"2021945":["http://sslbl.abuse.ch"],"2021947":["http://www.threatexpert.com/report.aspx?md5=dc226166dfbe28eee2576ea5141bc19d","http://www.threatexpert.com/report.aspx?md5=dadee91e0b82fc91a25a66b61bb2f2dc"],"2021948":["http://www.threatexpert.com/report.aspx?md5=52faadf69c492e5bea1b3ad77fd7e8b1","http://us-cert.gov/ncas/alerts/TA14-300A"],"2021950":["http://sslbl.abuse.ch"],"2021951":["http://threatpost.com/zero-day-in-magento-plugin-magmi-under-attack/115026/"],"2021952":["http://www.certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=0bc86ab7ead67e264531ccb16c3c529a"],"2021953":["http://www.certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=0bc86ab7ead67e264531ccb16c3c529a"],"2021954":["http://www.certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=0bc86ab7ead67e264531ccb16c3c529a"],"2021955":["http://www.certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=0bc86ab7ead67e264531ccb16c3c529a"],"2021956":["http://trendmicro.com/vinfo/us/threat-encyclopedia/malware/js_nemucod.hqk"],"2021957":["http://sslbl.abuse.ch"],"2021958":["http://sslbl.abuse.ch"],"2021959":["http://sslbl.abuse.ch"],"2021960":["http://asert.arbornetworks.com/defending-the-white-elephant/"],"2021961":["http://asert.arbornetworks.com/defending-the-white-elephant/"],"2021962":["http://citizenlab.org/2015/10/targeted-attacks-ngo-burma/"],"2021976":["http://researchcenter.paloaltonetworks.com/2014/08/new-release-decrypting-netwire-c2-traffic","http://www.circl.lu/pub/tr-23"],"2021977":["http://researchcenter.paloaltonetworks.com/2014/08/new-release-decrypting-netwire-c2-traffic","http://www.circl.lu/pub/tr-23"],"2021978":["http://researchcenter.paloaltonetworks.com/2014/08/new-release-decrypting-netwire-c2-traffic","http://www.circl.lu/pub/tr-23"],"2021979":["http://researchcenter.paloaltonetworks.com/2014/08/new-release-decrypting-netwire-c2-traffic","http://www.circl.lu/pub/tr-23"],"2021981":["http://sslbl.abuse.ch"],"2021982":["http://sslbl.abuse.ch"],"2021983":["http://www.threatexpert.com/report.aspx?md5=447a1d3c345a1577ccd287abe91a3ca"],"2021985":["http://blog.trendmicro.com/trendlabs-security-intelligence/new-headaches-how-the-pawn-storm-zero-day-evaded-javas-click-to-play-protection/"],"2021986":["http://blog.trendmicro.com/trendlabs-security-intelligence/new-headaches-how-the-pawn-storm-zero-day-evaded-javas-click-to-play-protection/"],"2021987":["http://blog.trendmicro.com/trendlabs-security-intelligence/new-headaches-how-the-pawn-storm-zero-day-evaded-javas-click-to-play-protection/"],"2021988":["http://blog.trendmicro.com/trendlabs-security-intelligence/new-headaches-how-the-pawn-storm-zero-day-evaded-javas-click-to-play-protection/"],"2021991":["http://heimdalsecurity.com/blog/security-alert-blackhat-seo-campaign-passes-around-malware-to-unsuspecting-users"],"2021992":["http://trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access"],"2021993":["http://sslbl.abuse.ch"],"2021994":["http://sslbl.abuse.ch"],"2021995":["http://www.threatexpert.com/report.aspx?md5=d11a453d4de6e6fd991967d67947c0d7"],"2021996":["http://www.threatexpert.com/report.aspx?md5=38abba51bdf98347fc4f91642b21b041"],"2021997":["http://www.threatexpert.com/report.aspx?md5=79809fd3e05a852581b897cc4b06aa32"],"2022000":["http://symantec.com/connect/blogs/duuzer-back-door-trojan-targets-south-korea-take-over-computers","http://www.threatexpert.com/report.aspx?md5=cd7a72be9c16c2ece1140bc461d6226d"],"2022004":["http://sslbl.abuse.ch"],"2022007":["http://www.threatexpert.com/report.aspx?md5=2c9f2a84a346e29c3b262ca1d2d2f123","http://www.fireeye.com/blog/threat-research/2015/04/a_new_word_document.html"],"2022008":["http://www.threatexpert.com/report.aspx?md5=2c9f2a84a346e29c3b262ca1d2d2f123"],"2022010":["http://threatglass.com/malicious_urls/funu-info"],"2022014":["http://labs.sucuri.net/?note=2015-11-02"],"2022015":["http://labs.sucuri.net/?note=2015-11-02"],"2022020":["http://www.threatexpert.com/report.aspx?md5=d9b91aa8c66c4a701f5558bdca805eec","http://otx.alienvault.com/pulse/5637202b4637f2388aaec61c/"],"2022021":["http://www.threatexpert.com/report.aspx?md5=c0c8178b7ef2a8c067c68a7fb7dc7ecd"],"2022025":["http://www.threatexpert.com/report.aspx?md5=aa42c4ee46136d4125bebf93e9b2776c"],"2022026":["http://www.threatexpert.com/report.aspx?md5=aa42c4ee46136d4125bebf93e9b2776c"],"2022027":["http://www.threatexpert.com/report.aspx?md5=aa42c4ee46136d4125bebf93e9b2776c"],"2022028":["http://blogs.akamai.com/2014/09/environment-bashing.html"],"2022034":["http://www.threatexpert.com/report.aspx?md5=2d51e11a38b7fd448cd0b1d319915e44"],"2022037":["http://www.certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=f77e7cac3793136bcd1d77ec6a00d8e2"],"2022038":["http://www.certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=f77e7cac3793136bcd1d77ec6a00d8e2"],"2022039":["http://blog.sucuri.net/2015/11/vbulletin-exploits-in-the-wild.html"],"2022041":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022042":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022043":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022044":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022045":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022046":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022047":["http://www.threatexpert.com/report.aspx?md5=b7de8927998f3604762096125e114042","http://blog.checkpoint.com/2015/11/09/rocket-kitten-a-campaign-with-9-lives/"],"2022048":["http://www.bleepingcomputer.com/news/security/cryptowall-4-0-released-with-new-features-such-as-encrypted-file-names"],"2022056":["http://www.threatexpert.com/report.aspx?md5=cb690af981b61aa4779624db5d2489e1","http://www.threatexpert.com/report.aspx?md5=040ac83b30a9bd111d06d238f39593fb"],"2022057":["http://www.threatexpert.com/report.aspx?md5=4b689f711da45fb8523c95a85679f435","http://sslbl.abuse.ch"],"2022058":["http://www.threatexpert.com/report.aspx?md5=5666cb1caca3fde7dd1c8195b76eac8e","http://sslbl.abuse.ch"],"2022059":["http://www.threatexpert.com/report.aspx?md5=a42317b9f9d3df375218e650999d48c4"],"2022060":["http://www.threatexpert.com/report.aspx?md5=a42317b9f9d3df375218e650999d48c4"],"2022061":["http://www.threatexpert.com/report.aspx?md5=a42317b9f9d3df375218e650999d48c4"],"2022063":["http://www.threatexpert.com/report.aspx?md5=310c26fa0c7d07adbff32b569b1972f1"],"2022064":["http://www.threatexpert.com/report.aspx?md5=4645b7883d5c8fee6579cc79dee5f683","http://thisissecurity.net/2015/11/05/low-cost-point-of-sales-pos-hacking/"],"2022065":["http://sslbl.abuse.ch","http://www.threatexpert.com/report.aspx?md5=c493fbc74573c2c125ff57b1bf15e4be"],"2022066":["http://sslbl.abuse.ch","http://sslbl.abuse.ch","http://www.threatexpert.com/report.aspx?md5=efa5ea2c511b08d0f8259a10a49b27ad"],"2022067":["http://sslbl.abuse.ch","http://sslbl.abuse.ch","http://www.threatexpert.com/report.aspx?md5=e5b7fd7eed59340027625ac39bae7c81"],"2022068":["http://www.threatexpert.com/report.aspx?md5=51409b4216065c530a94cd7a5687c0d6","http://alienvault.com/open-threat-exchange/blog/kilerrat-taking-over-where-njrat-remote-access-trojan-left-off"],"2022069":["http://www.threatexpert.com/report.aspx?md5=51409b4216065c530a94cd7a5687c0d6","http://alienvault.com/open-threat-exchange/blog/kilerrat-taking-over-where-njrat-remote-access-trojan-left-off"],"2022072":["http://www.threatexpert.com/report.aspx?md5=b4ce43e1c9e74c549e2bae8cd77d5af1"],"2022073":["http://www.threatexpert.com/report.aspx?md5=8ae2468d3f208d07fb47ebb1e0e297d7","http://researchcenter.paloaltonetworks.com/2015/11/bookworm-trojan-a-model-of-modular-architecture/"],"2022074":["http://www.threatexpert.com/report.aspx?md5=0f41c853a2d522e326f2c30b4b951b04","http://researchcenter.paloaltonetworks.com/2015/11/bookworm-trojan-a-model-of-modular-architecture/"],"2022075":["http://www.threatexpert.com/report.aspx?md5=b66a864255ad796cf1e82f973f67f556","http://reaqta.com/2015/11/diving-into-chimera-ransomware/"],"2022076":["http://www.threatexpert.com/report.aspx?md5=58b38122ac12b84989914623efe833be","http://sslbl.abuse.ch"],"2022077":["http://www.threatexpert.com/report.aspx?md5=218a9854b7d1ca1f417c59a566b343d9","http://sslbl.abuse.ch"],"2022078":["http://sslbl.abuse.ch"],"2022081":["http://www.cmcm.com/blog/en/security/2015-11-09/842.html"],"2022087":["http://sslbl.abuse.ch"],"2022088":["http://sslbl.abuse.ch"],"2022089":["http://sslbl.abuse.ch"],"2022091":["http://www.threatexpert.com/report.aspx?md5=e15b38251aed80298ba07169eb6ee2fa"],"2022095":["http://sslbl.abuse.ch"],"2022096":["http://sslbl.abuse.ch"],"2022097":["http://sslbl.abuse.ch"],"2022098":["http://sslbl.abuse.ch"],"2022099":["http://sslbl.abuse.ch"],"2022100":["http://sslbl.abuse.ch"],"2022101":["http://sslbl.abuse.ch"],"2022102":["http://sslbl.abuse.ch"],"2022105":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2022106":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2022107":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2022108":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2022109":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2022110":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2022111":["http://blog.cari.net/carisirt-defaulting-on-passwords-part-1-r0_bot/"],"2022114":["http://github.com/foxglovesec/JavaUnserializeExploits"],"2022115":["http://github.com/foxglovesec/JavaUnserializeExploits"],"2022116":["http://github.com/foxglovesec/JavaUnserializeExploits"],"2022117":["http://github.com/foxglovesec/JavaUnserializeExploits"],"2022118":["http://github.com/foxglovesec/JavaUnserializeExploits"],"2022119":["http://www.threatexpert.com/report.aspx?md5=3831e58cd22cc9bdf06f18f843cdfee9","http://techhelplist.com/spam-list/974-intuit-browsers-update-malware"],"2022120":["http://www.threatexpert.com/report.aspx?md5=3831e58cd22cc9bdf06f18f843cdfee9","http://techhelplist.com/spam-list/974-intuit-browsers-update-malware"],"2022121":["http://www.threatexpert.com/report.aspx?md5=c3ae4a37094ecfe95c2badecf40bf5bb"],"2022122":["http://www.threatexpert.com/report.aspx?md5=c3ae4a37094ecfe95c2badecf40bf5bb"],"2022123":["http://www.threatexpert.com/report.aspx?md5=fa05d4f1558a9581a14936c0ab3723f7"],"2022124":["http://www.threatexpert.com/report.aspx?md5=467b786f7c645c73d5c29347d35cae11"],"2022126":["http://www.threatexpert.com/report.aspx?md5=966301e88d8a43abe1215413bfd48b09","http://damballa.com/megalodonhttp-botnet-discovered-the-shark-paradox/"],"2022127":["http://www.threatexpert.com/report.aspx?md5=966301e88d8a43abe1215413bfd48b09","http://damballa.com/megalodonhttp-botnet-discovered-the-shark-paradox/"],"2022128":["http://www.threatexpert.com/report.aspx?md5=966301e88d8a43abe1215413bfd48b09","http://damballa.com/megalodonhttp-botnet-discovered-the-shark-paradox/"],"2022129":["http://sslbl.abuse.ch"],"2022130":["http://sslbl.abuse.ch"],"2022131":["http://www.symantec.com/security_response/writeup.jsp?docid=2014-082614-0727-99&tabid=2"],"2022132":["http://www.symantec.com/security_response/writeup.jsp?docid=2014-082614-0727-99&tabid=2"],"2022133":["http://sslbl.abuse.ch"],"2022134":["http://arstechnica.com/security/2015/11/dell-does-superfish-ships-pcs-with-self-signed-root-certificates/"],"2022137":["http://www.threatexpert.com/report.aspx?md5=c9d3237885072b796e5849f7b9ec1a64","http://b0n1.blogspot.com.br/2015/11/android-malware-drops-banker-from-png.html?m=1","http://fireeye.com/blog/threat-research/2015/12/slembunk_an_evolvin.html"],"2022144":["http://b0n1.blogspot.com.br/2015/11/android-malware-drops-banker-from-png.html?m=1"],"2022146":["http://www.threatexpert.com/report.aspx?md5=9853fc1f4d7ba23d728f4ee80842faf9","http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022147":["http://www.threatexpert.com/report.aspx?md5=9853fc1f4d7ba23d728f4ee80842faf9","http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022148":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022149":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022150":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022151":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022152":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022153":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022154":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022155":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022156":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022157":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022158":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022159":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022160":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022161":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022162":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022163":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022164":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022165":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022166":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022167":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022168":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022169":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022170":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022171":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022172":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022173":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022174":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022175":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022176":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022177":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022178":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022179":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022180":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022181":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022182":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022183":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022184":["http://minerva-labs.com/#!CopyKittens-Attack-Group/c7a5/5655651e0cf20a760c4cae95"],"2022186":["http://www.threatexpert.com/report.aspx?md5=24203ba70f584b64a432fb6dad52765d"],"2022188":["http://www.threatexpert.com/report.aspx?md5=f184c13be617754e394ecb8c972c8861","http://symantec.com/connect/blogs/scarab-attackers-took-aim-select-russian-targets-2012"],"2022189":["http://blog.malwaremustdie.org/2015/11/mmd-0044-2015-source-code-disclosure.html"],"2022190":["http://blog.malwaremustdie.org/2015/11/mmd-0044-2015-source-code-disclosure.html"],"2022191":["http://www.threatexpert.com/report.aspx?md5=45683c29a36ef8a15f216d7c4b2af822"],"2022192":["http://www.threatexpert.com/report.aspx?md5=ef230777f5b34291ea22bfc3c591ce2d"],"2022194":["http://www.threatexpert.com/report.aspx?md5=837c7af7f376722a0315cb0a7cb12399"],"2022197":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022198":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022199":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022200":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022201":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022202":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022203":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022204":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022205":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022206":["http://blog.Fox-IT.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows"],"2022207":["http://www.certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=77290f994d05ad0add5768c9c040dc55"],"2022208":["http://sslbl.abuse.ch"],"2022209":["http://www.threatexpert.com/report.aspx?md5=ecda8c6613fb458102fcb6f70b1cd594","http://sslbl.abuse.ch"],"2022211":["http://sslbl.abuse.ch"],"2022212":["http://sslbl.abuse.ch"],"2022213":["http://blog.malwaremustdie.org/2015/11/mmd-0044-2015-source-code-disclosure.html"],"2022214":["http://blog.malwaremustdie.org/2015/11/mmd-0044-2015-source-code-disclosure.html"],"2022215":["http://blog.malwaremustdie.org/2015/11/mmd-0044-2015-source-code-disclosure.html"],"2022216":["http://blog.malwaremustdie.org/2015/11/mmd-0044-2015-source-code-disclosure.html"],"2022219":["http://blog.malwaremustdie.org/2015/12/mmd-0045-2015-kdefend-new-elf-threat.html"],"2022223":["http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3405&p=27363"],"2022224":["http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3405&p=27363"],"2022226":["http://sslbl.abuse.ch"],"2022227":["http://sslbl.abuse.ch"],"2022228":["http://blog.team-cymru.org/2015/06/poseidon-and-the-backoff-pos-link/"],"2022229":["http://sslbl.abuse.ch"],"2022230":["http://sslbl.abuse.ch"],"2022231":["http://sslbl.abuse.ch"],"2022232":["http://sslbl.abuse.ch"],"2022233":["http://sslbl.abuse.ch"],"2022234":["http://sslbl.abuse.ch"],"2022235":["http://sslbl.abuse.ch"],"2022240":["http://blog.imperva.com/2015/12/zero-day-attack-strikes-again-java-zero-day-vulnerability-cve-2015-4852-tracked-by-imperva.html"],"2022243":["http://github.com/stasinopoulos/commix/blob/master/README.md"],"2022244":["http://www.threatexpert.com/report.aspx?md5=a6a9e8b0432ad557245ac8ad2926ed7c"],"2022245":["http://www.threatexpert.com/report.aspx?md5=a6a9e8b0432ad557245ac8ad2926ed7c"],"2022246":["http://www.threatexpert.com/report.aspx?md5=a6a9e8b0432ad557245ac8ad2926ed7c"],"2022247":["http://sslbl.abuse.ch"],"2022248":["http://sslbl.abuse.ch"],"2022249":["http://sslbl.abuse.ch"],"2022250":["http://sslbl.abuse.ch"],"2022251":["http://sslbl.abuse.ch"],"2022252":["http://sslbl.abuse.ch"],"2022260":["http://blog.sucuri.net/2015/12/evolution-of-pseudo-darkleech.html"],"2022261":["http://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html"],"2022263":["http://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html"],"2022267":["http://sslbl.abuse.ch"],"2022268":["http://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html"],"2022269":["http://blog.airbuscybersecurity.com/post/2015/11/Newcomers-in-the-Derusbi-family"],"2022272":["http://www.fidelissecurity.com/sites/default/files/FTA_1020_Fidelis_Inocnation_FINAL.pdf"],"2022273":["http://www.fidelissecurity.com/sites/default/files/FTA_1020_Fidelis_Inocnation_FINAL.pdf"],"2022275":["http://www.threatexpert.com/report.aspx?md5=d90c0177437c4cf588de4e60ab233fe1","http://sslbl.abuse.ch"],"2022276":["http://sslbl.abuse.ch"],"2022277":["http://sslbl.abuse.ch"],"2022278":["http://sslbl.abuse.ch"],"2022279":["http://sslbl.abuse.ch"],"2022280":["http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AWin32/Nivdort"],"2022281":["http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AWin32/Nivdort"],"2022282":["http://blog.talosintel.com/2015/12/pro-pos.html"],"2022283":["http://www.threatexpert.com/report.aspx?md5=c952a88edc0766adf819b30cd2683ac7"],"2022284":["http://www.threatexpert.com/report.aspx?md5=66bbfc1e5b027eb48c76078129194015"],"2022286":["http://sslbl.abuse.ch"],"2022287":["http://sslbl.abuse.ch"],"2022288":["http://www.threatexpert.com/report.aspx?md5=c9d3237885072b796e5849f7b9ec1a64","http://www.threatexpert.com/report.aspx?md5=a83ce290469654002bcc64062c39387c","http://www.fireeye.com/blog/threat-research/2015/12/slembunk_an_evolvin.html"],"2022289":["http://www.fireeye.com/blog/threat-research/2015/12/slembunk_an_evolvin.html"],"2022290":["http://blog.sucuri.net/2015/12/evolution-of-pseudo-darkleech.html"],"2022291":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7755","http://community.rapid7.com/community/infosec/blog/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor"],"2022293":["http://sslbl.abuse.ch"],"2022295":["http://panagioto.com/webacoo-backdoor-detection"],"2022298":["http://www.threatexpert.com/report.aspx?md5=fireeye.com/blog/threat-research/2015/12/the-eps-awakens-part-two.html"],"2022299":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7755","http://kb.juniper.net/JSA10713"],"2022300":["http://www.threatexpert.com/report.aspx?md5=66bbfc1e5b027eb48c76078129194015"],"2022301":["http://sslbl.abuse.ch"],"2022302":["http://sslbl.abuse.ch"],"2022303":["http://www.threatexpert.com/report.aspx?md5=f4ee917a481e1718ccc749d2d4ceaa0e"],"2022305":["http://sslbl.abuse.ch"],"2022306":["http://sslbl.abuse.ch"],"2022307":["http://sslbl.abuse.ch"],"2022308":["http://sslbl.abuse.ch"],"2022309":["http://www.threatexpert.com/report.aspx?md5=0aa391dc6d9ebec2f5d0ee6b4a4ba1fa"],"2022310":["http://www.threatexpert.com/report.aspx?md5=8cd233d3f226cb1bf6bf15aca52e0e36","http://researchcenter.paloaltonetworks.com/2015/12/bbsrat-attacks-targeting-russian-organizations-linked-to-roaming-tiger/"],"2022311":["http://www.threatexpert.com/report.aspx?md5=8cd233d3f226cb1bf6bf15aca52e0e36","http://researchcenter.paloaltonetworks.com/2015/12/bbsrat-attacks-targeting-russian-organizations-linked-to-roaming-tiger/"],"2022321":["http://sslbl.abuse.ch"],"2022322":["http://sslbl.abuse.ch"],"2022323":["http://www.threatexpert.com/report.aspx?md5=ef5fa2378307338d4e75dece88158d77"],"2022327":["http://welivesecurity.com/2016/01/03/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industry/"],"2022328":["http://sslbl.abuse.ch"],"2022329":["http://sslbl.abuse.ch"],"2022330":["http://www.threatexpert.com/report.aspx?md5=24273ce5ca8e84c52b270b52659304a8","http://blog.emsisoft.com/2016/01/01/meet-ransom32-the-first-javascript-ransomware/"],"2022331":["http://www.threatexpert.com/report.aspx?md5=24273ce5ca8e84c52b270b52659304a8","http://blog.emsisoft.com/2016/01/01/meet-ransom32-the-first-javascript-ransomware/"],"2022332":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022333":["http://www.bleepingcomputer.com/news/security/the-cryptojoker-ransomware-is-nothing-to-laugh-about/","http://www.threatexpert.com/report.aspx?md5=904b0888bfa02d200091fa8ad014d016","http://www.threatexpert.com/report.aspx?md5=bca6c1fa9b9a8bf60eecbd91e08d1323"],"2022334":["http://www.threatexpert.com/report.aspx?md5=7b678a25c533652dbb0c2a2ac37cf1e3"],"2022335":["http://www.threatexpert.com/report.aspx?md5=312fa52a7992e58359cb68bb0f029ea7","http://blog.malwaremustdie.org/2016/01/mmd-0048-2016-ddostf-new-elf-windows.html"],"2022336":["http://blog.malwaremustdie.org/2016/01/mmd-0048-2016-ddostf-new-elf-windows.html"],"2022337":["http://www.threatexpert.com/report.aspx?md5=56bff68317a0af08f749a1c717125cf3"],"2022342":["http://www.threatexpert.com/report.aspx?md5=45f4e1bb4efd12f0e8b949174a198bf3"],"2022345":["http://www.threatexpert.com/report.aspx?md5=8dd612b14a2a448e8b1b6f3d09909e45"],"2022346":["http://www.threatexpert.com/report.aspx?md5=8dd612b14a2a448e8b1b6f3d09909e45"],"2022347":["http://www.threatexpert.com/report.aspx?md5=5b9a9e363f46f09e7f40c5cde2c90361"],"2022348":["http://blog.malwaremustdie.org/2016/01/mmd-0049-2016-case-of-java-trojan.html"],"2022349":["http://research.zscaler.com/2013/12/bitcoin-mining-operation-seen-across.html","http://blog.malwaremustdie.org/2016/01/mmd-0049-2016-case-of-java-trojan.html"],"2022352":["http://code.google.com/p/google-security-research/issues/detail?id=693"],"2022353":["http://code.google.com/p/google-security-research/issues/detail?id=693"],"2022354":["http://www.threatexpert.com/report.aspx?md5=038da581f99c88a4ee6700de440a54ca"],"2022355":["http://asert.arbornetworks.com/wp-content/uploads/2016/01/ASERT-Threat-Intelligence-Brief-Uncovering-the-Seven-Pointed-Dagger.pdf"],"2022356":["http://asert.arbornetworks.com/wp-content/uploads/2016/01/ASERT-Threat-Intelligence-Brief-Uncovering-the-Seven-Pointed-Dagger.pdf"],"2022357":["http://blog.malwaremustdie.org/2016/01/mmd-0050-2016-incident-report-elf.html"],"2022358":["http://blog.malwaremustdie.org/2016/01/mmd-0050-2016-incident-report-elf.html"],"2022359":["http://blog.malwaremustdie.org/2016/01/mmd-0050-2016-incident-report-elf.html"],"2022360":["http://asert.arbornetworks.com/wp-content/uploads/2016/01/ASERT-Threat-Intelligence-Brief-Uncovering-the-Seven-Pointed-Dagger.pdf"],"2022361":["http://asert.arbornetworks.com/wp-content/uploads/2016/01/ASERT-Threat-Intelligence-Brief-Uncovering-the-Seven-Pointed-Dagger.pdf"],"2022362":["http://www.threatexpert.com/report.aspx?md5=d579d7a42ff140952da57264614c37bc","http://asert.arbornetworks.com/wp-content/uploads/2016/01/ASERT-Threat-Intelligence-Brief-Uncovering-the-Seven-Pointed-Dagger.pdf"],"2022363":["http://www.threatexpert.com/report.aspx?md5=d579d7a42ff140952da57264614c37bc","http://asert.arbornetworks.com/wp-content/uploads/2016/01/ASERT-Threat-Intelligence-Brief-Uncovering-the-Seven-Pointed-Dagger.pdf"],"2022367":["http://www.kernelmode.info/forum/viewtopic.php?f=16&t=2747&start=20#p27639"],"2022369":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0777","http://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt"],"2022370":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0777","http://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt"],"2022371":["http://bitconjurer.org/BitTorrent/protocol.html","http://windows.microsoft.com/en-us/windows-10/windows-update-delivery-optimization-faq"],"2022373":["http://www.seancassidy.me/lostpass.html"],"2022374":["http://www.seancassidy.me/lostpass.html"],"2022385":["http://sslbl.abuse.ch"],"2022386":["http://www.threatexpert.com/report.aspx?md5=9b8fed949202b860d49f326d5e33bb35","http://sslbl.abuse.ch"],"2022387":["http://www.threatexpert.com/report.aspx?md5=9b8fed949202b860d49f326d5e33bb35","http://sslbl.abuse.ch"],"2022388":["http://www.threatexpert.com/report.aspx?md5=105213be0a168d5e3eb0e4ff0262cf12","http://sslbl.abuse.ch"],"2022389":["http://www.threatexpert.com/report.aspx?md5=105213be0a168d5e3eb0e4ff0262cf12","http://sslbl.abuse.ch"],"2022390":["http://www.threatexpert.com/report.aspx?md5=678129a67898174fdb7e8c70ebcca6c3","http://sslbl.abuse.ch"],"2022391":["http://sslbl.abuse.ch"],"2022392":["http://sslbl.abuse.ch"],"2022393":["http://sslbl.abuse.ch"],"2022394":["http://sslbl.abuse.ch"],"2022395":["http://sslbl.abuse.ch"],"2022396":["http://sslbl.abuse.ch"],"2022397":["http://sslbl.abuse.ch"],"2022401":["http://researchcenter.paloaltonetworks.com/2015/09/musical-chairs-multi-year-campaign-involving-new-variant-of-gh0st-malware/"],"2022402":["http://www.threatexpert.com/report.aspx?md5=9f8bc96c96d43ecb69f883388d228754"],"2022403":["http://www.threatexpert.com/report.aspx?md5=9f8bc96c96d43ecb69f883388d228754"],"2022404":["http://sslbl.abuse.ch"],"2022406":["http://www.threatexpert.com/report.aspx?md5=4523ccfd191dcceeae8e884f82f5c7ad","http://blog.malwarebytes.org/intelligence/2016/01/draft-lechiffre-a-manually-run-ransomware/"],"2022407":["http://www.threatexpert.com/report.aspx?md5=0dfaf7a70859ddb86296276dc20ce1ae"],"2022408":["http://sslbl.abuse.ch"],"2022411":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022412":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022413":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022414":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022415":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022416":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022417":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022418":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022419":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022420":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022421":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022422":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022423":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022424":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022425":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022426":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022427":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022428":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022429":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022430":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022431":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022432":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022433":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022434":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022435":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022436":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022437":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022438":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022439":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022440":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022441":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022442":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022443":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022444":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022445":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022446":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022447":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022448":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022449":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022450":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022451":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022452":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022453":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022455":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022456":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022457":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022458":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022459":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022460":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022461":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2022462":["http://www.threatexpert.com/report.aspx?md5=25bd222c947fcbb7e1fb9f6e176ea53f","http://securitykitten.github.io/an-evening-with-n3utrino/"],"2022463":["http://www.threatexpert.com/report.aspx?md5=25bd222c947fcbb7e1fb9f6e176ea53f","http://securitykitten.github.io/an-evening-with-n3utrino/"],"2022468":["http://www.threatexpert.com/report.aspx?md5=0e278436fb49f9ab0d1a3da792cfb0c3","http://www.fireeye.com/blog/threat-research/2016/01/centerpos_an_evolvi.html"],"2022469":["http://www.threatexpert.com/report.aspx?md5=0e278436fb49f9ab0d1a3da792cfb0c3","http://www.fireeye.com/blog/threat-research/2016/01/centerpos_an_evolvi.html"],"2022470":["http://www.threatexpert.com/report.aspx?md5=0e278436fb49f9ab0d1a3da792cfb0c3","http://www.fireeye.com/blog/threat-research/2016/01/centerpos_an_evolvi.html"],"2022471":["http://www.threatexpert.com/report.aspx?md5=0e278436fb49f9ab0d1a3da792cfb0c3","http://www.fireeye.com/blog/threat-research/2016/01/centerpos_an_evolvi.html"],"2022472":["http://www.threatexpert.com/report.aspx?md5=0e278436fb49f9ab0d1a3da792cfb0c3","http://www.fireeye.com/blog/threat-research/2016/01/centerpos_an_evolvi.html"],"2022474":["http://sslbl.abuse.ch"],"2022475":["http://sslbl.abuse.ch"],"2022476":["http://sslbl.abuse.ch"],"2022477":["http://securelist.com/blog/research/73503/from-linux-to-windows-new-family-of-cross-platform-desktop-backdoors-discovered/"],"2022478":["http://sslbl.abuse.ch"],"2022479":["http://malware-traffic-analysis.net/2016/01/26/index.html"],"2022480":["http://sslbl.abuse.ch"],"2022481":["http://blog.sucuri.net/2016/02/massive-admedia-iframe-javascript-infection.html"],"2022482":["http://certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=8bdc81393a4fcfaf6d1b8dc01486f2f0"],"2022483":["http://certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=d5c5cc9cae2e9a7a2d3a77efcb526e4c"],"2022486":["http://getgophish.com"],"2022487":["http://getgophish.com"],"2022488":["http://sslbl.abuse.ch"],"2022489":["http://sslbl.abuse.ch"],"2022491":["http://www.threatexpert.com/report.aspx?md5=ff823130efcdf8ab267cad92eb5b90d7","http://www.threatexpert.com/report.aspx?md5=e953e6b3be506c5b8ca80fbcd79c065e","http://www.threatexpert.com/report.aspx?md5=1e2fa2e401cd2295a03ba8d8d3d3698b"],"2022492":["http://www.threatexpert.com/report.aspx?md5=648f432b41f3bcebc1a599f529055cf0"],"2022494":["http://www.threatexpert.com/report.aspx?md5=8df8d0cd70f96538211c65fb6361704d"],"2022502":["http://www.threatexpert.com/report.aspx?md5=35a6de1e8dbea19bc44cf49ae0cae59e"],"2022504":["http://www.threatexpert.com/report.aspx?md5=a3440b6117f3783989683753c9f394dd"],"2022505":["http://www.threatexpert.com/report.aspx?md5=5d662258fd506b87dc5d3f8fce1ff784"],"2022506":["http://blog.exodusintel.com/2016/02/10/firewall-hacking"],"2022507":["http://www.threatexpert.com/report.aspx?md5=ff50a331feec575b505976cb0506ebfd"],"2022508":["http://sslbl.abuse.ch"],"2022509":["http://sslbl.abuse.ch"],"2022510":["http://www.threatexpert.com/report.aspx?md5=23cfdb9896cadd54f935ed4e2df2e0a4","http://sslbl.abuse.ch"],"2022511":["http://sslbl.abuse.ch"],"2022512":["http://sslbl.abuse.ch"],"2022513":["http://sslbl.abuse.ch"],"2022514":["http://sslbl.abuse.ch"],"2022515":["http://blog.exodusintel.com/2016/02/10/firewall-hacking"],"2022516":["http://blog.exodusintel.com/2016/02/10/firewall-hacking"],"2022517":["http://www.csis.dk/da/csis/blog/4818/","http://www.threatexpert.com/report.aspx?md5=111b71c120167b5b571ee5501ffef65e"],"2022518":["http://www.exploit-db.com/exploits/39437/"],"2022520":["http://www.trustedsec.com/july-2015/malicious-htas/"],"2022521":["http://sslbl.abuse.ch"],"2022522":["http://sslbl.abuse.ch"],"2022523":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0063"],"2022524":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0061"],"2022529":["http://www.threatexpert.com/report.aspx?md5=8a18846e17244db9af90009ddab341ce","http://securelist.com/blog/research/73638/apt-style-bank-robberies-increase-with-metel-gcman-and-carbanak-2-0-attacks/"],"2022531":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7547"],"2022533":["http://www.threatexpert.com/report.aspx?md5=45f4e1bb4efd12f0e8b949174a198bf3"],"2022534":["http://sslbl.abuse.ch"],"2022535":["http://sslbl.abuse.ch"],"2022536":["http://sslbl.abuse.ch"],"2022537":["http://sslbl.abuse.ch"],"2022538":["http://www.threatexpert.com/report.aspx?md5=b06d9dd17c69ed2ae75d9e40b2631b42"],"2022539":["http://www.alienvault.com/open-threat-exchange/blog/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update"],"2022540":["http://www.alienvault.com/open-threat-exchange/blog/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update"],"2022541":["http://www.alienvault.com/open-threat-exchange/blog/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update"],"2022542":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7547"],"2022543":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7547"],"2022544":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7547"],"2022545":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7547"],"2022546":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7547"],"2022547":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7547"],"2022548":["http://www.threatexpert.com/report.aspx?md5=b06d9dd17c69ed2ae75d9e40b2631b42"],"2022552":["http://threatstream.com/blog/three-month-frameworkpos-malware-campaign-nabs-43000-credits-cards-from-point-of-sale-systems","http://www.threatexpert.com/report.aspx?md5=591e820591e10500fe939d6bd50e6776"],"2022553":["http://sslbl.abuse.ch"],"2022554":["http://labs.bluefrostsecurity.de/advisories/bfs-sa-2016-001/"],"2022555":["http://blog.linuxmint.com/?p=2994"],"2022556":["http://blog.linuxmint.com/?p=2994"],"2022557":["http://blog.linuxmint.com/?p=2994"],"2022558":["http://blog.linuxmint.com/?p=2994"],"2022559":["http://threatstream.com/blog/three-month-frameworkpos-malware-campaign-nabs-43000-credits-cards-from-point-of-sale-systems","http://www.threatexpert.com/report.aspx?md5=591e820591e10500fe939d6bd50e6776"],"2022560":["http://www.hybrid-analysis.com/sample/02b21d4a90a2a50506711a9c120b1e51f77084eba25688f7db2b9571037465dc?environmentId=1"],"2022562":["http://www.threatexpert.com/report.aspx?md5=58fed8b5b549be7ecbfbc6c63b84a728"],"2022563":["http://www.threatexpert.com/report.aspx?md5=8d260ab2bb36aeaf5b033b80b6bc1e6a"],"2022564":["http://securelist.com/blog/incidents/73914/operation-blockbuster-revealed/","http://www.operationblockbuster.com/resources/index.html"],"2022568":["http://www.threatexpert.com/report.aspx?md5=b6d25a5629221041e857266b9188ea3b"],"2022569":["http://www.threatexpert.com/report.aspx?md5=b6d25a5629221041e857266b9188ea3b"],"2022571":["http://sslbl.abuse.ch"],"2022578":["http://proofpoint.com/us/threat-insight/post/Obfuscation-Techniques-In-Phishing-Attacks"],"2022579":["http://isc.sans.edu/diary/Quick+Analysis+of+a+Recent+MySQL+Exploit/20781"],"2022580":["http://isc.sans.edu/diary/Quick+Analysis+of+a+Recent+MySQL+Exploit/20781"],"2022581":["http://isc.sans.edu/diary/Quick+Analysis+of+a+Recent+MySQL+Exploit/20781"],"2022582":["http://www.threatexpert.com/report.aspx?md5=d19261cf449afc52532028cca110eb36"],"2022583":["http://drownattack.com/drown-attack-paper.pdf"],"2022584":["http://drownattack.com/drown-attack-paper.pdf"],"2022585":["http://drownattack.com/drown-attack-paper.pdf"],"2022587":["http://drownattack.com/drown-attack-paper.pdf"],"2022588":["http://drownattack.com/drown-attack-paper.pdf"],"2022596":["http://blog.sucuri.net/2016/03/when-wordpress-plugin-goes-bad.html"],"2022597":["http://proofpoint.com/us/threat-insight/post/Obfuscation-Techniques-In-Phishing-Attacks"],"2022598":["http://researchcenter.paloaltonetworks.com/2016/03/new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer"],"2022599":["http://researchcenter.paloaltonetworks.com/2016/03/new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer"],"2022600":["http://researchcenter.paloaltonetworks.com/2016/03/new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer"],"2022601":["http://researchcenter.paloaltonetworks.com/2016/03/new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer/"],"2022604":["http://welivesecurity.com/2016/03/07/beware-spear-phishers-hijack-website/"],"2022609":["http://www.threatexpert.com/report.aspx?md5=17bd012f145bba62b4e58b376d8002d3"],"2022610":["http://citizenlab.org/2016/03/shifting-tactics/"],"2022611":["http://citizenlab.org/2016/03/shifting-tactics/"],"2022612":["http://citizenlab.org/2016/03/shifting-tactics/"],"2022623":["http://sslbl.abuse.ch"],"2022624":["http://sslbl.abuse.ch"],"2022626":["http://symantec.com/security_response/earthlink_writeup.jsp?docid=2015-120123-5521-99"],"2022627":["http://sslbl.abuse.ch"],"2022634":["http://www.threatexpert.com/report.aspx?md5=74add6536cdcfb8b77d10a1e7be6b9ef"],"2022644":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022645":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022646":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2022650":["http://www.threatexpert.com/report.aspx?md5=2f32bf996e093d5a4107d6daa6c51ec4"],"2022654":["http://www.threatexpert.com/report.aspx?md5=479306863946029e545a4803b303d74c"],"2022655":["http://www.threatexpert.com/report.aspx?md5=ca6208a4dd3f1f846aaaf4a6cbcc66ea"],"2022656":["http://www.threatexpert.com/report.aspx?md5=ca6208a4dd3f1f846aaaf4a6cbcc66ea"],"2022657":["http://www.threatexpert.com/report.aspx?md5=ca6208a4dd3f1f846aaaf4a6cbcc66ea"],"2022660":["http://ransomwaretracker.abuse.ch"],"2022661":["http://ransomwaretracker.abuse.ch"],"2022662":["http://ransomwaretracker.abuse.ch"],"2022663":["http://ransomwaretracker.abuse.ch"],"2022664":["http://ransomwaretracker.abuse.ch"],"2022665":["http://www.threatexpert.com/report.aspx?md5=042b2e41a14b67570a993ef909621954"],"2022675":["http://www.threatexpert.com/report.aspx?md5=c5c4f4860c69ea7469ca3be3caf5bf18"],"2022676":["http://www.threatexpert.com/report.aspx?md5=c5c4f4860c69ea7469ca3be3caf5bf18"],"2022677":["http://www.threatexpert.com/report.aspx?md5=c5c4f4860c69ea7469ca3be3caf5bf18"],"2022678":["http://www.threatexpert.com/report.aspx?md5=c5c4f4860c69ea7469ca3be3caf5bf18"],"2022679":["http://www.threatexpert.com/report.aspx?md5=a050a1e9fa0fe0e01cfbf14ead388c4e"],"2022681":["http://www.threatexpert.com/report.aspx?md5=070e9a317ee53ac3814eb86bc7d5bf49","http://isc.sans.edu/forums/diary/How+Malware+Generates+Mutex+Names+to+Evade+Detection/19429/"],"2022683":["http://www.threatexpert.com/report.aspx?md5=5bb7d85f7a5f1d2b01efabe5635e2992"],"2022684":["http://sslbl.abuse.ch"],"2022685":["http://sslbl.abuse.ch"],"2022686":["http://www.threatexpert.com/report.aspx?md5=d599a63fac0640c21272099f39020fac"],"2022688":["http://www.threatexpert.com/report.aspx?md5=e7205c0b80035b629d80b5e7aeff7b0e","http://symantec.com/connect/blogs/taiwan-targeted-new-cyberespionage-back-door-trojan"],"2022689":["http://www.threatexpert.com/report.aspx?md5=e7205c0b80035b629d80b5e7aeff7b0e","http://symantec.com/connect/blogs/taiwan-targeted-new-cyberespionage-back-door-trojan"],"2022692":["http://certego.net/en/news/italian-spam-campaigns-using-js-nemucod-downloader/","http://www.threatexpert.com/report.aspx?md5=c5ad81d8d986c92f90d0462bc06ac9c6"],"2022693":["http://bugs.chromium.org/p/project-zero/issues/detail?id=773"],"2022694":["http://www.threatexpert.com/report.aspx?md5=84fcdf1cd6dc3ee71686835f9489752c"],"2022698":["http://pierrekim.github.io/blog/2016-04-04-quanta-lte-routers-vulnerabilities.html"],"2022699":["http://pierrekim.github.io/blog/2016-04-04-quanta-lte-routers-vulnerabilities.html"],"2022700":["http://pierrekim.github.io/blog/2016-04-04-quanta-lte-routers-vulnerabilities.html"],"2022701":["http://pierrekim.github.io/blog/2016-04-04-quanta-lte-routers-vulnerabilities.html"],"2022702":["http://ransomwaretracker.abuse.ch"],"2022704":["http://ransomwaretracker.abuse.ch"],"2022705":["http://ransomwaretracker.abuse.ch"],"2022706":["http://ransomwaretracker.abuse.ch"],"2022712":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-2345","http://www.securifera.com/blog/2016/04/03/fun-with-remote-controllers-dameware-mini-remote-control-cve-2016-2345"],"2022713":["http://sslbl.abuse.ch","http://www.threatexpert.com/report.aspx?md5=3d8d1a65ce53c6ac2e43523e82a6d471"],"2022714":["http://sslbl.abuse.ch"],"2022715":["http://ransomwaretracker.abuse.ch"],"2022716":["http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf","http://www.threatexpert.com/report.aspx?md5=85846678ad4dbff608f2e51bb0589a16"],"2022717":["http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf","http://www.threatexpert.com/report.aspx?md5=85846678ad4dbff608f2e51bb0589a16"],"2022718":["http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf","http://www.threatexpert.com/report.aspx?md5=85846678ad4dbff608f2e51bb0589a16"],"2022719":["http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf","http://www.threatexpert.com/report.aspx?md5=85846678ad4dbff608f2e51bb0589a16"],"2022720":["http://ransomwaretracker.abuse.ch"],"2022721":["http://ransomwaretracker.abuse.ch"],"2022722":["http://blog.malwarebytes.org/cybercrime/2016/01/trojan-dnschanger-circumvents-powershell-restrictions/"],"2022723":["http://www.threatexpert.com/report.aspx?md5=3ea75d62966f8c52de16d7849eeb3691"],"2022726":["http://ransomwaretracker.abuse.ch"],"2022727":["http://ransomwaretracker.abuse.ch"],"2022728":["http://ransomwaretracker.abuse.ch"],"2022731":["http://ransomwaretracker.abuse.ch"],"2022733":["http://sslbl.abuse.ch"],"2022734":["http://sslbl.abuse.ch"],"2022735":["http://sslbl.abuse.ch"],"2022736":["http://sslbl.abuse.ch"],"2022737":["http://www.threatexpert.com/report.aspx?md5=57a69d5130d32da0a278c72137ca58ee"],"2022738":["http://www.us-cert.gov/ncas/alerts/TA16-105A"],"2022746":["http://ransomwaretracker.abuse.ch"],"2022747":["http://fireeye.com/blog/threat-research/2016/04/ghosts_in_the_endpoi.html"],"2022748":["http://ransomwaretracker.abuse.ch"],"2022749":["http://www.threatexpert.com/report.aspx?md5=d579d7a42ff140952da57264614c37bc","http://citizenlab.org/2016/04/between-hong-kong-and-burma"],"2022750":["http://citizenlab.org/2016/04/between-hong-kong-and-burma"],"2022753":["http://researchcenter.paloaltonetworks.com/2016/04/unit42-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activists/"],"2022754":["http://www.threatexpert.com/report.aspx?md5=70adf5506c767590e11bdc473c91bb38"],"2022755":["http://ransomwaretracker.abuse.ch"],"2022756":["http://www.threatexpert.com/report.aspx?md5=24d76abbc0a10e4c977a28b33c879248","http://baesystemsai.blogspot.com/2016/04/two-bytes-to-951m.html"],"2022757":["http://www.threatexpert.com/report.aspx?md5=24d76abbc0a10e4c977a28b33c879248","http://baesystemsai.blogspot.com/2016/04/two-bytes-to-951m.html"],"2022758":["http://sans.org/reading-room/whitepapers/malicious/analyzing-backdoor-bot-mips-platform-35902"],"2022759":["http://blog.fortinet.com/post/over-100-000-south-korean-users-affected-by-blackmoon-campaign","http://www.threatexpert.com/report.aspx?md5=bbcbd3dc203829c9cdbf7d1b057f0e79"],"2022760":["http://vms.drweb.com/virus/?i=4656268"],"2022761":["http://ransomwaretracker.abuse.ch"],"2022762":["http://ransomwaretracker.abuse.ch"],"2022763":["http://ransomwaretracker.abuse.ch"],"2022764":["http://isc.sans.edu/diary/Retefe+is+back+in+town/20957"],"2022765":["http://isc.sans.edu/diary/Retefe+is+back+in+town/20957"],"2022766":["http://isc.sans.edu/diary/Retefe+is+back+in+town/20957"],"2022767":["http://isc.sans.edu/diary/Retefe+is+back+in+town/20957"],"2022768":["http://isc.sans.edu/diary/Retefe+is+back+in+town/20957"],"2022769":["http://www.threatexpert.com/report.aspx?md5=042b2e41a14b67570a993ef909621954"],"2022770":["http://research.zscaler.com/2016/01/music-themed-malvertising-lead-to-angler.html"],"2022771":["http://research.zscaler.com/2016/01/music-themed-malvertising-lead-to-angler.html"],"2022772":["http://researchcenter.paloaltonetworks.com/2016/03/unit42-campaign-evolution-darkleech-to-pseudo-darkleech-and-beyond/"],"2022773":["http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=ba6eaf301344de6fe1e079fa960bc698"],"2022775":["http://webmeup.com/about.html"],"2022776":["http://blog.sucuri.net/2015/04/magento-shoplift-supee-5344-exploits-in-the-wild.html","http://packetstormsecurity.com/files/133327/Magento-Add-Administrator-Account.html"],"2022777":["http://ransomwaretracker.abuse.ch"],"2022778":["http://ransomwaretracker.abuse.ch"],"2022780":["http://www.threatexpert.com/report.aspx?md5=ffc984ddd4812bcae414903bf54c5e74","http://www.threatexpert.com/report.aspx?md5=f2d1b3c9fc77d50e8cfabde28e0ebfd8","http://www.forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf"],"2022781":["http://www.threatexpert.com/report.aspx?md5=ffc984ddd4812bcae414903bf54c5e74","http://www.threatexpert.com/report.aspx?md5=f2d1b3c9fc77d50e8cfabde28e0ebfd8","http://www.forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf"],"2022782":["http://www.threatexpert.com/report.aspx?md5=ffc984ddd4812bcae414903bf54c5e74","http://www.threatexpert.com/report.aspx?md5=f2d1b3c9fc77d50e8cfabde28e0ebfd8","http://www.forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf"],"2022783":["http://www.threatexpert.com/report.aspx?md5=ffc984ddd4812bcae414903bf54c5e74","http://www.threatexpert.com/report.aspx?md5=f2d1b3c9fc77d50e8cfabde28e0ebfd8","http://www.forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf"],"2022784":["http://www.threatexpert.com/report.aspx?md5=ffc984ddd4812bcae414903bf54c5e74","http://www.threatexpert.com/report.aspx?md5=f2d1b3c9fc77d50e8cfabde28e0ebfd8","http://www.forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf"],"2022785":["http://www.threatexpert.com/report.aspx?md5=ffc984ddd4812bcae414903bf54c5e74","http://www.threatexpert.com/report.aspx?md5=f2d1b3c9fc77d50e8cfabde28e0ebfd8","http://www.forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf"],"2022786":["http://www.threatexpert.com/report.aspx?md5=ffc984ddd4812bcae414903bf54c5e74","http://www.threatexpert.com/report.aspx?md5=f2d1b3c9fc77d50e8cfabde28e0ebfd8","http://www.forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf"],"2022787":["http://www.threatexpert.com/report.aspx?md5=ffc984ddd4812bcae414903bf54c5e74","http://www.threatexpert.com/report.aspx?md5=f2d1b3c9fc77d50e8cfabde28e0ebfd8","http://www.forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf"],"2022788":["http://forcepoint.com/sites/default/files/resources/files/report_jaku_analysis_of_botnet_campaign_en_0.pdf"],"2022795":["http://sslbl.abuse.ch"],"2022796":["http://sslbl.abuse.ch"],"2022798":["http://www.threatexpert.com/report.aspx?md5=d59a27b1e0a46cc185f1937ca42f300a","http://blog.trendmicro.com/trendlabs-security-intelligence/chinese-language-ransomware-makes-appearance/"],"2022800":["http://ransomwaretracker.abuse.ch"],"2022801":["http://ransomwaretracker.abuse.ch"],"2022804":["http://www.threatexpert.com/report.aspx?md5=99d614964eafe83ec4ed1a4537be35b9"],"2022806":["http://nakedsecurity.sophos.com/2016/02/17/locky-ransomware-what-you-need-to-know/"],"2022807":["http://www.threatexpert.com/report.aspx?md5=0a6a0baf77b80706cab665754ecadac9"],"2022811":["http://www.threatexpert.com/report.aspx?md5=39519ff5bddd6d0eee032232349fe0a6"],"2022812":["http://www.threatexpert.com/report.aspx?md5=4dae2a394b792c36936a88cfc296f9b9"],"2022813":["http://www.threatexpert.com/report.aspx?md5=34e2350c2ed6a9a9e9d444102ae4dd87"],"2022814":["http://www.threatexpert.com/report.aspx?md5=069ce8c2a553f9bc5a9599d7541943ce"],"2022815":["http://blog.cloudflare.com/the-sleepy-user-agent/"],"2022816":["http://blog.cloudflare.com/the-sleepy-user-agent/"],"2022818":["http://www.threatexpert.com/report.aspx?md5=ad4045887298439f5a21700bdbc7a311"],"2022819":["http://raw.githubusercontent.com/exodusintel/disclosures/master/CVE_2016_1287_PoC"],"2022820":["http://github.com/exodusintel/disclosures/blob/master/CVE_2016_1287_PoC"],"2022826":["http://www.threatexpert.com/report.aspx?md5=1785f9784cb4e7400ed6f2c8f0e421c2"],"2022827":["http://www.threatexpert.com/report.aspx?md5=4f7f497668e3e716a6f4a53af0924a25"],"2022829":["http://www.threatexpert.com/report.aspx?md5=3e464cff8690c7a2f57542688a278c62"],"2022830":["http://www.threatexpert.com/report.aspx?md5=f29a3564b386e7899f45ed5155d16a96"],"2022831":["http://www.bleepingcomputer.com/forums/t/614456/bloccato-ransomware-bloccato-help-support-leggi-questo-filetxt/","http://www.threatexpert.com/report.aspx?md5=e586f208a724ba84369b72bc43d92057"],"2022832":["http://ransomwaretracker.abuse.ch"],"2022834":["http://www.threatexpert.com/report.aspx?md5=c6747ca29d5c28f4349a5a8343d6b025"],"2022835":["http://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html"],"2022836":["http://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html"],"2022837":["http://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html"],"2022842":["http://www.threatexpert.com/report.aspx?md5=985eba97e12c3e5bce9221631fb66d68","http://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/"],"2022843":["http://ransomwaretracker.abuse.ch"],"2022844":["http://www.threatexpert.com/report.aspx?md5=53859b74ab0ed0e98065982462f4e575"],"2022845":["http://www.threatexpert.com/report.aspx?md5=c90a8039f330ba6660a91113f6c53685"],"2022846":["http://seclists.org/oss-sec/2016/q2/432","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-5118"],"2022847":["http://seclists.org/oss-sec/2016/q2/432","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-5118"],"2022848":["http://seclists.org/oss-sec/2016/q2/432","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-5118"],"2022849":["http://seclists.org/oss-sec/2016/q2/432","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-5118"],"2022850":["http://www.threatexpert.com/report.aspx?md5=6b58b3eb9bbb0f7297a2e36e615506d3"],"2022851":["http://www.threatexpert.com/report.aspx?md5=7a7776473db6e4b6ac90a4b1da4b50d4"],"2022852":["http://www.threatexpert.com/report.aspx?md5=7a7776473db6e4b6ac90a4b1da4b50d4"],"2022860":["http://pluginvulnerabilities.com/2016/05/31/aribitrary-file-upload-vulnerability-in-wp-mobile-detector/"],"2022862":["http://documents.trendmicro.com/assets/fastPOS-quick-and-easy-credit-card-theft.pdf"],"2022863":["http://documents.trendmicro.com/assets/fastPOS-quick-and-easy-credit-card-theft.pdf"],"2022864":["http://documents.trendmicro.com/assets/fastPOS-quick-and-easy-credit-card-theft.pdf"],"2022865":["http://documents.trendmicro.com/assets/fastPOS-quick-and-easy-credit-card-theft.pdf"],"2022866":["http://documents.trendmicro.com/assets/fastPOS-quick-and-easy-credit-card-theft.pdf"],"2022867":["http://documents.trendmicro.com/assets/fastPOS-quick-and-easy-credit-card-theft.pdf"],"2022868":["http://sslbl.abuse.ch"],"2022870":["http://ransomwaretracker.abuse.ch"],"2022871":["http://documents.trendmicro.com/assets/fastPOS-quick-and-easy-credit-card-theft.pdf"],"2022872":["http://documents.trendmicro.com/assets/fastPOS-quick-and-easy-credit-card-theft.pdf"],"2022873":["http://www.threatexpert.com/report.aspx?md5=050f04ed78e96418179228272998d87d"],"2022875":["http://www.threatexpert.com/report.aspx?md5=5ee28035c56c048580c64b67ec4f2124"],"2022877":["http://sslbl.abuse.ch"],"2022878":["http://sslbl.abuse.ch"],"2022879":["http://sslbl.abuse.ch"],"2022880":["http://sslbl.abuse.ch"],"2022881":["http://www.threatexpert.com/report.aspx?md5=cf178c55c0572d8fea89137c62afdc98","http://labsblog.f-secure.com/2016/06/07/qarallax-rat-spying-on-us-visa-applicants/"],"2022882":["http://www.threatexpert.com/report.aspx?md5=cf178c55c0572d8fea89137c62afdc98","http://labsblog.f-secure.com/2016/06/07/qarallax-rat-spying-on-us-visa-applicants/"],"2022883":["http://www.threatexpert.com/report.aspx?md5=cf178c55c0572d8fea89137c62afdc98","http://labsblog.f-secure.com/2016/06/07/qarallax-rat-spying-on-us-visa-applicants/"],"2022884":["http://www.threatexpert.com/report.aspx?md5=c321f38862a24dc8a72a251616b3afdf"],"2022885":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=984ec607cbaefdd2ce977c9a07a3e175"],"2022886":["http://www.threatexpert.com/report.aspx?md5=d1082e445f932938366a449631b82946","http://www.threatexpert.com/report.aspx?md5=33d7a82fe13c9737a103bcc4a21f9425","http://www.threatexpert.com/report.aspx?md5=ebe1aeb5dd692b222f8cf964e7785a55"],"2022888":["http://www.threatexpert.com/report.aspx?md5=e89ff40a8832cd27d2aae48ff7cd67d2","http://malware-traffic-analysis.net/2016/06/09/index2.html"],"2022889":["http://www.threatexpert.com/report.aspx?md5=e89ff40a8832cd27d2aae48ff7cd67d2","http://malware-traffic-analysis.net/2016/06/09/index2.html"],"2022893":["http://www.threatexpert.com/report.aspx?md5=d15069e44ec849ab26bcefffe6867f10","http://www.threatexpert.com/report.aspx?md5=4ececc2f027a096c2100ec1125d0d151"],"2022897":["http://www.threatexpert.com/report.aspx?md5=7efb738c2b04aacdd3354d590cb3df47"],"2022899":["http://www.threatexpert.com/report.aspx?md5=535494aa6ce3ccef7346b548da5061a9"],"2022900":["http://blog.fox-it.com/2016/06/15/mofang-a-politically-motivated-information-stealing-adversary/"],"2022901":["http://blog.fox-it.com/2016/06/15/mofang-a-politically-motivated-information-stealing-adversary/"],"2022902":["http://blog.fox-it.com/2016/06/15/mofang-a-politically-motivated-information-stealing-adversary/"],"2022903":["http://blog.fox-it.com/2016/06/15/mofang-a-politically-motivated-information-stealing-adversary/"],"2022906":["http://www.threatexpert.com/report.aspx?md5=fb279dc7e47adefb3a9f1c78297c5870","http://www.bleepingcomputer.com/forums/t/618055/towerweb-ransomware-help-support-topic-payment-instructionsjpg/"],"2022907":["http://sslbl.abuse.ch"],"2022908":["http://sslbl.abuse.ch"],"2022913":["http://tools.ietf.org/html/draft-ietf-wrec-wpad-01","http://ietf.org/rfc/rfc1002.txt"],"2022914":["http://tools.ietf.org/html/draft-ietf-wrec-wpad-01","http://ietf.org/rfc/rfc1002.txt"],"2022919":["http://sslbl.abuse.ch"],"2022920":["http://sslbl.abuse.ch"],"2022921":["http://sslbl.abuse.ch"],"2022922":["http://sslbl.abuse.ch"],"2022923":["http://bugs.chromium.org/p/project-zero/issues/detail?id=823&q="],"2022924":["http://bugs.chromium.org/p/project-zero/issues/detail?id=823&q="],"2022929":["http://www.threatexpert.com/report.aspx?md5=d236fcc8789f94f085137058311e848b","http://blog.malwarebytes.com/threat-analysis/2016/06/satana-ransomware"],"2022932":["http://bugs.chromium.org/p/project-zero/issues/detail?id=823&q="],"2022933":["http://bugs.chromium.org/p/project-zero/issues/detail?id=823&q="],"2022935":["http://bugs.chromium.org/p/project-zero/issues/detail?id=823&q="],"2022936":["http://bugs.chromium.org/p/project-zero/issues/detail?id=823&q="],"2022937":["http://bugs.chromium.org/p/project-zero/issues/detail?id=823&q="],"2022938":["http://bugs.chromium.org/p/project-zero/issues/detail?id=823&q="],"2022939":["http://www.threatexpert.com/report.aspx?md5=62e7a146079f99ded1a6b8f2db08ad18"],"2022940":["http://www.threatexpert.com/report.aspx?md5=a27bb6ac49f890bbdb97d939ccaa5956"],"2022941":["http://www.threatexpert.com/report.aspx?md5=62e7a146079f99ded1a6b8f2db08ad18"],"2022942":["http://www.threatexpert.com/report.aspx?md5=62e7a146079f99ded1a6b8f2db08ad18"],"2022943":["http://sslbl.abuse.ch"],"2022944":["http://sslbl.abuse.ch"],"2022945":["http://sslbl.abuse.ch"],"2022946":["http://sslbl.abuse.ch"],"2022948":["http://sslbl.abuse.ch"],"2022950":["http://welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials"],"2022951":["http://welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials"],"2022952":["http://www.threatexpert.com/report.aspx?md5=6f8987e28fed878d08858a943e7c6e7c"],"2022953":["http://welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials"],"2022959":["http://sslbl.abuse.ch"],"2022961":["http://sslbl.abuse.ch"],"2022963":["http://sentinelone.com/blogs/sfg-furtims-parent/"],"2022965":["http://blogs.mcafee.com/mcafee-labs/patch-now-simple-office-protected-view-bypass-could-have-big-impact/"],"2022966":["http://blogs.mcafee.com/mcafee-labs/patch-now-simple-office-protected-view-bypass-could-have-big-impact/"],"2022968":["http://www.threatexpert.com/report.aspx?md5=926a8d1c842964b2b81f5f94f6ae73b1","http://blog.talosintel.com/2016/07/ranscam.html"],"2022969":["http://www.threatexpert.com/report.aspx?md5=e17b1d84da1d2c684f3e67adff7ef582"],"2022970":["http://www.threatexpert.com/report.aspx?md5=e17b1d84da1d2c684f3e67adff7ef582"],"2022971":["http://theori.io/research/cve-2016-0189","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0189"],"2022972":["http://theori.io/research/cve-2016-0189","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0189"],"2022973":["http://www.kali.org"],"2022975":["http://www.threatexpert.com/report.aspx?md5=3c52de547353d94e95cde7d4c219ccac"],"2022976":["http://recordedfuture.com/web-shell-analysis-part-2"],"2022977":["http://www.recordedfuture.com/web-shell-analysis-part-2"],"2022982":["http://www.threatexpert.com/report.aspx?md5=848720742b957d27f6ee94b9fe4126f0","http://www.fireeye.com/blog/threat-research/2016/06/resurrection-of-the-evil-miner.html"],"2022983":["http://www.threatexpert.com/report.aspx?md5=82fb5101847e734dd9b36f51f1fc73e3"],"2022985":["http://www.threatexpert.com/report.aspx?md5=d7c19ba47401f69aafed551138ad7e7c"],"2022986":["http://www.threatexpert.com/report.aspx?md5=d7c19ba47401f69aafed551138ad7e7c"],"2022987":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2022988":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Ransom%3aWin32/Pottieq.A","http://www.threatexpert.com/report.aspx?md5=909bce4dea2ca76cab87ce186d9cdfdc"],"2022989":["http://bugs.chromium.org/p/project-zero/issues/detail?id=884"],"2022999":["http://ransomwaretracker.abuse.ch"],"2023000":["http://ransomwaretracker.abuse.ch"],"2023001":["http://ransomwaretracker.abuse.ch"],"2023002":["http://ransomwaretracker.abuse.ch"],"2023003":["http://ransomwaretracker.abuse.ch"],"2023004":["http://ransomwaretracker.abuse.ch"],"2023005":["http://sslbl.abuse.ch"],"2023006":["http://sslbl.abuse.ch"],"2023007":["http://sslbl.abuse.ch"],"2023008":["http://sslbl.abuse.ch"],"2023009":["http://sslbl.abuse.ch"],"2023010":["http://sslbl.abuse.ch"],"2023011":["http://sslbl.abuse.ch"],"2023012":["http://sslbl.abuse.ch"],"2023013":["http://sslbl.abuse.ch"],"2023016":["http://lists.emergingthreats.net/pipermail/emerging-sigs/2016-August/027524.html"],"2023019":["http://lists.emergingthreats.net/pipermail/emerging-sigs/2016-August/027524.html"],"2023020":["http://securelist.com/analysis/publications/75533/faq-the-projectsauron-apt","http://www.symantec.com/connect/blogs/strider-cyberespionage-group-turns-eye-sauron-targets"],"2023021":["http://securelist.com/analysis/publications/75533/faq-the-projectsauron-apt","http://www.symantec.com/connect/blogs/strider-cyberespionage-group-turns-eye-sauron-targets"],"2023022":["http://securelist.com/analysis/publications/75533/faq-the-projectsauron-apt","http://www.symantec.com/connect/blogs/strider-cyberespionage-group-turns-eye-sauron-targets"],"2023023":["http://securelist.com/analysis/publications/75533/faq-the-projectsauron-apt"],"2023024":["http://securelist.com/analysis/publications/75533/faq-the-projectsauron-apt","http://www.symantec.com/connect/blogs/strider-cyberespionage-group-turns-eye-sauron-targets"],"2023025":["http://securelist.com/analysis/publications/75533/faq-the-projectsauron-apt","http://www.symantec.com/connect/blogs/strider-cyberespionage-group-turns-eye-sauron-targets"],"2023026":["http://securelist.com/analysis/publications/75533/faq-the-projectsauron-apt","http://www.symantec.com/connect/blogs/strider-cyberespionage-group-turns-eye-sauron-targets"],"2023027":["http://securelist.com/analysis/publications/75533/faq-the-projectsauron-apt","http://www.symantec.com/connect/blogs/strider-cyberespionage-group-turns-eye-sauron-targets"],"2023028":["http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A"],"2023029":["http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A"],"2023030":["http://sslbl.abuse.ch"],"2023031":["http://sslbl.abuse.ch"],"2023032":["http://securelist.com/analysis/publications/75533/faq-the-projectsauron-apt","http://www.symantec.com/connect/blogs/strider-cyberespionage-group-turns-eye-sauron-targets"],"2023033":["http://www.threatexpert.com/report.aspx?md5=9d6b99e87faa3f7a23adef5031bd598b","http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Trojan%3aWin32%2fRadonskra.B"],"2023034":["http://www.threatexpert.com/report.aspx?md5=86ac68e5b09d1c4b157193bb6cb34007","http://vms.drweb.com/virus/?_is=1&i=8400817"],"2023035":["http://www.threatexpert.com/report.aspx?md5=86ac68e5b09d1c4b157193bb6cb34007","http://vms.drweb.com/virus/?_is=1&i=8400817"],"2023047":["http://www.threatexpert.com/report.aspx?md5=ba42e59213f10f5c1bd70ce4813f25d1"],"2023049":["http://www.threatexpert.com/report.aspx?md5=f32c5a923393a2ae2fcd292f299b63b1","http://blogs.forcepoint.com/security-labs/monsoon-analysis-apt-campaign"],"2023050":["http://www.threatexpert.com/report.aspx?md5=f32c5a923393a2ae2fcd292f299b63b1","http://blogs.forcepoint.com/security-labs/monsoon-analysis-apt-campaign"],"2023053":["http://twitter.com/sempersecurus/status/763749835421941760","http://pastebin.com/LzubgtVb"],"2023054":["http://twitter.com/sempersecurus/status/763749835421941760","http://pastebin.com/LzubgtVb"],"2023059":["http://researchcenter.paloaltonetworks.com/2016/08/unit42-fresh-baked-homekit-made-cookles-with-a-darkhotel-overlap/"],"2023060":["http://researchcenter.paloaltonetworks.com/2016/08/unit42-fresh-baked-homekit-made-cookles-with-a-darkhotel-overlap/"],"2023070":["http://xorcatt.wordpress.com/2016/08/16/equationgroup-tool-leak-extrabacon-demo/"],"2023071":["http://xorcatt.wordpress.com/2016/08/16/equationgroup-tool-leak-extrabacon-demo/"],"2023076":["http://www.threatexpert.com/report.aspx?md5=ae2b5bd70945b1622fb27496ec9e15fe","http://researchcenter.paloaltonetworks.com/2016/08/unit42-aveo-malware-family-targets-japanese-speaking-users/"],"2023077":["http://www.threatexpert.com/report.aspx?md5=ae2b5bd70945b1622fb27496ec9e15fe","http://researchcenter.paloaltonetworks.com/2016/08/unit42-aveo-malware-family-targets-japanese-speaking-users/"],"2023078":["http://www.threatexpert.com/report.aspx?md5=ae2b5bd70945b1622fb27496ec9e15fe","http://researchcenter.paloaltonetworks.com/2016/08/unit42-aveo-malware-family-targets-japanese-speaking-users/"],"2023081":["http://www.threatexpert.com/report.aspx?md5=blog.trendmicro.com/trendlabs-security-intelligence/banker-trojan-sports-new-technique-to-take-advantage-of-2016-olympics/","http://www.threatexpert.com/report.aspx?md5=bd389eb9cf03e55013eaf07970288f08"],"2023082":["http://www.threatexpert.com/report.aspx?md5=blog.trendmicro.com/trendlabs-security-intelligence/banker-trojan-sports-new-technique-to-take-advantage-of-2016-olympics/","http://www.threatexpert.com/report.aspx?md5=260a7aab3d29ed4bce9ac35002361a87"],"2023083":["http://www.threatexpert.com/report.aspx?md5=0601d824d188a42bc530f349926f1f95","http://www.threatexpert.com/report.aspx?md5=900cacbd18f1e21cf6b5a9f842c23b72","http://www.bleepingcomputer.com/news/security/new-alfa-or-alpha-ransomware-from-the-same-devs-as-cerber/"],"2023084":["http://www.threatexpert.com/report.aspx?md5=d7cb55e90dee7777fe7b77b079d51513"],"2023085":["http://www.threatexpert.com/report.aspx?md5=a38e156b5c7b337ffbde6cc1ddab1004","http://blog.trendmicro.com/trendlabs-security-intelligence/r980-ransomware-disposable-email-service/"],"2023086":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6366"],"2023087":["http://blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscan-elf-worm-that.html","http://vms.drweb.com/virus/?_is=1&i=7299536"],"2023088":["http://blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscan-elf-worm-that.html","http://vms.drweb.com/virus/?_is=1&i=7299536"],"2023089":["http://blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscan-elf-worm-that.html","http://vms.drweb.com/virus/?_is=1&i=7299536"],"2023090":["http://blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscan-elf-worm-that.html","http://vms.drweb.com/virus/?_is=1&i=7299536"],"2023091":["http://www.threatexpert.com/report.aspx?md5=d4f949f268d00522cfbae5d18cbce933"],"2023093":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023094":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023095":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023096":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023097":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023098":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023099":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023100":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023101":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023102":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023103":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023104":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023105":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023106":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023107":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023108":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023109":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023110":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023111":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023112":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023113":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023114":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023115":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023116":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023117":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023118":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023119":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023120":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023121":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023122":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023123":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023124":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023125":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023126":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023127":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023128":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023129":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023130":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023131":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023132":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023133":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023134":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023136":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"],"2023138":["http://www.threatexpert.com/report.aspx?md5=2a0728a6edab6921520a93e10a86d4b2"],"2023142":["http://welivesecurity.com/wp-content/uploads/2014/12/torrent_locker.pdf"],"2023144":["http://www.threatexpert.com/report.aspx?md5=21d3c7d099aceff2a1f16d8ae0f38731"],"2023145":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2023146":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-6332"],"2023149":["http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_zlader.b"],"2023155":["http://blog.malwaremustdie.org/2016/09/mmd-0057-2016-new-elf-botnet-linuxluabot.html"],"2023156":["http://blog.malwaremustdie.org/2016/09/mmd-0057-2016-new-elf-botnet-linuxluabot.html"],"2023157":["http://sslbl.abuse.ch"],"2023158":["http://sslbl.abuse.ch"],"2023159":["http://sslbl.abuse.ch"],"2023160":["http://sslbl.abuse.ch"],"2023161":["http://sslbl.abuse.ch"],"2023162":["http://sslbl.abuse.ch"],"2023163":["http://sslbl.abuse.ch"],"2023164":["http://sslbl.abuse.ch"],"2023165":["http://sslbl.abuse.ch"],"2023166":["http://sslbl.abuse.ch"],"2023167":["http://sslbl.abuse.ch"],"2023168":["http://sslbl.abuse.ch"],"2023169":["http://sslbl.abuse.ch"],"2023170":["http://sslbl.abuse.ch"],"2023171":["http://sslbl.abuse.ch"],"2023172":["http://sslbl.abuse.ch"],"2023173":["http://sslbl.abuse.ch"],"2023174":["http://sslbl.abuse.ch"],"2023175":["http://sslbl.abuse.ch"],"2023176":["http://sslbl.abuse.ch"],"2023177":["http://sslbl.abuse.ch"],"2023178":["http://ransomwaretracker.abuse.ch"],"2023179":["http://ransomwaretracker.abuse.ch"],"2023182":["http://securelist.com/blog/research/75990/the-missing-piece-sophisticated-os-x-backdoor-discovered"],"2023183":["http://securelist.com/blog/research/75990/the-missing-piece-sophisticated-os-x-backdoor-discovered"],"2023184":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-3861","http://googleprojectzero.blogspot.com.br/2016/09/return-to-libstagefright-exploiting.html"],"2023185":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-3861","http://googleprojectzero.blogspot.com.br/2016/09/return-to-libstagefright-exploiting.html"],"2023201":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6662","http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html"],"2023202":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6662","http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html"],"2023203":["http://www.threatexpert.com/report.aspx?md5=7554244ea84457f53ab9d4989c4d363d"],"2023204":["http://www.threatexpert.com/report.aspx?md5=7554244ea84457f53ab9d4989c4d363d"],"2023227":["http://www.symantec.com/security_response/writeup.jsp?docid=2015-111911-4342-99&tabid=2","http://security.stackexchange.com/questions/47253/hacked-site-encrypted-code"],"2023228":["http://www.symantec.com/security_response/writeup.jsp?docid=2015-111911-4342-99&tabid=2","http://security.stackexchange.com/questions/47253/hacked-site-encrypted-code"],"2023229":["http://www.symantec.com/security_response/writeup.jsp?docid=2015-111911-4342-99&tabid=2","http://security.stackexchange.com/questions/47253/hacked-site-encrypted-code"],"2023230":["http://www.symantec.com/security_response/writeup.jsp?docid=2015-111911-4342-99&tabid=2","http://security.stackexchange.com/questions/47253/hacked-site-encrypted-code"],"2023231":["http://www.symantec.com/security_response/writeup.jsp?docid=2015-111911-4342-99&tabid=2","http://security.stackexchange.com/questions/47253/hacked-site-encrypted-code"],"2023232":["http://www.symantec.com/security_response/writeup.jsp?docid=2015-111911-4342-99&tabid=2","http://security.stackexchange.com/questions/47253/hacked-site-encrypted-code"],"2023233":["http://www.symantec.com/security_response/writeup.jsp?docid=2015-111911-4342-99&tabid=2","http://security.stackexchange.com/questions/47253/hacked-site-encrypted-code"],"2023234":["http://www.symantec.com/security_response/writeup.jsp?docid=2015-111911-4342-99&tabid=2","http://security.stackexchange.com/questions/47253/hacked-site-encrypted-code"],"2023240":["http://researchcenter.paloaltonetworks.com/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/"],"2023241":["http://www.threatexpert.com/report.aspx?md5=ab03070048fdbadbb901ec75b8f9f2e9"],"2023242":["http://www.threatexpert.com/report.aspx?md5=ab03070048fdbadbb901ec75b8f9f2e9"],"2023243":["http://sslbl.abuse.ch"],"2023244":["http://sslbl.abuse.ch"],"2023245":["http://sslbl.abuse.ch"],"2023247":["http://www.threatexpert.com/report.aspx?md5=5eeeeb093ee02d3769886880f8a58a90"],"2023254":["http://blog.eset.ie/2016/09/22/malware-in-libya-book-of-eli-african-targeted-attacks/","http://www.threatexpert.com/report.aspx?md5=25e5744979b365dc58cce23d377b3835","http://www.threatexpert.com/report.aspx?md5=d22857cebad4200c3b1e8ec17836b451","http://www.virustotal.com/en/file/faa20341f7a7277114f5c61e5013b9871ab2b0356f383b6798013ce333a30ae5/analysis/"],"2023255":["http://www.certego.local/en/news/badepilogue-the-perfect-evasion/"],"2023256":["http://cyberkov.com/hunting-libyan-scorpions/"],"2023257":["http://cyberkov.com/hunting-libyan-scorpions/"],"2023258":["http://cyberkov.com/hunting-libyan-scorpions/"],"2023259":["http://cyberkov.com/hunting-libyan-scorpions/"],"2023260":["http://cyberkov.com/hunting-libyan-scorpions/"],"2023261":["http://ransomwaretracker.abuse.ch"],"2023262":["http://sslbl.abuse.ch"],"2023263":["http://sslbl.abuse.ch"],"2023264":["http://sslbl.abuse.ch"],"2023265":["http://sslbl.abuse.ch"],"2023266":["http://sslbl.abuse.ch"],"2023267":["http://sslbl.abuse.ch"],"2023268":["http://sslbl.abuse.ch"],"2023269":["http://sslbl.abuse.ch"],"2023286":["http://sslbl.abuse.ch"],"2023287":["http://sslbl.abuse.ch"],"2023292":["http://www.threatexpert.com/report.aspx?md5=190c607ef81fa0c27fb1313df5f05266","http://malware.dontneedcoffee.com/2016/09/fox-stealer-another-pony-fork.html"],"2023293":["http://www.threatexpert.com/report.aspx?md5=cdfb7e5544c9aa49c17217fdfe04e854","http://malware.dontneedcoffee.com/2016/09/fox-stealer-another-pony-fork.html"],"2023294":["http://sslbl.abuse.ch"],"2023295":["http://sslbl.abuse.ch"],"2023296":["http://sslbl.abuse.ch"],"2023297":["http://sslbl.abuse.ch"],"2023298":["http://sslbl.abuse.ch"],"2023299":["http://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/"],"2023300":["http://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/"],"2023301":["http://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/"],"2023304":["http://lists.emergingthreats.net/pipermail/emerging-sigs/2016-August/027524.html"],"2023308":["http://sslbl.abuse.ch"],"2023309":["http://sslbl.abuse.ch"],"2023310":["http://sslbl.abuse.ch"],"2023311":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6415"],"2023317":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2776","http://blog.infobytesec.com/2016/10/a-tale-of-dns-packet-cve-2016-2776.html"],"2023319":["http://sslbl.abuse.ch"],"2023320":["http://sslbl.abuse.ch"],"2023321":["http://sslbl.abuse.ch"],"2023322":["http://sslbl.abuse.ch"],"2023323":["http://sslbl.abuse.ch"],"2023324":["http://sslbl.abuse.ch"],"2023325":["http://sslbl.abuse.ch"],"2023326":["http://sslbl.abuse.ch"],"2023327":["http://ransomwaretracker.abuse.ch"],"2023328":["http://ransomwaretracker.abuse.ch"],"2023329":["http://ransomwaretracker.abuse.ch"],"2023333":["http://www.flashpoint-intel.com/when-vulnerabilities-travel-downstream"],"2023334":["http://www.threatexpert.com/report.aspx?md5=229b639878c9e932ef8028d2875526b9","http://www.threatexpert.com/report.aspx?md5=b4c5edd3ba110e0fdb420277f24bd0b0","http://www.bleepingcomputer.com/news/security/the-enigma-ransomware-targets-russian-speaking-users/"],"2023335":["http://www.spyware-techie.com/nuke-ransomware-removal-guide","http://www.threatexpert.com/report.aspx?md5=ff0e42146794f0d080df0467337b2d01"],"2023336":["http://sslbl.abuse.ch"],"2023337":["http://www.threatexpert.com/report.aspx?md5=be16b8d1b85843c89301f189b35c4963"],"2023338":["http://www.threatexpert.com/report.aspx?md5=f26649fc31ede7594b18f8cd7cdbbc15"],"2023342":["http://pastebin.com/7wYupkJL","http://www.threatexpert.com/report.aspx?md5=4c5c9014f2d18f11ca62848876551323"],"2023344":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-dealerschoice-sofacys-flash-player-exploit-platform/","http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/"],"2023345":["http://www.threatexpert.com/report.aspx?md5=8bd7cd1eee4594ad4886ac3f1a05273b","http://nakedsecurity.sophos.com/2016/10/18/data-stealing-crpy-ransomware/"],"2023346":["http://www.threatexpert.com/report.aspx?md5=8bd7cd1eee4594ad4886ac3f1a05273b","http://nakedsecurity.sophos.com/2016/10/18/data-stealing-crpy-ransomware/"],"2023347":["http://sslbl.abuse.ch"],"2023348":["http://sslbl.abuse.ch"],"2023349":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor%3AWin32/PcClient.ZR&ThreatID=-2147325231","http://www.threatexpert.com/report.aspx?md5=edc84c505d101301459dafab296fb743"],"2023350":["http://sslbl.abuse.ch"],"2023351":["http://en.wikipedia.org/wiki/SQL_injection"],"2023354":["http://www.threatexpert.com/report.aspx?md5=32f3fa6b80904946621551399be32207"],"2023355":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023356":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023357":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023358":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023359":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023360":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023361":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023362":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023363":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023364":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023365":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023366":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023367":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023368":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023369":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023370":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023371":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023372":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023373":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023374":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023375":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023376":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023377":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023378":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023379":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023380":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023381":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023382":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023383":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023384":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023385":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023386":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023387":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023388":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023389":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023390":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023391":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023392":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023393":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023394":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023395":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023396":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf"],"2023397":["http://www.threatexpert.com/report.aspx?md5=ad2c80611ebc7f6d45bd3e46de38b776","http://www.threatexpert.com/report.aspx?md5=5bb7d85f7a5f1d2b01efabe5635e2992"],"2023398":["http://blogs.forcepoint.com/security-labs/bitter-targeted-attack-against-pakistan"],"2023399":["http://blogs.forcepoint.com/security-labs/bitter-targeted-attack-against-pakistan","http://www.threatexpert.com/report.aspx?md5=6e855944d171a3acbb64635dbe7a9c62"],"2023400":["http://blogs.forcepoint.com/security-labs/bitter-targeted-attack-against-pakistan","http://www.threatexpert.com/report.aspx?md5=2b07e054a1abb2941e5e70fba652a211"],"2023402":["http://sslbl.abuse.ch"],"2023403":["http://sslbl.abuse.ch"],"2023404":["http://sslbl.abuse.ch"],"2023405":["http://sslbl.abuse.ch"],"2023406":["http://sslbl.abuse.ch"],"2023407":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023408":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023409":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023410":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023411":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023412":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023413":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023414":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023415":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023416":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023417":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023418":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023419":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023420":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023421":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023422":["http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023423":["http://www.threatexpert.com/report.aspx?md5=f7ee38ca49cd4ae35824ce5738b6e587","http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf"],"2023424":["http://www.threatexpert.com/report.aspx?md5=580f82bbd46e8344231cf005"],"2023425":["http://ransomwaretracker.abuse.ch"],"2023426":["http://ransomwaretracker.abuse.ch"],"2023427":["http://ransomwaretracker.abuse.ch"],"2023428":["http://ransomwaretracker.abuse.ch"],"2023429":["http://www.threatexpert.com/report.aspx?md5=45009c70d362dcd253112c9cf1924f57","http://researchcenter.paloaltonetworks.com/2016/10/unit42-houdinis-magic-reappearance"],"2023430":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023431":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023432":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023433":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023434":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023435":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023436":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023437":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023438":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023439":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023440":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023441":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023442":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023443":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023444":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023445":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023446":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023447":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023448":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023449":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023450":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023451":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023452":["http://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack"],"2023453":["http://www.threatexpert.com/report.aspx?md5=ac4d7fb5739862e9914556ed5d50f84f"],"2023454":["http://www.spamhaus.org/statistics/tlds/"],"2023455":["http://www.spamhaus.org/statistics/tlds/"],"2023456":["http://www.spamhaus.org/statistics/tlds/"],"2023457":["http://www.spamhaus.org/statistics/tlds/"],"2023458":["http://www.spamhaus.org/statistics/tlds/"],"2023459":["http://www.spamhaus.org/statistics/tlds/"],"2023460":["http://www.spamhaus.org/statistics/tlds/"],"2023461":["http://www.spamhaus.org/statistics/tlds/"],"2023462":["http://www.spamhaus.org/statistics/tlds/"],"2023463":["http://www.spamhaus.org/statistics/tlds/"],"2023464":["http://www.spamhaus.org/statistics/tlds/"],"2023465":["http://www.threatexpert.com/report.aspx?md5=5624c920b1fd3da3a451d564bb7488d3"],"2023466":["http://www.exploit-db.com/exploits/35917"],"2023467":["http://www.expku.com/remote/5853.html"],"2023469":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-psa-conference-invite-used-lure-operation-lotus-blossom-actors/"],"2023470":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-psa-conference-invite-used-lure-operation-lotus-blossom-actors/"],"2023471":["http://www.threatexpert.com/report.aspx?md5=dacbf4c26c5642c29e69e336e0f111f7"],"2023475":["http://www.threatexpert.com/report.aspx?md5=bbb0aa6c9f84963dacec55345fe4c47e"],"2023476":["http://sslbl.abuse.ch"],"2023477":["http://gosecure.net/2016/11/02/exposing-the-ego-market-the-cybercrime-performed-by-the-linux-moose-botnet/"],"2023478":["http://gosecure.net/2016/11/02/exposing-the-ego-market-the-cybercrime-performed-by-the-linux-moose-botnet/"],"2023479":["http://gosecure.net/2016/11/02/exposing-the-ego-market-the-cybercrime-performed-by-the-linux-moose-botnet/"],"2023480":["http://blog.talosintel.com/2016/10/sundown-ek.html"],"2023481":["http://www.threatexpert.com/report.aspx?md5=6970847bedab9ab83e69630d065ba67b"],"2023483":["http://www.threatexpert.com/report.aspx?md5=78c2444fe15a8e58c629076781d9442a","http://blog.fortinet.com/2016/11/01/android-banking-malware-masquerades-as-flash-player-targeting-large-banks-and-popular-social-media-apps"],"2023484":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4657","http://blog.lookout.com/blog/2016/11/02/trident-pegasus-technical-details/"],"2023485":["http://www.threatexpert.com/report.aspx?md5=d3abaa6736d7d549eca8644c67e9fcfe"],"2023486":["http://www.welivesecurity.com/post_paper/en-route-with-sednit-part-3-a-mysterious-downloader/"],"2023496":["http://sslbl.abuse.ch"],"2023497":["http://github.com/lgandx/PoC/tree/master/LSASS","http://support.microsoft.com/en-us/kb/3216771","http://support.microsoft.com/en-us/kb/3199173","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0004","http://technet.microsoft.com/library/security/MS17-004"],"2023498":["http://sslbl.abuse.ch"],"2023499":["http://sslbl.abuse.ch"],"2023500":["http://www.mulliner.org/blog/blosxom.cgi/security/ios_WebView_auto_dialer.html"],"2023501":["http://www.mulliner.org/blog/blosxom.cgi/security/ios_WebView_auto_dialer.html"],"2023502":["http://www.threatexpert.com/report.aspx?md5=f6e81ae634bbcc309a4a5e01f20e4136","http://sslbl.abuse.ch"],"2023503":["http://twitter.com/PolarToffee/status/796079699478900736"],"2023504":["http://twitter.com/PolarToffee/status/796079699478900736"],"2023505":["http://www.threatexpert.com/report.aspx?md5=7d181574893ec9cb2795166623f8e531"],"2023506":["http://www.threatexpert.com/report.aspx?md5=1cb51c130e6f75f11c095b122e008bbc"],"2023507":["http://www.threatexpert.com/report.aspx?md5=3c1055f19971d580ef9ced172d8eba3b","http://rednaga.io/2016/11/14/hackingteam_back_for_your_androids/"],"2023508":["http://www.threatexpert.com/report.aspx?md5=3c1055f19971d580ef9ced172d8eba3b","http://rednaga.io/2016/11/14/hackingteam_back_for_your_androids/"],"2023509":["http://www.threatexpert.com/report.aspx?md5=cbd1c2db9ffc6b67cea46d271594c2ae"],"2023510":["http://antirez.com/news/96"],"2023511":["http://antirez.com/news/96"],"2023512":["http://antirez.com/news/96"],"2023514":["http://www.kryptowire.com/adups_security_analysis.html"],"2023515":["http://www.kryptowire.com/adups_security_analysis.html"],"2023516":["http://www.kryptowire.com/adups_security_analysis.html"],"2023517":["http://www.kryptowire.com/adups_security_analysis.html"],"2023518":["http://www.kryptowire.com/adups_security_analysis.html"],"2023519":["http://www.kryptowire.com/adups_security_analysis.html"],"2023521":["http://sslbl.abuse.ch"],"2023522":["http://sslbl.abuse.ch"],"2023523":["http://citizenlab.org/2016/11/parliament-keyboy/"],"2023524":["http://citizenlab.org/2016/11/parliament-keyboy/"],"2023525":["http://citizenlab.org/2016/11/parliament-keyboy/"],"2023526":["http://citizenlab.org/2016/11/parliament-keyboy/"],"2023527":["http://citizenlab.org/2016/11/parliament-keyboy/","http://www.threatexpert.com/report.aspx?md5=8846d109b457a2ee44ddbf54d1cf7944"],"2023528":["http://sslbl.abuse.ch"],"2023530":["http://sslbl.abuse.ch"],"2023531":["http://labs.sucuri.net/?note=2016-11-17"],"2023532":["http://labs.sucuri.net/?note=2016-11-17"],"2023533":["http://www.threatexpert.com/report.aspx?md5=59109839de42d2acb44fbd7ff151fe0c"],"2023534":["http://www.threatexpert.com/report.aspx?md5=18189daa96e711777158d7cb599c13b1","http://malware-traffic-analysis.net/2016/11/17/index.html"],"2023535":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2135","http://www.securityfocus.com/bid/60345","http://cwiki.apache.org/confluence/display/WW/S2-015"],"2023536":["http://www.threatexpert.com/report.aspx?md5=3ddf657800e60a57b884b87e1e8a987c"],"2023540":["http://sslbl.abuse.ch"],"2023541":["http://sslbl.abuse.ch"],"2023542":["http://sslbl.abuse.ch"],"2023543":["http://sslbl.abuse.ch"],"2023544":["http://www.threatexpert.com/report.aspx?md5=5a9a8502b87ce1a6a608debd10761957","http://securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/"],"2023545":["http://www.threatexpert.com/report.aspx?md5=68aab6163c29183ad8da1cf27a5a47c5","http://securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/","http://researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malware-families"],"2023546":["http://www.threatexpert.com/report.aspx?md5=d199b13d4676080073eaeb4e0ff39a75","http://securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/"],"2023548":["http://devicereversing.wordpress.com/2016/11/07/eirs-d1000-modem-is-wide-open-to-being-hacked/","http://www.threatexpert.com/report.aspx?md5=a19d5b596992407796a33c5e15489934"],"2023549":["http://devicereversing.wordpress.com/2016/11/07/eirs-d1000-modem-is-wide-open-to-being-hacked/","http://www.threatexpert.com/report.aspx?md5=a19d5b596992407796a33c5e15489934"],"2023550":["http://www.threatexpert.com/report.aspx?md5=fa224c69088cc331a6b30bc5069fa9d5"],"2023553":["http://www.threatexpert.com/report.aspx?md5=a85990f79268a18329f4040a2ec85591","http://www.threatexpert.com/report.aspx?md5=f48cd0c0e5362142c0c15316fa2635dd"],"2023554":["http://sslbl.abuse.ch"],"2023559":["http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/"],"2023560":["http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/"],"2023567":["http://www.threatexpert.com/report.aspx?md5=65c7426b056482fcda962a7a14e86601"],"2023570":["http://www.threatexpert.com/report.aspx?md5=5446f46d89124462ae7aca4fce420423","http://www.threatexpert.com/report.aspx?md5=5bac4381c00044d7f4e4cbfd368ba03b","http://researchcenter.paloaltonetworks.com/2016/11/unit42-shamoon-2-return-disttrack-wiper/"],"2023571":["http://www.threatexpert.com/report.aspx?md5=5446f46d89124462ae7aca4fce420423","http://www.threatexpert.com/report.aspx?md5=5bac4381c00044d7f4e4cbfd368ba03b","http://researchcenter.paloaltonetworks.com/2016/11/unit42-shamoon-2-return-disttrack-wiper/"],"2023572":["http://sslbl.abuse.ch"],"2023573":["http://cysinfo.com/malware-actors-using-nic-cyber-security-themed-spear-phishing-target-indian-government-organizations/"],"2023574":["http://bnshosting.net/googlemap-proxy-vulnerability"],"2023575":["http://www.bleepingcomputer.com/news/security/visbot-malware-found-on-6-691-magento-online-stores/"],"2023578":["http://ransomwaretracker.abuse.ch"],"2023579":["http://ransomwaretracker.abuse.ch"],"2023580":["http://ransomwaretracker.abuse.ch"],"2023581":["http://ransomwaretracker.abuse.ch"],"2023582":["http://ransomwaretracker.abuse.ch"],"2023588":["http://www.threatexpert.com/report.aspx?md5=d611a633e8ceabdc9c2f5b0b9dd4f19e","http://www.threatexpert.com/report.aspx?md5=a55b312d4e2006b5698e8f5ae8e5d735","http://www.threatexpert.com/report.aspx?md5=3b4c2d3447bc49f057d76a92e7cae96b","http://www.threatexpert.com/report.aspx?md5=08833cd7564f29f7f499a65a7be82d02","http://www.lexsi-leblog.com/cert-en/qadars-new-banking-malware-with-fraudulent-mobile-application-component.html"],"2023590":["http://www.threatexpert.com/report.aspx?md5=a8139f8c2547f11522c3d7d58b90c422"],"2023591":["http://www.threatexpert.com/report.aspx?md5=50ede75eb74a0a795500cc7b8c6c9f54"],"2023595":["http://www.threatexpert.com/report.aspx?md5=1f1b5c16bbb62387fdf53e524a382006","http://www.symantec.com/security_response/writeup.jsp?docid=2016-081923-2700-99&tabid=2"],"2023599":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023600":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023601":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023602":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023603":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023604":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023605":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023606":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023607":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023608":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023609":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023610":["http://blog.netlab.360.com/new-mirai-variant-with-dga/"],"2023611":["http://www.securelist.com/en/descriptions/10155706/Trojan-GameThief.Win32.Magania.eogz","http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Backdoor:Win32/PcClient.ZR&ThreatID=-2147325231"],"2023612":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023613":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023614":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023615":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023616":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023617":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023618":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023619":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023620":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023621":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023622":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023623":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023624":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023625":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023626":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023627":["http://www.threatexpert.com/report.aspx?md5=42c677d6d8f42acd8736c4b8c75ce505","http://www.threatexpert.com/report.aspx?md5=7f6290c02465625828cfce6a8014c34a","http://www.threatexpert.com/report.aspx?md5=d8b2d2a5f6da2872e147011d2ea85d71"],"2023628":["http://www.kb.cert.org/vuls/id/582384"],"2023630":["http://blog.opendns.com/2016/12/13/query-volumes-mirai-dgas/"],"2023631":["http://blog.opendns.com/2016/12/13/query-volumes-mirai-dgas/"],"2023632":["http://blog.opendns.com/2016/12/13/query-volumes-mirai-dgas/"],"2023633":["http://blog.opendns.com/2016/12/13/query-volumes-mirai-dgas/"],"2023634":["http://blog.opendns.com/2016/12/13/query-volumes-mirai-dgas/"],"2023635":["http://blog.opendns.com/2016/12/13/query-volumes-mirai-dgas/"],"2023636":["http://blog.opendns.com/2016/12/13/query-volumes-mirai-dgas/"],"2023637":["http://blog.opendns.com/2016/12/13/query-volumes-mirai-dgas/"],"2023639":["http://sslbl.abuse.ch"],"2023640":["http://www.noction.com/faq"],"2023641":["http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023642":["http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023643":["http://securelist.com/blog/research/76147/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/","http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023644":["http://securelist.com/blog/research/76147/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/","http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023645":["http://securelist.com/blog/research/76147/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/","http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023646":["http://securelist.com/blog/research/76147/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/","http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023647":["http://securelist.com/blog/research/76147/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/","http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023648":["http://securelist.com/blog/research/76147/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/","http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023649":["http://securelist.com/blog/research/76147/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/","http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023650":["http://securelist.com/blog/research/76147/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/","http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023651":["http://securelist.com/blog/research/76147/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/","http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf"],"2023652":["http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/"],"2023653":["http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/"],"2023654":["http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/"],"2023656":["http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/"],"2023657":["http://www.brokenbrowser.com/spoof-addressbar-malware/"],"2023659":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-dealerschoice-sofacys-flash-player-exploit-platform/","http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/"],"2023660":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-dealerschoice-sofacys-flash-player-exploit-platform/","http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/"],"2023661":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-dealerschoice-sofacys-flash-player-exploit-platform/","http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/"],"2023662":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-dealerschoice-sofacys-flash-player-exploit-platfor/","http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/"],"2023663":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-dealerschoice-sofacys-flash-player-exploit-platfor/","http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/"],"2023664":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-dealerschoice-sofacys-flash-player-exploit-platfor/","http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/"],"2023665":["http://researchcenter.paloaltonetworks.com/2016/10/unit42-dealerschoice-sofacys-flash-player-exploit-platfor/","http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/"],"2023667":["http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/","http://researchcenter.paloaltonetworks.com/2016/12/unit42-let-ride-sofacy-groups-dealerschoice-attacks-continue/"],"2023674":["http://isc.sans.edu/diary/21833"],"2023675":["http://www.threatexpert.com/report.aspx?md5=6b938ca31a55e743112ab34dc540a076"],"2023677":["http://www.govcert.admin.ch/blog/26/tofsee-spambot-features-.ch-dga-reversal-and-countermesaures"],"2023678":["http://www.govcert.admin.ch/blog/26/tofsee-spambot-features-.ch-dga-reversal-and-countermesaures"],"2023680":["http://www.threatexpert.com/report.aspx?md5=6f7523d3019fa190499f327211e01fcb","http://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/"],"2023681":["http://www.threatexpert.com/report.aspx?md5=6f7523d3019fa190499f327211e01fcb","http://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/"],"2023682":["http://www.threatexpert.com/report.aspx?md5=6f7523d3019fa190499f327211e01fcb","http://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/"],"2023683":["http://www.threatexpert.com/report.aspx?md5=6f7523d3019fa190499f327211e01fcb","http://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/"],"2023684":["http://www.threatexpert.com/report.aspx?md5=6f7523d3019fa190499f327211e01fcb","http://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/"],"2023685":["http://www.threatexpert.com/report.aspx?md5=6f7523d3019fa190499f327211e01fcb","http://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/"],"2023686":["http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html","http://github.com/opsxcq/exploit-CVE-2016-10033"],"2023687":["http://www.acunetix.com/"],"2023688":["http://www.acunetix.com/"],"2023689":["http://sslbl.abuse.ch"],"2023690":["http://www.threatexpert.com/report.aspx?md5=c2f7595a1c394f1dac2e418815c54fd2"],"2023691":["http://www.threatexpert.com/report.aspx?md5=fc57a660e24d9c91cb5464b2ece30756","http://www.threatexpert.com/report.aspx?md5=a1d83e290429477f05c0eaddafdb0355"],"2023692":["http://www.threatexpert.com/report.aspx?md5=fc57a660e24d9c91cb5464b2ece30756","http://www.threatexpert.com/report.aspx?md5=a1d83e290429477f05c0eaddafdb0355"],"2023693":["http://www.threatexpert.com/report.aspx?md5=838d43239ba2c28bd968f8a7da64d340"],"2023694":["http://blog.fortinet.com/post/over-100-000-south-korean-users-affected-by-blackmoon-campaign","http://www.threatexpert.com/report.aspx?md5=56b8f9428b2171f45dc447fb9fa1b03f"],"2023700":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-7200","http://malware.dontneedcoffee.com/2017/01/CVE-2016-7200-7201.html"],"2023701":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-7200","http://malware.dontneedcoffee.com/2017/01/CVE-2016-7200-7201.html"],"2023705":["http://ransomwaretracker.abuse.ch"],"2023706":["http://ransomwaretracker.abuse.ch"],"2023707":["http://www.threatexpert.com/report.aspx?md5=6b95ddc5238cc0576db7b206af13339e"],"2023708":["http://www.threatexpert.com/report.aspx?md5=d332560f1fc3e6dc58d94d6fa0dab748","http://www.zscaler.com/blogs/research/android-marcher-now-posing-super-mario-run"],"2023709":["http://www.threatexpert.com/report.aspx?md5=d332560f1fc3e6dc58d94d6fa0dab748","http://www.zscaler.com/blogs/research/android-marcher-now-posing-super-mario-run"],"2023710":["http://www.threatexpert.com/report.aspx?md5=d332560f1fc3e6dc58d94d6fa0dab748","http://www.zscaler.com/blogs/research/android-marcher-now-posing-super-mario-run"],"2023716":["http://security.web.cern.ch/security/venom.shtml"],"2023717":["http://sslbl.abuse.ch"],"2023718":["http://sslbl.abuse.ch"],"2023719":["http://sslbl.abuse.ch"],"2023720":["http://sslbl.abuse.ch"],"2023721":["http://sslbl.abuse.ch"],"2023722":["http://sslbl.abuse.ch"],"2023723":["http://sslbl.abuse.ch"],"2023724":["http://sslbl.abuse.ch"],"2023725":["http://sslbl.abuse.ch"],"2023726":["http://sslbl.abuse.ch"],"2023727":["http://sslbl.abuse.ch"],"2023728":["http://www.bleepingcomputer.com/news/security/spora-ransomware-works-offline-has-the-most-sophisticated-payment-site-as-of-yet/"],"2023729":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2023730":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2023731":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2023732":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2023733":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2023734":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2023735":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2023736":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2023739":["http://www.threatexpert.com/report.aspx?md5=57ce6f966c6b441fe82a211647c6e863"],"2023740":["http://www.threatexpert.com/report.aspx?md5=62e7a146079f99ded1a6b8f2db08ad18"],"2023746":["http://www.pcapanalysis.com/tag/trickster-google-drive-malware-trojan-pcap-file-download-traffic-sample/"],"2023747":["http://www.threatexpert.com/report.aspx?md5=b9d81c51c10abd64107edc5e73a26aea","http://www.cert.pl/en/news/single/evil-a-poor-mans-ransomware-in-javascript/"],"2023754":["http://www.threatexpert.com/report.aspx?md5=551c440d76be5ab9932d8f3e8f65726e"],"2023755":["http://www.wearesegment.com/research/Microsoft-Remote-Desktop-Client-for-Mac-Remote-Code-Execution"],"2023756":["http://bugs.chromium.org/p/project-zero/issues/detail?id=1096"],"2023761":["http://malware.prevenity.com/2017/01/ataki-na-instytucje-rzadowe-grudzien.html"],"2023762":["http://malware.prevenity.com/2017/01/ataki-na-instytucje-rzadowe-grudzien.html"],"2023763":["http://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/","http://www.threatexpert.com/report.aspx?md5=e4744b9f927dc8048a19dca15590660c"],"2023764":["http://www.threatexpert.com/report.aspx?md5=4c3b84efe89e5f5cf3e17f1e1751e708"],"2023765":["http://www.threatexpert.com/report.aspx?md5=4c3b84efe89e5f5cf3e17f1e1751e708"],"2023766":["http://isc.sans.edu/forums/diary/Sage+20+Ransomware/21959"],"2023767":["http://isc.sans.edu/forums/diary/Sage+20+Ransomware/21959"],"2023769":["http://www.threatexpert.com/report.aspx?md5=2ccd95bb2e9d8c6e6b6eb68963461f08"],"2023777":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023778":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023779":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023780":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023781":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023782":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023783":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023784":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023785":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023786":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023787":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023788":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023789":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023790":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023791":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023792":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023793":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023794":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023795":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023796":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023797":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023798":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023799":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023800":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023801":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023802":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023803":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023804":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023805":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023806":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023807":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023808":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023809":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023810":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023811":["http://www.threatexpert.com/report.aspx?md5=31cf042e91de7492c86e1ad02dc9eaec","http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023812":["http://www.threatexpert.com/report.aspx?md5=2cd8c27bdc88ebba3e36114a1b55cef6","http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023813":["http://www.threatexpert.com/report.aspx?md5=a19d4ff89a3f699a6f8237a7905e80e1","http://researchcenter.paloaltonetworks.com/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/"],"2023814":["http://www.threatexpert.com/report.aspx?md5=ef815146b802cfd6a5fb67d1f9267745"],"2023815":["http://www.threatexpert.com/report.aspx?md5=cb4ab17468984f1b292adac9f745cb2b"],"2023816":["http://www.threatexpert.com/report.aspx?md5=852cbd70766feb96923a79b210e94646"],"2023817":["http://www.proofpoint.com/us/threat-insight/post/EITest-Nabbing-Chrome-Users-Chrome-Font-Social-Engineering-Scheme","http://blog.brillantit.com/exposing-eitest-campaign"],"2023830":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10175","http://cve.circl.lu/cve/CVE-2016-10175"],"2023831":["http://isc.sans.edu/forums/diary/Windows+SMBv3+Denial+of+Service+Proof+of+Concept+0+Day+Exploit/22029/"],"2023832":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0016"],"2023833":["http://citizenlab.org/2017/02/nilephish-report"],"2023834":["http://citizenlab.org/2017/02/nilephish-report"],"2023835":["http://citizenlab.org/2017/02/nilephish-report"],"2023836":["http://citizenlab.org/2017/02/nilephish-report"],"2023837":["http://citizenlab.org/2017/02/nilephish-report"],"2023838":["http://citizenlab.org/2017/02/nilephish-report"],"2023839":["http://citizenlab.org/2017/02/nilephish-report"],"2023840":["http://citizenlab.org/2017/02/nilephish-report"],"2023841":["http://citizenlab.org/2017/02/nilephish-report"],"2023842":["http://citizenlab.org/2017/02/nilephish-report"],"2023843":["http://citizenlab.org/2017/02/nilephish-report"],"2023844":["http://citizenlab.org/2017/02/nilephish-report"],"2023845":["http://citizenlab.org/2017/02/nilephish-report"],"2023846":["http://citizenlab.org/2017/02/nilephish-report"],"2023847":["http://citizenlab.org/2017/02/nilephish-report"],"2023848":["http://citizenlab.org/2017/02/nilephish-report"],"2023849":["http://citizenlab.org/2017/02/nilephish-report"],"2023850":["http://citizenlab.org/2017/02/nilephish-report"],"2023851":["http://citizenlab.org/2017/02/nilephish-report"],"2023852":["http://citizenlab.org/2017/02/nilephish-report"],"2023853":["http://citizenlab.org/2017/02/nilephish-report"],"2023854":["http://citizenlab.org/2017/02/nilephish-report"],"2023855":["http://citizenlab.org/2017/02/nilephish-report"],"2023856":["http://citizenlab.org/2017/02/nilephish-report"],"2023857":["http://citizenlab.org/2017/02/nilephish-report"],"2023858":["http://citizenlab.org/2017/02/nilephish-report"],"2023859":["http://citizenlab.org/2017/02/nilephish-report"],"2023860":["http://citizenlab.org/2017/02/nilephish-report"],"2023861":["http://citizenlab.org/2017/02/nilephish-report"],"2023862":["http://citizenlab.org/2017/02/nilephish-report"],"2023863":["http://citizenlab.org/2017/02/nilephish-report"],"2023864":["http://citizenlab.org/2017/02/nilephish-report"],"2023865":["http://citizenlab.org/2017/02/nilephish-report"],"2023866":["http://citizenlab.org/2017/02/nilephish-report"],"2023867":["http://citizenlab.org/2017/02/nilephish-report"],"2023868":["http://securelist.com/blog/research/77429/kopiluwak-a-new-javascript-payload-from-turla/"],"2023870":["http://www.threatexpert.com/report.aspx?md5=4dbff312f5ee5bfbd757030109faec2d"],"2023871":["http://www.threatexpert.com/report.aspx?md5=4dbff312f5ee5bfbd757030109faec2d"],"2023872":["http://www.threatexpert.com/report.aspx?md5=4dbff312f5ee5bfbd757030109faec2d"],"2023874":["http://nctc.gov/site/groups/hamas.html"],"2023876":["http://iranthreats.github.io/resources/macdownloader-macos-malware/"],"2023877":["http://iranthreats.github.io/resources/macdownloader-macos-malware/"],"2023882":["http://www.symantec.com/connect/blogs/shady-tld-research-gdn-and-our-2016-wrap","http://www.spamhaus.org/statistics/tlds/"],"2023883":["http://www.symantec.com/connect/blogs/shady-tld-research-gdn-and-our-2016-wrap","http://www.spamhaus.org/statistics/tlds/"],"2023884":["http://niebezpiecznik.pl/post/jak-przeprowadzono-atak-na-knf-i-polskie-banki-oraz-kto-jeszcze-byl-na-celowniku-przestepcow/"],"2023885":["http://niebezpiecznik.pl/post/jak-przeprowadzono-atak-na-knf-i-polskie-banki-oraz-kto-jeszcze-byl-na-celowniku-przestepcow/"],"2023886":["http://niebezpiecznik.pl/post/jak-przeprowadzono-atak-na-knf-i-polskie-banki-oraz-kto-jeszcze-byl-na-celowniku-przestepcow/"],"2023887":["http://www.bleepingcomputer.com/news/security/spora-ransomware-works-offline-has-the-most-sophisticated-payment-site-as-of-yet/","http://www.threatexpert.com/report.aspx?md5=41de296c5bcfc24fc0f16b1e997d9aa5"],"2023898":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/","http://citizenlab.org/2017/02/bittersweet-nso-mexico-spyware/"],"2023899":["http://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/","http://citizenlab.org/2017/02/bittersweet-nso-mexico-spyware/"],"2023901":["http://lists.emergingthreats.net/pipermail/emerging-sigs/2016-August/027524.html"],"2023909":["http://www.threatexpert.com/report.aspx?md5=8bbc55ec1a7e86cb21d3cda5ccb43e1e","http://www.f-secure.com/static/doc/labs_global/Whitepapers/cosmicduke_whitepaper.pdf"],"2023910":["http://www.threatexpert.com/report.aspx?md5=5080bc705217c614b9cbf67a679979a8"],"2023911":["http://www.threatexpert.com/report.aspx?md5=e175be029dd2b78c059278a567b3ada1","http://www.f-secure.com/static/doc/labs_global/Whitepapers/cosmicduke_whitepaper.pdf"],"2023912":["http://www.threatexpert.com/report.aspx?md5=c2988e3e4f70d5901b234ff1c1363dcc"],"2023913":["http://www.threatexpert.com/report.aspx?md5=c2988e3e4f70d5901b234ff1c1363dcc"],"2023914":["http://www.threatexpert.com/report.aspx?md5=c2988e3e4f70d5901b234ff1c1363dcc"],"2023915":["http://www.threatexpert.com/report.aspx?md5=c2988e3e4f70d5901b234ff1c1363dcc"],"2023918":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023919":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023920":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023921":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023922":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023923":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023924":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023925":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023926":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023927":["http://www.threatexpert.com/report.aspx?md5=www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023928":["http://www.threatexpert.com/report.aspx?md5=www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023929":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023930":["http://www.threatexpert.com/report.aspx?md5=f3459924f8b657359cb0bd0984a1d0fa","http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023931":["http://www.threatexpert.com/report.aspx?md5=8f154d23ac2071d7f179959aaba37ad5","http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023933":["http://www.threatexpert.com/report.aspx?md5=d6ef9b0cdb49b56c53da3433e30f3fd6","http://www.threatexpert.com/report.aspx?md5=4ddf3ff57db24513a16eacb99ad07675","http://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/"],"2023934":["http://www.threatexpert.com/report.aspx?md5=4ddf3ff57db24513a16eacb99ad07675","http://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/"],"2023935":["http://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/"],"2023936":["http://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/"],"2023937":["http://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/"],"2023938":["http://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/"],"2023939":["http://securelist.com/blog/incidents/77562/breaking-the-weakest-link-of-the-strongest-chain/"],"2023940":["http://www.threatexpert.com/report.aspx?md5=ece5b62a4ed4e88dab4f1b5451f54794"],"2023941":["http://www.threatexpert.com/report.aspx?md5=2a0df97277ddb361cecf8726df6d78ac"],"2023942":["http://www.threatexpert.com/report.aspx?md5=2a0df97277ddb361cecf8726df6d78ac"],"2023943":["http://www.threatexpert.com/report.aspx?md5=2a0df97277ddb361cecf8726df6d78ac"],"2023944":["http://www.threatexpert.com/report.aspx?md5=45b0e5a457222455384713905f886bd4"],"2023945":["http://www.threatexpert.com/report.aspx?md5=45b0e5a457222455384713905f886bd4"],"2023946":["http://www.threatexpert.com/report.aspx?md5=45b0e5a457222455384713905f886bd4"],"2023947":["http://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-ReflectivePEInjection.ps1"],"2023948":["http://www.threatexpert.com/report.aspx?md5=97454efcab28e64ac5400e63780af764","http://researchcenter.paloaltonetworks.com/2017/01/unit42-second-wave-shamoon-2-attacks-identified/"],"2023949":["http://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-ReflectivePEInjection.ps1"],"2023950":["http://www.threatexpert.com/report.aspx?md5=012f79570f720b997b9ef4ef327dd2da","http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023951":["http://www.threatexpert.com/report.aspx?md5=ed9e14a932b28f1ebdc4cd5b549af9da","http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023952":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023953":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023954":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023955":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023956":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023957":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023958":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023959":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023960":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023961":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023962":["http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023963":["http://www.threatexpert.com/report.aspx?md5=3c8a142d2e3b84fb0d210250af77cc9b","http://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/"],"2023965":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023966":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023967":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2023968":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023969":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023970":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023971":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023972":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023973":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023974":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023975":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023976":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023977":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023978":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023979":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023980":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023981":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023982":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023983":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023984":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023985":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023986":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023987":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023988":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023989":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023990":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023991":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023992":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023993":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023994":["http://www.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar"],"2023995":["http://www.xexexe.cz/2015/02/bruteforcing-tp-link-routers-with.html"],"2023996":["http://www.xexexe.cz/2015/02/bruteforcing-tp-link-routers-with.html"],"2023998":["http://ransomwaretracker.abuse.ch","http://www.threatexpert.com/report.aspx?md5=f09e72e3c1c36192b22e15b59a13ee1c","http://blog.talosintelligence.com/2017/03/crypt0l0cker-torrentlocker-old-dog-new.html"],"2024004":["http://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity"],"2024005":["http://researchcenter.paloaltonetworks.com/2016/01/scarlet-mimic-years-long-espionage-targets-minority-activists/"],"2024022":["http://www.threatexpert.com/report.aspx?md5=58aee970b06e67c9047836710f28e205","http://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/"],"2024023":["http://www.threatexpert.com/report.aspx?md5=58aee970b06e67c9047836710f28e205","http://www.threatexpert.com/report.aspx?md5=8d6d246c5c660691c59405ee2914a020","http://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/"],"2024024":["http://www.threatexpert.com/report.aspx?md5=c56c677b52e795710e77aa2d4f12b70a","http://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/"],"2024025":["http://www.threatexpert.com/report.aspx?md5=2f0f78038c8a2f6177d266c62cadd756","http://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/"],"2024026":["http://www.threatexpert.com/report.aspx?md5=2f0f78038c8a2f6177d266c62cadd756","http://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/"],"2024027":["http://www.threatexpert.com/report.aspx?md5=1a81516780c2c5a966261cc47478133c","http://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/"],"2024028":["http://www.threatexpert.com/report.aspx?md5=d34912a19473fe41abdd4764e7bec5f9"],"2024029":["http://www.threatexpert.com/report.aspx?md5=2faf3040e8286d506144a0585d8f4162"],"2024030":["http://www.brokenbrowser.com/abusing-of-protocols/"],"2024031":["http://www.brokenbrowser.com/abusing-of-protocols/"],"2024034":["http://exploit-db.com/exploits/41443/"],"2024038":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5638","http://github.com/rapid7/metasploit-framework/issues/8064"],"2024039":["http://www.ambionics.io/blog/drupal-services-module-rce"],"2024056":["http://www.threatexpert.com/report.aspx?md5=116fbce554b25829b17b6e47990821b4"],"2024057":["http://a41l4.blogspot.ca/2017/03/polyflushiptables1434.html"],"2024058":["http://a41l4.blogspot.ca/2017/03/polysetuidexecve1434.html"],"2024062":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-7450"],"2024063":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-8523"],"2024064":["http://www.threatexpert.com/report.aspx?md5=121c1008d54e91db66feaf67b3d4084e","http://blog.trendmicro.com/trendlabs-security-intelligence/majikpos-combines-pos-malware-and-rats/"],"2024065":["http://exploit-db.com/exploits/41477/"],"2024066":["http://www.threatexpert.com/report.aspx?md5=121c1008d54e91db66feaf67b3d4084e","http://blog.trendmicro.com/trendlabs-security-intelligence/majikpos-combines-pos-malware-and-rats/"],"2024067":["http://www.threatexpert.com/report.aspx?md5=121c1008d54e91db66feaf67b3d4084e","http://blog.trendmicro.com/trendlabs-security-intelligence/majikpos-combines-pos-malware-and-rats/"],"2024068":["http://sslbl.abuse.ch"],"2024069":["http://sslbl.abuse.ch"],"2024070":["http://sslbl.abuse.ch"],"2024071":["http://sslbl.abuse.ch"],"2024072":["http://sslbl.abuse.ch"],"2024073":["http://sslbl.abuse.ch"],"2024074":["http://sslbl.abuse.ch"],"2024075":["http://sslbl.abuse.ch"],"2024076":["http://sslbl.abuse.ch"],"2024077":["http://sslbl.abuse.ch"],"2024078":["http://sslbl.abuse.ch"],"2024079":["http://sslbl.abuse.ch"],"2024080":["http://sslbl.abuse.ch"],"2024081":["http://sslbl.abuse.ch"],"2024082":["http://sslbl.abuse.ch"],"2024084":["http://sslbl.abuse.ch"],"2024085":["http://sslbl.abuse.ch"],"2024086":["http://sslbl.abuse.ch"],"2024087":["http://sslbl.abuse.ch"],"2024088":["http://sslbl.abuse.ch"],"2024089":["http://sslbl.abuse.ch"],"2024090":["http://sslbl.abuse.ch"],"2024091":["http://sslbl.abuse.ch"],"2024096":["http://community.hpe.com/t5/Security-Research/Struts2-046-A-new-vector/ba-p/6949723#.WNF-_kcpDUJ"],"2024099":["http://www.threatexpert.com/report.aspx?md5=219cf8b022d3933ba46f482478450f49"],"2024104":["http://ransomwaretracker.abuse.ch"],"2024105":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2024106":["http://www.threatexpert.com/report.aspx?md5=9377710d4787d1a9ee1c724dce8bf13a"],"2024107":["http://github.com/edwardz246003/IIS_exploit/blob/master/exploit.py"],"2024108":["http://www.forcepoint.com/blog/security-labs/trojanized-adobe-installer-used-install-dragonok%E2%80%99s-new-custom-backdoor"],"2024109":["http://www.threatexpert.com/report.aspx?md5=ad575f6795526f2ee5e730f76a3b5346"],"2024110":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024111":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024112":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024113":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024114":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024115":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024116":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024120":["http://www.threatexpert.com/report.aspx?md5=ad8a7a383971ce0f5fc51e909e406996"],"2024122":["http://www.threatexpert.com/report.aspx?md5=33018afc5ef9818eee0f3833d1f738b0"],"2024123":["http://www.zscaler.com/blogs/research/new-android-ransomware-bypasses-all-antivirus-programs"],"2024124":["http://blog.sucuri.net/2017/02/javascript-injections-leads-to-tech-support-scam.html","http://letsencrypt.org/about/"],"2024125":["http://blog.sucuri.net/2017/02/javascript-injections-leads-to-tech-support-scam.html","http://letsencrypt.org/about/"],"2024126":["http://blog.sucuri.net/2017/02/javascript-injections-leads-to-tech-support-scam.html","http://letsencrypt.org/about/"],"2024127":["http://blog.sucuri.net/2017/02/javascript-injections-leads-to-tech-support-scam.html","http://letsencrypt.org/about/"],"2024128":["http://blog.sucuri.net/2017/02/javascript-injections-leads-to-tech-support-scam.html","http://letsencrypt.org/about/"],"2024129":["http://blog.sucuri.net/2017/02/javascript-injections-leads-to-tech-support-scam.html","http://letsencrypt.org/about/"],"2024130":["http://blog.sucuri.net/2017/02/javascript-injections-leads-to-tech-support-scam.html","http://letsencrypt.org/about/"],"2024131":["http://blog.sucuri.net/2017/02/javascript-injections-leads-to-tech-support-scam.html","http://letsencrypt.org/about/"],"2024132":["http://blog.sucuri.net/2017/02/javascript-injections-leads-to-tech-support-scam.html","http://letsencrypt.org/about/"],"2024133":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024134":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024135":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024136":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024137":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024138":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024139":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024140":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024141":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024142":["http://blog.malwarebytes.com/cybercrime/2017/03/websites-compromised-decimal-ip-campaign/"],"2024143":["http://www.clearskysec.com/copykitten-jpost/"],"2024144":["http://www.clearskysec.com/copykitten-jpost/"],"2024145":["http://www.clearskysec.com/copykitten-jpost/"],"2024146":["http://www.clearskysec.com/copykitten-jpost/"],"2024147":["http://www.clearskysec.com/copykitten-jpost/"],"2024148":["http://www.clearskysec.com/copykitten-jpost/"],"2024149":["http://www.clearskysec.com/copykitten-jpost/"],"2024150":["http://www.clearskysec.com/copykitten-jpost/"],"2024151":["http://www.clearskysec.com/copykitten-jpost/"],"2024152":["http://www.clearskysec.com/copykitten-jpost/"],"2024153":["http://www.clearskysec.com/copykitten-jpost/"],"2024154":["http://www.clearskysec.com/copykitten-jpost/"],"2024155":["http://www.clearskysec.com/copykitten-jpost/"],"2024156":["http://www.clearskysec.com/copykitten-jpost/"],"2024157":["http://www.clearskysec.com/copykitten-jpost/"],"2024158":["http://www.clearskysec.com/copykitten-jpost/"],"2024159":["http://www.clearskysec.com/copykitten-jpost/"],"2024160":["http://www.clearskysec.com/copykitten-jpost/"],"2024161":["http://www.clearskysec.com/copykitten-jpost/"],"2024162":["http://www.clearskysec.com/copykitten-jpost/"],"2024163":["http://www.clearskysec.com/copykitten-jpost/"],"2024164":["http://www.clearskysec.com/copykitten-jpost/"],"2024165":["http://www.clearskysec.com/copykitten-jpost/"],"2024166":["http://www.clearskysec.com/copykitten-jpost/"],"2024168":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0189"],"2024169":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0189"],"2024170":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0189"],"2024171":["http://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-android-technical-analysis.pdf"],"2024172":["http://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-android-technical-analysis.pdf"],"2024173":["http://github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf","http://blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html"],"2024174":["http://github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf","http://blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html"],"2024175":["http://github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Red%20Leaves/Red%20Leaves%20technical%20note%20v1.0.pdf","http://blog.jpcert.or.jp/2017/04/redleaves---malware-based-on-open-source-rat.html"],"2024176":["http://blogs.forcepoint.com/security-labs/playing-cat-mouse-introducing-felismus-malware","http://www.threatexpert.com/report.aspx?md5=8de3f20d94611e0200c484e42093f447"],"2024177":["http://blogs.forcepoint.com/security-labs/playing-cat-mouse-introducing-felismus-malware","http://www.threatexpert.com/report.aspx?md5=8de3f20d94611e0200c484e42093f447"],"2024178":["http://www.threatexpert.com/report.aspx?md5=e5293a4da4b67be6ff2893f88c8ef757"],"2024179":["http://www.threatexpert.com/report.aspx?md5=656766ad934aa482cbe78f1bca6dadc2","http://securitykitten.github.io/an-evening-with-n3utrino/"],"2024181":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7398"],"2024182":["http://www.threatexpert.com/report.aspx?md5=32730022593ebd2c93126d34bc60b654"],"2024183":["http://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/"],"2024189":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024190":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024191":["http://github.com/reverse-shell/routersploit/blob/master/routersploit/modules/exploits/tplink/archer_c2_c20i_rce.py"],"2024194":["http://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/"],"2024196":["http://www.fireeye.com/blog/threat-research/2017/04/acknowledgement_ofa.html","http://securingtomorrow.mcafee.com/mcafee-labs/critical-office-zero-day-attacks-detected-wild/"],"2024201":["http://www.threatexpert.com/report.aspx?md5=bc76d516a66e4002461128f62896c6dd"],"2024202":["http://www.threatexpert.com/report.aspx?md5=bc76d516a66e4002461128f62896c6dd"],"2024203":["http://isc.sans.edu/forums/diary/Malspam+on+20170411+pushes+yet+another+ransomware+variant/22290/","http://www.threatexpert.com/report.aspx?md5=31c2e85ef5e4c0009e1f18794527b4ca"],"2024204":["http://www.threatexpert.com/report.aspx?md5=b991a99335b01bed8da4401fee1f2d45"],"2024205":["http://www.threatexpert.com/report.aspx?md5=53f6f9a0d0867c10841b815a1eea1468"],"2024206":["http://www.threatexpert.com/report.aspx?md5=aa0b114a64683d89f62d26a088e164f6"],"2024223":["http://www.threatexpert.com/report.aspx?md5=70c27926e54732a579b0004ede566fc6","http://github.com/ShaneNolan/Runsome"],"2024224":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0199"],"2024225":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-0199"],"2024226":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-0199"],"2024227":["http://isc.sans.edu/forums/diary/Tool+to+Detect+Active+Phishing+Attacks+Using+Unicode+LookAlike+Domains/22310/","http://letsencrypt.org/about/"],"2024233":["http://www.threatexpert.com/report.aspx?md5=26b21902548e3b821387c90d729bace6"],"2024234":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-9091","http://www.exploit-db.com/exploits/41785/","http://bto.bluecoat.com/security-advisory/sa138"],"2024235":["http://www.threatexpert.com/report.aspx?md5=18c1c99412549815bdb89c36316243a7"],"2024237":["http://researchcenter.paloaltonetworks.com/2017/01/unit42-campaign-evolution-eitest-october-december-2016/"],"2024238":["http://www.proofpoint.com/us/threat-insight/post/EITest-Nabbing-Chrome-Users-Chrome-Font-Social-Engineering-Scheme"],"2024239":["http://www.threatexpert.com/report.aspx?md5=05427ed1c477cc01910eb9adbf35068d"],"2024241":["http://blog.netlab.360.com/a-new-threat-an-iot-botnet-scanning-internet-on-port-81-en/"],"2024242":["http://blog.netlab.360.com/a-new-threat-an-iot-botnet-scanning-internet-on-port-81-en/","http://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html"],"2024243":["http://blog.netlab.360.com/a-new-threat-an-iot-botnet-scanning-internet-on-port-81-en/"],"2024244":["http://blog.netlab.360.com/a-new-threat-an-iot-botnet-scanning-internet-on-port-81-en/"],"2024245":["http://blog.netlab.360.com/a-new-threat-an-iot-botnet-scanning-internet-on-port-81-en/"],"2024246":["http://www.threatexpert.com/report.aspx?md5=f652968bfe0861b56c8bdc111d902512"],"2024249":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024250":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024251":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024252":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024253":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024254":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024255":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024256":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024257":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024258":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024259":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024261":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024262":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2024263":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024264":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024265":["http://www.skepticism.us/2015/05/new-malware-user-agent-value-jorgee/"],"2024270":["http://www.threatexpert.com/report.aspx?md5=7a778e076e48ff269e91f17a15ea97d5","http://researchcenter.paloaltonetworks.com/2017/05/unit42-kazuar-multiplatform-espionage-backdoor-api-access/"],"2024271":["http://blog.fox-it.com/2017/05/03/snake-coming-soon-in-mac-os-x-flavour/"],"2024272":["http://www.threatexpert.com/report.aspx?md5=dacdcd451204265ad6f44ef99db1f371"],"2024273":["http://www.threatexpert.com/report.aspx?md5=816db8a1916201309d2a24b4a745305b","http://blogs.rsa.com/supercmd-rat/"],"2024274":["http://blog.fortinet.com/2017/05/03/deep-analysis-of-new-emotet-variant-part-1","http://www.cyphort.com/emotet-cookies-c2-fakes-404/","http://blogs.forcepoint.com/security-labs/new-variant-geodoemotet-banking-malware-targets-uk","http://www.threatexpert.com/report.aspx?md5=21542133a586782e7c2fa4286d98fd73"],"2024275":["http://blog.fortinet.com/2017/05/03/deep-analysis-of-new-emotet-variant-part-1","http://www.cyphort.com/emotet-cookies-c2-fakes-404/","http://blogs.forcepoint.com/security-labs/new-variant-geodoemotet-banking-malware-targets-uk","http://www.threatexpert.com/report.aspx?md5=21542133a586782e7c2fa4286d98fd73"],"2024276":["http://www.threatexpert.com/report.aspx?md5=e8c6d686249fc3c6df3dc88ea2cddf02"],"2024278":["http://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html"],"2024279":["http://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html"],"2024280":["http://www.threatexpert.com/report.aspx?md5=2e0ebb7a21d16ab6fa908f74bee260d6"],"2024283":["http://github.com/joshdick/miniProxy"],"2024284":["http://objective-see.com/blog/blog_0x1D.html"],"2024286":["http://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html"],"2024287":["http://mjg59.dreamwidth.org/48429.html","http://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5689"],"2024288":["http://blogs.forcepoint.com/security-labs/jaff-enters-ransomware-scene-locky-style","http://www.threatexpert.com/report.aspx?md5=942c6a039724ed5326c3c247bfce3461"],"2024289":["http://www.threatexpert.com/report.aspx?md5=924c84415b775af12a10366469d3df69","http://blog.dynamoo.com/2017/05/malware-spam-with-nmpdf-attachment.html"],"2024290":["http://www.threatexpert.com/report.aspx?md5=924c84415b775af12a10366469d3df69","http://blog.dynamoo.com/2017/05/malware-spam-with-nmpdf-attachment.html"],"2024291":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024293":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024294":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024295":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024296":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024297":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143"],"2024298":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024299":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024300":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024301":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024302":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0144","http://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis","http://www.bleepingcomputer.com/news/security/telefonica-tells-employees-to-shut-down-computers-amid-massive-ransomware-outbreak/"],"2024303":["http://defensecode.com/news_article.php?id=21"],"2024304":["http://www.threatexpert.com/report.aspx?md5=9bee9fbe8c87f491ed31e94bb0c2e06f"],"2024305":["http://bugzilla.mozilla.org/show_bug.cgi?id=1246773"],"2024308":["http://seclists.org/fulldisclosure/2017/May/27"],"2024309":["http://seclists.org/fulldisclosure/2017/May/27"],"2024310":["http://seclists.org/fulldisclosure/2017/May/27"],"2024320":["http://www.threatexpert.com/report.aspx?md5=980342a5a783d7f6ce188c575d9ca97a"],"2024321":["http://www.threatexpert.com/report.aspx?md5=15167239effdfb68bb10467eeea2f24d"],"2024322":["http://www.threatexpert.com/report.aspx?md5=15167239effdfb68bb10467eeea2f24d"],"2024324":["http://www.bleepingcomputer.com/news/security/spora-ransomware-works-offline-has-the-most-sophisticated-payment-site-as-of-yet/","http://www.threatexpert.com/report.aspx?md5=906c51a18073112c4479b3fe4ea329ca"],"2024325":["http://www.threatexpert.com/report.aspx?md5=502cb33a03c29a96a4c32ec26dce5395"],"2024330":["http://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html"],"2024331":["http://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html"],"2024332":["http://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html"],"2024333":["http://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html"],"2024334":["http://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html"],"2024335":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7494","http://github.com/rapid7/metasploit-framework/pull/8450"],"2024336":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7494","http://github.com/rapid7/metasploit-framework/pull/8450"],"2024337":["http://www.securitytracker.com/id/1038575"],"2024338":["http://www.threatexpert.com/report.aspx?md5=51cf3452feb218a4b1295cebf3b2130e"],"2024339":["http://www.threatexpert.com/report.aspx?md5=51cf3452feb218a4b1295cebf3b2130e"],"2024340":["http://blogs.forcepoint.com/security-labs/jaff-enters-ransomware-scene-locky-style","http://www.threatexpert.com/report.aspx?md5=51cf3452feb218a4b1295cebf3b2130e"],"2024341":["http://www.threatexpert.com/report.aspx?md5=51cf3452feb218a4b1295cebf3b2130e","http://blog.dynamoo.com/2017/05/malware-spam-with-nmpdf-attachment.html"],"2024342":["http://blog.sucuri.net/2017/05/sql-injection-vulnerability-joomla-3-7.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8917"],"2024348":["http://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection","http://www.threatexpert.com/report.aspx?md5=69ffdf99149d19be7dc1c52f33aaa651"],"2024349":["http://blog.malwarebytes.com/cybercrime/2017/05/roughted-the-anti-ad-blocker-malvertiser"],"2024350":["http://blog.malwarebytes.com/cybercrime/2017/05/roughted-the-anti-ad-blocker-malvertiser"],"2024351":["http://www.threatexpert.com/report.aspx?md5=eec4f84d12139add6d6ebf3b8c72fff7"],"2024352":["http://www.threatexpert.com/report.aspx?md5=2aa11c090fd0737e52cd532418c1211e"],"2024368":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9324"],"2024369":["http://www.threatexpert.com/report.aspx?md5=0cc901350eaffb8f84b920691460921f"],"2024373":["http://www.threatexpert.com/report.aspx?md5=e8af7ef13b6ced37d08dce0f747d7d8b"],"2024376":["http://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf"],"2024379":["http://www.adobe.com/software/flash/about/"],"2024382":["http://www.us-cert.gov/ncas/alerts/TA17-164A"],"2024383":["http://www.us-cert.gov/ncas/alerts/TA17-164A"],"2024384":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7494"],"2024404":["http://www.tenable.com/blog/rooting-a-printer-from-security-bulletin-to-remote-code-execution","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-2741"],"2024405":["http://citizenlab.org/2017/06/reckless-exploit-mexico-nso/"],"2024406":["http://citizenlab.org/2017/06/reckless-exploit-mexico-nso/"],"2024407":["http://citizenlab.org/2017/06/reckless-exploit-mexico-nso/"],"2024408":["http://citizenlab.org/2017/06/reckless-exploit-mexico-nso/"],"2024409":["http://citizenlab.org/2017/06/reckless-exploit-mexico-nso/"],"2024410":["http://citizenlab.org/2017/06/reckless-exploit-mexico-nso/"],"2024411":["http://www.threatexpert.com/report.aspx?md5=66a1dda748d073f5e659b700339c3343","http://www.zscaler.com/blogs/research/malicious-android-ads-leading-drive-downloads"],"2024412":["http://respectxss.blogspot.fr/2017/06/a-look-at-cve-2017-8514-sharepoints.html"],"2024413":["http://www.threatexpert.com/report.aspx?md5=8168b2305289ecc778216405d1fd7984","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0199"],"2024416":["http://beefproject.com"],"2024417":["http://www.threatexpert.com/report.aspx?md5=6443d8351f5ed62836003f103d8de20e"],"2024418":["http://www.threatexpert.com/report.aspx?md5=404518f469a0ca85017136b6b5166ae3"],"2024419":["http://www.cylance.com/en_us/blog/breaking-down-ff-rat-malware.html"],"2024420":["http://www.threatexpert.com/report.aspx?md5=dbba37d4aec066a525f9cf3d9bdb27d8"],"2024423":["http://www.threatexpert.com/report.aspx?md5=3d5a4b51ff4ad8534873e02720aeff34"],"2024424":["http://www.threatexpert.com/report.aspx?md5=3d5a4b51ff4ad8534873e02720aeff34"],"2024425":["http://www.threatexpert.com/report.aspx?md5=researchcenter.paloaltonetworks.com/2017/06/unit42-new-improved-macos-backdoor-oceanlotus/"],"2024426":["http://www.threatexpert.com/report.aspx?md5=e9542a8bd9f0ab57e40bb8519ac443a2"],"2024427":["http://www.threatexpert.com/report.aspx?md5=f136f9ec7f7f8cb1a12a9b835183be59","http://www.malware-traffic-analysis.net/2017/06/08/index.html"],"2024429":["http://www.threatexpert.com/report.aspx?md5=d10d6d2a29dd27b44e015dd6bf4cb346"],"2024433":["http://www.threatexpert.com/report.aspx?md5=02c1da1c668ac71995f56c2c198d7d73"],"2024435":["http://blog.fortinet.com/2017/06/14/wins-server-remote-memory-corruption-vulnerability-in-microsoft-windows-server"],"2024436":["http://www.threatexpert.com/report.aspx?md5=6886a2ebbde724f156a8f8dc17a6639c"],"2024437":["http://ransomwaretracker.abuse.ch"],"2024438":["http://ransomwaretracker.abuse.ch"],"2024439":["http://ransomwaretracker.abuse.ch"],"2024440":["http://ransomwaretracker.abuse.ch"],"2024441":["http://www.threatexpert.com/report.aspx?md5=d360ee49950e7da3978379494667260c"],"2024442":["http://www.threatexpert.com/report.aspx?md5=d360ee49950e7da3978379494667260c"],"2024443":["http://twitter.com/V_Baczynski/status/881051849700364288"],"2024449":["http://www.threatexpert.com/report.aspx?md5=66a42e338e32fb6c02c9d4c56760d89d"],"2024452":["http://www.threatexpert.com/report.aspx?md5=23646295E98BD8FA022299374E4F76E0"],"2024454":["http://www.threatexpert.com/report.aspx?md5=4bc4b071d9a7e482f3ecf8b2cbe10873"],"2024455":["http://www.threatexpert.com/report.aspx?md5=4bc4b071d9a7e482f3ecf8b2cbe10873"],"2024456":["http://www.protectwise.com/blog/winnti-evolution-going-open-source.html"],"2024457":["http://www.protectwise.com/blog/winnti-evolution-going-open-source.html"],"2024458":["http://www.protectwise.com/blog/winnti-evolution-going-open-source.html"],"2024459":["http://www.protectwise.com/blog/winnti-evolution-going-open-source.html"],"2024460":["http://www.protectwise.com/blog/winnti-evolution-going-open-source.html"],"2024461":["http://www.threatexpert.com/report.aspx?md5=0ad35a566cfb60959576835ede75983b","http://www.arbornetworks.com/blog/asert/lockpos-joins-flock/"],"2024465":["http://www.threatexpert.com/report.aspx?md5=80317e3194d8f7fd495b0bf06cae2295"],"2024467":["http://www.threatexpert.com/report.aspx?md5=a5ecf27bfab7fbb1ace3ec9a390b23bd"],"2024468":["http://securityonline.info/tutorial-cve-2017-9791-apache-struts2-s2-048-remote-code-execution-vulnerability/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9791"],"2024469":["http://www.threatexpert.com/report.aspx?md5=2f60c2dc9b89a78a450839ded2a1737a"],"2024471":["http://www.threatexpert.com/report.aspx?md5=3b24a327e60ee77668d09e5b96e27dc8"],"2024472":["http://citizenlab.ca/2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites"],"2024473":["http://citizenlab.ca/2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites"],"2024474":["http://citizenlab.ca/2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites"],"2024475":["http://citizenlab.ca/2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites"],"2024476":["http://citizenlab.ca/2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites"],"2024477":["http://citizenlab.ca/2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites"],"2024478":["http://citizenlab.ca/2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites"],"2024479":["http://citizenlab.ca/2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites"],"2024482":["http://labs.bitdefender.com/2017/07/inexsmar-an-unusual-darkhotel-campaign/"],"2024483":["http://labs.bitdefender.com/2017/07/inexsmar-an-unusual-darkhotel-campaign/"],"2024484":["http://www.threatexpert.com/report.aspx?md5=b8889db7b4ef74c9302c12781a92a23a"],"2024485":["http://www.threatexpert.com/report.aspx?md5=2067d1cb1a25c6d6d371339fad9123ba"],"2024486":["http://www.threatexpert.com/report.aspx?md5=7a8c9fbfad9a817c0a10fed926f134c2"],"2024487":["http://gist.github.com/vulnersCom/65fe44d27d29d7a5de4c176baba45759"],"2024488":["http://gist.github.com/vulnersCom/65fe44d27d29d7a5de4c176baba45759"],"2024489":["http://www.threatexpert.com/report.aspx?md5=d01229914a6b57387e2c963e3aadbc1f"],"2024490":["http://gist.github.com/vulnersCom/65fe44d27d29d7a5de4c176baba45759","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0199"],"2024491":["http://www.threatexpert.com/report.aspx?md5=7a8c9fbfad9a817c0a10fed926f134c2"],"2024492":["http://www.threatexpert.com/report.aspx?md5=7a8c9fbfad9a817c0a10fed926f134c2"],"2024495":["http://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf"],"2024496":["http://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf","http://www.threatexpert.com/report.aspx?md5=752240cddda5acb5e8d026cef82e2b54"],"2024497":["http://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf","http://www.threatexpert.com/report.aspx?md5=752240cddda5acb5e8d026cef82e2b54"],"2024498":["http://www.threatexpert.com/report.aspx?md5=113ca319e85778b62145019359380a08","http://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf"],"2024499":["http://www.threatexpert.com/report.aspx?md5=98376de10118892f0773617da137c2be","http://www.threatexpert.com/report.aspx?md5=599ea45f5420f948e0836239eb3ce772"],"2024500":["http://www.threatexpert.com/report.aspx?md5=3f652d9bc17a4be3c0e497ea19848344"],"2024501":["http://www.threatexpert.com/report.aspx?md5=3f652d9bc17a4be3c0e497ea19848344"],"2024502":["http://www.threatexpert.com/report.aspx?md5=a70a08a1e17b820c7dc8ee1247d6bfa2","http://researchcenter.paloaltonetworks.com/2017/07/unit42-oilrig-uses-ismdoor-variant-possibly-linked-greenbug-threat-group/"],"2024503":["http://www.threatexpert.com/report.aspx?md5=a70a08a1e17b820c7dc8ee1247d6bfa2","http://researchcenter.paloaltonetworks.com/2017/07/unit42-oilrig-uses-ismdoor-variant-possibly-linked-greenbug-threat-group/"],"2024504":["http://www.threatexpert.com/report.aspx?md5=a70a08a1e17b820c7dc8ee1247d6bfa2","http://researchcenter.paloaltonetworks.com/2017/07/unit42-oilrig-uses-ismdoor-variant-possibly-linked-greenbug-threat-group/"],"2024505":["http://github.com/ryhanson/phishery"],"2024506":["http://www.threatexpert.com/report.aspx?md5=4daca05b0015efeaacebc58d007c32c4"],"2024507":["http://www.threatexpert.com/report.aspx?md5=263a2cf88f340b2a755db749be1371ea"],"2024508":["http://www.threatexpert.com/report.aspx?md5=cb558b04216e0e7a9c936945ebee6611"],"2024509":["http://reference:url,blog.trendmicro.com/trendlabs-security-intelligence/leakerlocker-mobile-ransomware-threatens-expose-user-information/"],"2024511":["http://isc.sans.edu/forums/diary/SMBLoris+the+new+SMB+flaw/22662/"],"2024512":["http://blog.trendmicro.com/trendlabs-security-intelligence/look-js_powmet-completely-fileless-malware","http://www.threatexpert.com/report.aspx?md5=31f83bf81b139bcc69e51df2c76a0bf2"],"2024513":["http://github.com/ptresearch/AttackDetection"],"2024516":["http://twitter.com/benkow_/status/884322124504211456","http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024517":["http://twitter.com/benkow_/status/884322124504211456","http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024518":["http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024519":["http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024520":["http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024521":["http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024522":["http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024523":["http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024524":["http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024525":["http://blog.emsisoft.com/2017/05/01/remove-cry128-ransomware-with-emsisofts-free-decrypter/","http://www.cyber.nj.gov/threat-profiles/ransomware-variants/crypt-on"],"2024528":["http://www.threatexpert.com/report.aspx?md5=53d3ee595bc5df7e97403906f1415c21"],"2024530":["http://objective-see.com/blog/blog_0x20.html"],"2024531":["http://www.threatexpert.com/report.aspx?md5=523de838dd44cdd6f212d36c142d830c"],"2024533":["http://github.com/ptresearch/AttackDetection"],"2024543":["http://www.threatexpert.com/report.aspx?md5=c714c3fe13e515a85774b03787ee9d85"],"2024548":["http://cxsecurity.com/issue/WLB-2017080038"],"2024549":["http://www.carbonblack.com/2016/04/28/threat-advisory-squiblydoo-continues-trend-of-attackers-using-native-os-tools-to-live-off-the-land/"],"2024550":["http://www.carbonblack.com/2016/04/28/threat-advisory-squiblydoo-continues-trend-of-attackers-using-native-os-tools-to-live-off-the-land/"],"2024551":["http://www.carbonblack.com/2016/04/28/threat-advisory-squiblydoo-continues-trend-of-attackers-using-native-os-tools-to-live-off-the-land/"],"2024553":["http://www.carbonblack.com/2016/04/28/threat-advisory-squiblydoo-continues-trend-of-attackers-using-native-os-tools-to-live-off-the-land/"],"2024584":["http://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/cldap-threat-advisory.pdf","http://packetstormsecurity.com/files/139561/LDAP-Amplication-Denial-Of-Service.html"],"2024585":["http://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/cldap-threat-advisory.pdf","http://packetstormsecurity.com/files/139561/LDAP-Amplication-Denial-Of-Service.html"],"2024588":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024589":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024590":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024591":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024592":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024593":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024594":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024595":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024596":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024597":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024598":["http://securelist.com/shadowpad-in-corporate-networks/81432/"],"2024600":["http://www.threatexpert.com/report.aspx?md5=5285f1adfc0013fa86218a7d76c0016d"],"2024601":["http://www.threatexpert.com/report.aspx?md5=eae5b16bef5f7dc37909ec91367fa807","http://blog.jpcert.or.jp/2017/08/detecting-datper-malware-from-proxy-logs.html"],"2024602":["http://www.carbonblack.com/2016/04/28/threat-advisory-squiblydoo-continues-trend-of-attackers-using-native-os-tools-to-live-off-the-land/"],"2024603":["http://www.bleepingcomputer.com/news/security/spora-ransomware-works-offline-has-the-most-sophisticated-payment-site-as-of-yet/","http://www.threatexpert.com/report.aspx?md5=41de296c5bcfc24fc0f16b1e997d9aa5"],"2024613":["http://sentinelone.com/blog/osx-pwnet-a-csgo-hack-and-sneaky-miner/"],"2024615":["http://www.threatexpert.com/report.aspx?md5=6af299a2ac9b59f7d551b6e235e0d200","http://blog.cloudflare.com/the-wirex-botnet/"],"2024619":["http://blog.macnica.net/blog/2017/08/post-fb81.html"],"2024620":["http://www.threatexpert.com/report.aspx?md5=812d3c4fddf9bb81d507397345a29bb0","http://www.clearskysec.com/ismagent/"],"2024625":["http://www.threatexpert.com/report.aspx?md5=f392c55f636e93f4b72f1a2aa5022730"],"2024626":["http://files.deependresearch.org/feeds/ransomware/ransomware-payment-sites.txt"],"2024627":["http://files.deependresearch.org/feeds/ransomware/ransomware-payment-sites.txt"],"2024628":["http://files.deependresearch.org/feeds/ransomware/ransomware-payment-sites.txt"],"2024629":["http://files.deependresearch.org/feeds/ransomware/ransomware-payment-sites.txt"],"2024630":["http://files.deependresearch.org/feeds/ransomware/ransomware-payment-sites.txt"],"2024631":["http://files.deependresearch.org/feeds/ransomware/ransomware-payment-sites.txt"],"2024632":["http://files.deependresearch.org/feeds/ransomware/ransomware-payment-sites.txt"],"2024633":["http://files.deependresearch.org/feeds/ransomware/ransomware-payment-sites.txt"],"2024634":["http://files.deependresearch.org/feeds/ransomware/ransomware-payment-sites.txt"],"2024635":["http://ransomwaretracker.abuse.ch"],"2024636":["http://ransomwaretracker.abuse.ch"],"2024637":["http://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdf"],"2024641":["http://securelist.com/introducing-whitebear/81638/"],"2024642":["http://securelist.com/introducing-whitebear/81638/"],"2024651":["http://www.threatexpert.com/report.aspx?md5=94911666a61beb59d2988c4fc7003e5a","http://www.zscaler.com/blogs/research/cobian-rat-backdoored-rat"],"2024652":["http://www.threatexpert.com/report.aspx?md5=94911666a61beb59d2988c4fc7003e5a","http://www.zscaler.com/blogs/research/cobian-rat-backdoored-rat"],"2024653":["http://www.threatexpert.com/report.aspx?md5=94911666a61beb59d2988c4fc7003e5a","http://www.zscaler.com/blogs/research/cobian-rat-backdoored-rat"],"2024654":["http://www.threatexpert.com/report.aspx?md5=94911666a61beb59d2988c4fc7003e5a","http://www.zscaler.com/blogs/research/cobian-rat-backdoored-rat"],"2024655":["http://www.threatexpert.com/report.aspx?md5=94911666a61beb59d2988c4fc7003e5a","http://www.zscaler.com/blogs/research/cobian-rat-backdoored-rat"],"2024658":["http://researchcenter.paloaltonetworks.com/2017/08/unit42-updated-khrat-malware-used-in-cambodia-attacks/"],"2024659":["http://www.threatexpert.com/report.aspx?md5=ade4d8f0447dac5a8edd14c3d44f410d"],"2024662":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2024663":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024664":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024666":["http://www.threatexpert.com/report.aspx?md5=8acaa375c2146224d628bb408c3902ff"],"2024667":["http://www.threatexpert.com/report.aspx?md5=8acaa375c2146224d628bb408c3902ff"],"2024668":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024669":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024670":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024671":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024672":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024673":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024674":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024675":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement"],"2024679":["http://www.threatexpert.com/report.aspx?md5=92c3157d76c67668ca815541c6bb3ba8"],"2024680":["http://www.threatexpert.com/report.aspx?md5=7a57fcc1afab791f9995fbc479fe340e"],"2024681":["http://sslbl.abuse.ch"],"2024682":["http://sslbl.abuse.ch"],"2024683":["http://sslbl.abuse.ch"],"2024684":["http://sslbl.abuse.ch"],"2024685":["http://sslbl.abuse.ch"],"2024686":["http://sslbl.abuse.ch"],"2024687":["http://sslbl.abuse.ch"],"2024689":["http://www.garykessler.net/library/file_sigs.html"],"2024690":["http://www.garykessler.net/library/file_sigs.html"],"2024692":["http://www.threatexpert.com/report.aspx?md5=92c3157d76c67668ca815541c6bb3ba8"],"2024693":["http://www.threatexpert.com/report.aspx?md5=681501695c12112aaf2129ab614481bd","http://www.threatexpert.com/report.aspx?md5=1282b899c41b06dac0adb17e0e603d30"],"2024700":["http://www.proofpoint.com/us/threat-insight/post/EITest-Nabbing-Chrome-Users-Chrome-Font-Social-Engineering-Scheme"],"2024708":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024709":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024710":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024711":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024712":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024713":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024714":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024715":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024716":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024717":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024718":["http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html"],"2024719":["http://www.threatexpert.com/report.aspx?md5=74a3c324a8565d7f567763bee960bcca"],"2024720":["http://coin-hive.com"],"2024722":["http://blog.0day.rocks/malicious-chrome-extension-meddling-with-your-searches-581aa56ddc9c"],"2024723":["http://blog.0day.rocks/malicious-chrome-extension-meddling-with-your-searches-581aa56ddc9c"],"2024724":["http://blog.0day.rocks/malicious-chrome-extension-meddling-with-your-searches-581aa56ddc9c"],"2024725":["http://blog.0day.rocks/malicious-chrome-extension-meddling-with-your-searches-581aa56ddc9c"],"2024726":["http://blog.0day.rocks/malicious-chrome-extension-meddling-with-your-searches-581aa56ddc9c"],"2024727":["http://blog.0day.rocks/malicious-chrome-extension-meddling-with-your-searches-581aa56ddc9c"],"2024728":["http://ransomwaretracker.abuse.ch"],"2024730":["http://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html"],"2024731":["http://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html"],"2024732":["http://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html"],"2024733":["http://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html"],"2024734":["http://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html"],"2024735":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024736":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024737":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024738":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024739":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024740":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024741":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024742":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024743":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024744":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024745":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024746":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024747":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024748":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024749":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024750":["http://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot"],"2024757":["http://www.threatexpert.com/report.aspx?md5=69f8181bfe4a53d9e0b73c81a4ae4587"],"2024758":["http://www.threatexpert.com/report.aspx?md5=52c193a7994a6bb55ec85addc8987c10"],"2024760":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798"],"2024761":["http://blog.malwarebytes.com/detections/adware-searchgo/"],"2024762":["http://blog.malwarebytes.com/detections/adware-searchgo/"],"2024765":["http://www.threatexpert.com/report.aspx?md5=b66010a9c91b17f4d26dc973a97419ac","http://info.phishlabs.com/blog/redalert2-mobile-banking-trojan-actively-updating-its-techniques"],"2024779":["http://www.welivesecurity.com/2017/09/14/cryptocurrency-web-mining-union-profit/"],"2024781":["http://www.threatexpert.com/report.aspx?md5=cb066c5625aa85957d6b8d4caef4e497","http://thisissecurity.stormshield.com/2017/09/28/analyzing-form-grabber-malware-targeting-browsers"],"2024789":["http://github.com/nccgroup/Cyber-Defence/blob/master/Signatures/suricata/2017_09_monero_malware.txt","http://www.welivesecurity.com/2017/09/28/monero-money-mining-malware/"],"2024803":["http://cdn.securelist.com/files/2017/10/Guerrero-Saade-Raiu-VB2017.pdf"],"2024804":["http://cdn.securelist.com/files/2017/10/Guerrero-Saade-Raiu-VB2017.pdf"],"2024805":["http://cdn.securelist.com/files/2017/10/Guerrero-Saade-Raiu-VB2017.pdf"],"2024806":["http://cdn.securelist.com/files/2017/10/Guerrero-Saade-Raiu-VB2017.pdf"],"2024808":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12617","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12615"],"2024809":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12617","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12615"],"2024810":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12617","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12615"],"2024811":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12617","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12615"],"2024812":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12617","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12615"],"2024813":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12617","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12615"],"2024816":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024817":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024818":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024819":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024820":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024821":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024822":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024823":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024824":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024825":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024826":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024827":["http://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/"],"2024829":["http://www.w3.org/Submission/EOT/#FileFormat"],"2024837":["http://github.com/ptresearch/AttackDetection"],"2024840":["http://blog.talosintelligence.com/2017/10/dnsmessenger-sec-campaign.html"],"2024843":["http://github.com/mazen160/struts-pwn_CVE-2017-9805/blob/master/struts-pwn.py","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9805","http://paladion.net/paladion-cyber-labs-discovers-a-new-ransomware/"],"2024848":["http://www.threatexpert.com/report.aspx?md5=f886dbf6bd47a0a015ef40fc2bed03a2"],"2024851":["http://401trg.pw/an-update-on-winnti/"],"2024852":["http://401trg.pw/an-update-on-winnti/"],"2024853":["http://401trg.pw/an-update-on-winnti/"],"2024854":["http://401trg.pw/an-update-on-winnti/"],"2024855":["http://401trg.pw/an-update-on-winnti/"],"2024856":["http://401trg.pw/an-update-on-winnti/"],"2024857":["http://401trg.pw/an-update-on-winnti/"],"2024858":["http://401trg.pw/an-update-on-winnti/"],"2024859":["http://401trg.pw/an-update-on-winnti/"],"2024860":["http://401trg.pw/an-update-on-winnti/"],"2024861":["http://401trg.pw/an-update-on-winnti/"],"2024862":["http://401trg.pw/an-update-on-winnti/"],"2024863":["http://401trg.pw/an-update-on-winnti/"],"2024865":["http://401trg.pw/an-update-on-winnti/"],"2024866":["http://401trg.pw/an-update-on-winnti/"],"2024867":["http://401trg.pw/an-update-on-winnti/"],"2024869":["http://401trg.pw/an-update-on-winnti/"],"2024870":["http://401trg.pw/an-update-on-winnti/"],"2024871":["http://401trg.pw/an-update-on-winnti/"],"2024872":["http://401trg.pw/an-update-on-winnti/"],"2024873":["http://401trg.pw/an-update-on-winnti/"],"2024874":["http://401trg.pw/an-update-on-winnti/"],"2024875":["http://401trg.pw/an-update-on-winnti/"],"2024876":["http://401trg.pw/an-update-on-winnti/"],"2024877":["http://401trg.pw/an-update-on-winnti/"],"2024884":["http://www.exploit-db.com/exploits/43009/"],"2024885":["http://www.exploit-db.com/exploits/43009/"],"2024886":["http://www.exploit-db.com/exploits/43009/"],"2024887":["http://www.exploit-db.com/exploits/43009/"],"2024888":["http://www.welivesecurity.com/2017/10/20/osx-proton-supply-chain-attack-elmedia"],"2024889":["http://www.welivesecurity.com/2017/10/20/osx-proton-supply-chain-attack-elmedia"],"2024890":["http://www.welivesecurity.com/2017/10/20/osx-proton-supply-chain-attack-elmedia"],"2024891":["http://www.welivesecurity.com/2017/10/20/osx-proton-supply-chain-attack-elmedia"],"2024892":["http://www.welivesecurity.com/2017/10/20/osx-proton-supply-chain-attack-elmedia"],"2024893":["http://www.welivesecurity.com/2017/10/20/osx-proton-supply-chain-attack-elmedia"],"2024894":["http://www.threatexpert.com/report.aspx?md5=8943e71a8c73b5e343aa9d2e19002373"],"2024895":["http://www.threatexpert.com/report.aspx?md5=9027f111377598362972745478e40311","http://blog.lookout.com/mobile-threat-jaderat"],"2024896":["http://www.threatexpert.com/report.aspx?md5=9027f111377598362972745478e40311","http://blog.lookout.com/mobile-threat-jaderat"],"2024898":["http://www.us-cert.gov/ncas/alerts/TA17-293A","http://www.us-cert.gov/sites/default/files/publications/MIFR-10128883_TLP_WHITE.pdf"],"2024899":["http://www.us-cert.gov/ncas/alerts/TA17-293A","http://www.us-cert.gov/sites/default/files/publications/MIFR-10128883_TLP_WHITE.pdf"],"2024900":["http://www.threatexpert.com/report.aspx?md5=4f03e360be488a3811d40c113292bc01"],"2024901":["http://www.threatexpert.com/report.aspx?md5=2c6cd25a31fe097ee7532422fc8eedc8"],"2024902":["http://www.threatexpert.com/report.aspx?md5=3b79f06be1f6909149bcadfaacfad2d0"],"2024903":["http://www.threatexpert.com/report.aspx?md5=aa50e2ce1fc07ccfbc6b916ccdbfd19b"],"2024907":["http://www.threatexpert.com/report.aspx?md5=4f03e360be488a3811d40c113292bc01"],"2024908":["http://www.threatexpert.com/report.aspx?md5=4f03e360be488a3811d40c113292bc01"],"2024909":["http://www.threatexpert.com/report.aspx?md5=4f03e360be488a3811d40c113292bc01"],"2024910":["http://www.threatexpert.com/report.aspx?md5=fbbdc39af1139aebba4da004475e8839"],"2024911":["http://www.welivesecurity.com/2017/10/24/bad-rabbit-not-petya-back/","http://www.fireeye.com/blog/threat-research/2017/10/backswing-pulling-a-badrabbit-out-of-a-hat.html"],"2024912":["http://www.welivesecurity.com/2017/10/24/bad-rabbit-not-petya-back/"],"2024913":["http://blogs.securiteam.com/index.php/archives/3364"],"2024914":["http://blogs.securiteam.com/index.php/archives/3409"],"2024915":["http://blogs.securiteam.com/index.php/archives/3445"],"2024916":["http://seclists.org/bugtraq/2013/Jun/8"],"2024917":["http://github.com/Trietptm-on-Security/AVTECH"],"2024918":["http://github.com/Trietptm-on-Security/AVTECH"],"2024919":["http://github.com/Trietptm-on-Security/AVTECH"],"2024920":["http://github.com/Trietptm-on-Security/AVTECH"],"2024921":["http://blog.netlab.360.com/iot_reaper-a-few-updates-en/"],"2024922":["http://blog.netlab.360.com/iot_reaper-a-few-updates-en/"],"2024923":["http://blog.netlab.360.com/iot_reaper-a-few-updates-en/"],"2024924":["http://blog.netlab.360.com/iot_reaper-a-rappid-spreading-new-iot-botnet-en/"],"2024925":["http://blog.netlab.360.com/iot_reaper-a-rappid-spreading-new-iot-botnet-en/"],"2024926":["http://blog.netlab.360.com/iot_reaper-a-rappid-spreading-new-iot-botnet-en/"],"2024927":["http://blog.netlab.360.com/iot_reaper-a-rappid-spreading-new-iot-botnet-en/"],"2024928":["http://blog.netlab.360.com/iot_reaper-a-rappid-spreading-new-iot-botnet-en/"],"2024929":["http://blog.netlab.360.com/iot_reaper-a-rappid-spreading-new-iot-botnet-en/"],"2024932":["http://www.fireeye.com/blog/threat-research/2017/10/backswing-pulling-a-badrabbit-out-of-a-hat.html"],"2024933":["http://research.checkpoint.com/iotroop-botnet-full-investigation/"],"2024934":["http://research.checkpoint.com/iotroop-botnet-full-investigation/"],"2024935":["http://research.checkpoint.com/iotroop-botnet-full-investigation/"],"2024936":["http://research.checkpoint.com/iotroop-botnet-full-investigation/"],"2024937":["http://securelist.com/gaza-cybergang-updated-2017-activity/82765/"],"2024938":["http://securelist.com/gaza-cybergang-updated-2017-activity/82765/"],"2024939":["http://securelist.com/gaza-cybergang-updated-2017-activity/82765/"],"2024940":["http://securelist.com/gaza-cybergang-updated-2017-activity/82765/"],"2024941":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10151","http://oracle.com/technetwork/security-advisory/alert-cve-2017-10151-4016513.html"],"2024954":["http://www.threatexpert.com/report.aspx?md5=f4c2f65b5b89d4f4e74099571b40c0d5"],"2024955":["http://www.threatexpert.com/report.aspx?md5=74dd0e38deaf778e621434a2ca9c7c74","http://microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=TrojanDropper:Win32/Randrew.A!bit"],"2024956":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024957":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024958":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024959":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024960":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024961":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024962":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024963":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024964":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024965":["http://forkbomb.us/press-releases/2017/09/08/routex-press-release.html"],"2024966":["http://volexity.com/blog/2017/11/06/oceanlotus-blossoms-mass-digital-surveillance-and-exploitation-of-asean-nations-the-media-human-rights-and-civil-society/"],"2024967":["http://volexity.com/blog/2017/11/06/oceanlotus-blossoms-mass-digital-surveillance-and-exploitation-of-asean-nations-the-media-human-rights-and-civil-society/"],"2024968":["http://volexity.com/blog/2017/11/06/oceanlotus-blossoms-mass-digital-surveillance-and-exploitation-of-asean-nations-the-media-human-rights-and-civil-society/"],"2024969":["http://www.volexity.com/blog/2017/11/06/oceanlotus-blossoms-mass-digital-surveillance-and-exploitation-of-asean-nations-the-media-human-rights-and-civil-society/"],"2024971":["http://securingtomorrow.mcafee.com/mcafee-labs/apt28-threat-group-adopts-dde-technique-nyc-attack-theme-in-latest-campaign/"],"2024972":["http://securingtomorrow.mcafee.com/mcafee-labs/apt28-threat-group-adopts-dde-technique-nyc-attack-theme-in-latest-campaign/"],"2024973":["http://securingtomorrow.mcafee.com/mcafee-labs/apt28-threat-group-adopts-dde-technique-nyc-attack-theme-in-latest-campaign/"],"2024974":["http://securingtomorrow.mcafee.com/mcafee-labs/apt28-threat-group-adopts-dde-technique-nyc-attack-theme-in-latest-campaign/"],"2024975":["http://securingtomorrow.mcafee.com/mcafee-labs/apt28-threat-group-adopts-dde-technique-nyc-attack-theme-in-latest-campaign/"],"2024976":["http://securingtomorrow.mcafee.com/mcafee-labs/apt28-threat-group-adopts-dde-technique-nyc-attack-theme-in-latest-campaign/"],"2024979":["http://securityintelligence.com/new-banking-trojan-icedid-discovered-by-ibm-x-force-research","http://www.threatexpert.com/report.aspx?md5=de4ef2e24306b35d29891b45c1e3fbfd"],"2024981":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024982":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024983":["http://www.deependresearch.org/2017/01/threat-intel-ransomware-payment-sites.html"],"2024984":["http://www.threatexpert.com/report.aspx?md5=3410af519f791af5f9554cbff7ece24a"],"2024985":["http://malware-traffic-analysis.net/2017/11/12/index.html"],"2024990":["http://www.us-cert.gov/ncas/alerts/TA17-318A"],"2024991":["http://www.threatexpert.com/report.aspx?md5=917124e4d53057324aa129520fca73fb"],"2024992":["http://www.us-cert.gov/ncas/alerts/TA17-318A"],"2024993":["http://raw.githubusercontent.com/theori-io/pwnjs/master/examples/CVE-2017-11873.js","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-11873"],"2024994":["http://raw.githubusercontent.com/theori-io/pwnjs/"],"2024995":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7089"],"2024996":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5124"],"2025014":["http://www.threatexpert.com/report.aspx?md5=c4acc83183ac0fabe92fc02ae5ef3ca4","http://www.welivesecurity.com/2017/11/15/multi-stage-malware-sneaks-google-play/"],"2025015":["http://www.threatexpert.com/report.aspx?md5=c4acc83183ac0fabe92fc02ae5ef3ca4","http://www.welivesecurity.com/2017/11/15/multi-stage-malware-sneaks-google-play/"],"2025016":["http://www.threatexpert.com/report.aspx?md5=c4acc83183ac0fabe92fc02ae5ef3ca4","http://www.welivesecurity.com/2017/11/15/multi-stage-malware-sneaks-google-play/"],"2025017":["http://www.threatexpert.com/report.aspx?md5=c4acc83183ac0fabe92fc02ae5ef3ca4","http://www.welivesecurity.com/2017/11/15/multi-stage-malware-sneaks-google-play/"],"2025020":["http://www.threatexpert.com/report.aspx?md5=a80440b3d9cb09898c0f12aaa05980c0","http://microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy%3AWin32/Nivdort"],"2025035":["http://www.circl.lu/pub/tr-23/"],"2025036":["http://www.circl.lu/pub/tr-23/"],"2025037":["http://www.kahusecurity.com/2012/chinese-pack-using-dadongs-jsxx-vip-script/"],"2025060":["http://defensecode.com/whitepapers/Stealing-Windows-Credentials-Using-Google-Chrome.pdf"],"2025063":["http://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html"],"2025065":["http://theprojectxblog.net/another-perl-irc-bot-that-have-dosddos-functions/"],"2025068":["http://www.threatexpert.com/report.aspx?md5=a0d843b52e33ba4f1dc72f5a28729806"],"2025069":["http://www.threatexpert.com/report.aspx?md5=a0d843b52e33ba4f1dc72f5a28729806"],"2025070":["http://www.threatexpert.com/report.aspx?md5=3dce01df285b3570738051672664068d"],"2025072":["http://docs.google.com/document/d/1oYX3uN6KxIX_StzTH0s0yFNNoHDnV8VgmVqU5WoeErc"],"2025073":["http://docs.google.com/document/d/1oYX3uN6KxIX_StzTH0s0yFNNoHDnV8VgmVqU5WoeErc"],"2025074":["http://www.threatexpert.com/report.aspx?md5=cc18ad38eccdf096f0ac5840f380ef4f"],"2025077":["http://www.threatexpert.com/report.aspx?md5=18fcc5f04f74737ca8a3fcf65a45629c"],"2025078":["http://blog.netlab.360.com/early-warning-a-new-mirai-variant-is-spreading-quickly-on-port-23-and-2323-en/"],"2025079":["http://blog.netlab.360.com/early-warning-a-new-mirai-variant-is-spreading-quickly-on-port-23-and-2323-en/"],"2025081":["http://docs.google.com/document/d/1oYX3uN6KxIX_StzTH0s0yFNNoHDnV8VgmVqU5WoeErc"],"2025082":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0158"],"2025083":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0158"],"2025084":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0158"],"2025085":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0183"],"2025086":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0185"],"2025087":["http://www.threatexpert.com/report.aspx?md5=1a5ee37a6075b5a95faf8f07ad060cc9"],"2025089":["http://www.threatexpert.com/report.aspx?md5=1b820dda5833f802be829d468884884e"],"2025091":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-16393"],"2025093":["http://researchcenter.paloaltonetworks.com/2017/11/unit42-uboatrat-navigates-east-asia/"],"2025094":["http://www.threatexpert.com/report.aspx?md5=f0e02ba660cfcb122b89bc780a6555ac"],"2025095":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2025096":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2025116":["http://localtunnel.github.io/www/"],"2025117":["http://localtunnel.github.io/www/"],"2025119":["http://www.threatexpert.com/report.aspx?md5=7e604b9e059d054d58c91330d4d88c62"],"2025120":["http://www.threatexpert.com/report.aspx?md5=7e604b9e059d054d58c91330d4d88c62"],"2025121":["http://www.threatexpert.com/report.aspx?md5=e69b3a5b8fccd8607e08dd6d34ae99a9"],"2025132":["http://blog.netlab.360.com/warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869-en/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8361","http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb","http://www.exploit-db.com/exploits/37169/"],"2025133":["http://www.chrisdcmoore.co.uk/post/oneplus-analytics/"],"2025134":["http://www.chrisdcmoore.co.uk/post/oneplus-analytics/"],"2025136":["http://www.threatexpert.com/report.aspx?md5=ce37b5b473377810bc76e0491533b4e7"],"2025138":["http://localtunnel.github.io/www/"],"2025139":["http://localtunnel.github.io/www/"],"2025141":["http://blog.sucuri.net/2017/12/cloudflare-solutions-keylogger-on-thousands-of-infected-wordpress-sites.html"],"2025142":["http://www.threatexpert.com/report.aspx?md5=5b0e06e3e896d541264a03abef5f30c7"],"2025143":["http://twitter.com/struppigel/status/940239612324319232"],"2025144":["http://www.threatexpert.com/report.aspx?md5=67a53bd24ee8499fed79c8c368e05f7a","http://community.rsa.com/community/products/netwitness/blog/2017/12/08/gratefulpos-credit-card-stealing-malware-just-in-time-for-the-shopping-season"],"2025145":["http://www.threatexpert.com/report.aspx?md5=BFB3C542AD815436EC3F2FD71582AD08B7E7301C"],"2025146":["http://www.domain.gr.com"],"2025147":["http://www.threatexpert.com/report.aspx?md5=4C669A60719FC1051FB336CB25B209FD"],"2025148":["http://www.threatexpert.com/report.aspx?md5=73611bd5d1d0ad865cd26b003aa525b4"],"2025152":["http://www.freebuf.com/articles/terminal/153428.html","http://research.checkpoint.com/dorkbot-an-investigation/"],"2025153":["http://www.freebuf.com/articles/terminal/153428.html","http://research.checkpoint.com/dorkbot-an-investigation/"],"2025154":["http://www.threatexpert.com/report.aspx?md5=c375012865b94fa037d23c555e6c2772"],"2025155":["http://sslbl.abuse.ch"],"2025157":["http://www.threatexpert.com/report.aspx?md5=4941501aca63cb8bdc86dadeffc9c29c"],"2025163":["http://www.threatexpert.com/report.aspx?md5=ddeabe234c4084ba379cf3be4fdf503d"],"2025164":["http://www.threatexpert.com/report.aspx?md5=ddeabe234c4084ba379cf3be4fdf503d"],"2025165":["http://www.threatexpert.com/report.aspx?md5=1cd356ab1943f120b04ad21afd9dcdb3"],"2025166":["http://www.threatexpert.com/report.aspx?md5=1cd356ab1943f120b04ad21afd9dcdb3"],"2025167":["http://www.threatexpert.com/report.aspx?md5=1cd356ab1943f120b04ad21afd9dcdb3"],"2025168":["http://www.threatexpert.com/report.aspx?md5=e2d136bb63edc092d2f3d26885b239d9"],"2025170":["http://www.threatexpert.com/report.aspx?md5=5dcc10711305c0bd4c8290eaae660ef3"],"2025171":["http://www.threatexpert.com/report.aspx?md5=5dcc10711305c0bd4c8290eaae660ef3"],"2025172":["http://www.threatexpert.com/report.aspx?md5=5dcc10711305c0bd4c8290eaae660ef3"],"2025177":["http://www.threatexpert.com/report.aspx?md5=20adfac68ced5225c9021bc051e66d18"],"2025178":["http://www.threatexpert.com/report.aspx?md5=7e604b9e059d054d58c91330d4d88c62"],"2025179":["http://twitter.com/blu3_team/status/947858470816112640"],"2025182":["http://docs.google.com/document/u/1/d/e/2PACX-1vR2TWm68bLidO3e2X0wTCqs0609vo5RXB85f6VL_Zm79wtTK59xADKh6MG0G7hSBZi8cPOiQVWAIie0/pub"],"2025183":["http://f5.com/labs/articles/threat-intelligence/malware/new-python-based-crypto-miner-botnet-flying-under-the-radar"],"2025184":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5715","http://spectreattack.com/spectre.pdf"],"2025185":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5715","http://github.com/cgvwzq/spectre"],"2025186":["http://otx.alienvault.com/pulse/5a4e1c4993199b299f90a212"],"2025187":["http://www.threatexpert.com/report.aspx?md5=d463ee91a2d7b8482554c23bb7d9aa3d","http://www.arbornetworks.com/blog/asert/medusahttp-ddos-slithers-back-spotlight"],"2025188":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5715","http://github.com/cgvwzq/spectre"],"2025195":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5754"],"2025196":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5715"],"2025198":["http://community.rsa.com/community/products/netwitness/blog/2018/01/10/malspam-delivers-bitter-rat-07-01-2018","http://www.threatexpert.com/report.aspx?md5=cc58dd8592555ff6275196e62af3242e"],"2025199":["http://objective-see.com/blog/blog_0x26.html","http://www.threatexpert.com/report.aspx?md5=8482fc5dbc6e00da151bea3eba61e360"],"2025200":["http://www.threatexpert.com/report.aspx?md5=8482fc5dbc6e00da151bea3eba61e360","http://objective-see.com/blog/blog_0x26.html"],"2025201":["http://www.threatexpert.com/report.aspx?md5=5a71cc1c1ea541eb47638218a25c4123"],"2025202":["http://www.threatexpert.com/report.aspx?md5=bad07f85a7baaeaa8aeb72997712aa98"],"2025204":["http://www.threatexpert.com/report.aspx?md5=14ea53020b4d0cb5acbea0bf2207f3f6"],"2025205":["http://github.com/ptresearch/AttackDetection"],"2025209":["http://www.threatexpert.com/report.aspx?md5=f2bf38a25919e24f0c96d9ec30e4e8d4"],"2025216":["http://icebrg.io/blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses"],"2025217":["http://icebrg.io/blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses"],"2025218":["http://www.icebrg.io/blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses"],"2025219":["http://icebrg.io/blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses"],"2025220":["http://icebrg.io/blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses"],"2025221":["http://www.icebrg.io/index.php?p=blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses","http://www.icebrg.io/blog/more-extensions-more-money-more-problems"],"2025224":["http://twitter.com/securitydoggo/status/954337767751905280"],"2025225":["http://twitter.com/securitydoggo/status/954337767751905280"],"2025230":["http://twitter.com/B_H101/status/954984729329184768"],"2025234":["http://www.threatexpert.com/report.aspx?md5=ba6dcea82f59799d86111fa28ae95641","http://securelist.com/travle-aka-pylot-backdoor-hits-russian-speaking-targets/83455"],"2025235":["http://www.threatexpert.com/report.aspx?md5=baa89d17522df0e05a16fa2c23d58f58"],"2025237":["http://www.threatexpert.com/report.aspx?md5=baa89d17522df0e05a16fa2c23d58f58"],"2025238":["http://otx.alienvault.com/pulse/5a1348416dd9eb0c92d9897a"],"2025239":["http://otx.alienvault.com/pulse/5a1348416dd9eb0c92d9897a"],"2025240":["http://otx.alienvault.com/pulse/5a1348416dd9eb0c92d9897a"],"2025241":["http://www.threatexpert.com/report.aspx?md5=94cd521945da6ab73bc7a1462283d22a"],"2025251":["http://www.threatexpert.com/report.aspx?md5=dc62dd14321dfa9f14c094a7b1e20979"],"2025253":["http://darkwebs.ws/threads/41806/","http://www.threatexpert.com/report.aspx?md5=e18c73ec38cbdd0bb0c66f360183e6d9"],"2025254":["http://www.threatexpert.com/report.aspx?md5=aedf80c426fb649bb258e430a3830d85"],"2025256":["http://www.threatexpert.com/report.aspx?md5=5a71cc1c1ea541eb47638218a25c4123"],"2025257":["http://www.threatexpert.com/report.aspx?md5=5a71cc1c1ea541eb47638218a25c4123"],"2025266":["http://www.threatexpert.com/report.aspx?md5=485069677e997ff6ce193be7258c783f"],"2025273":["http://www.threatexpert.com/report.aspx?md5=ccefe18d7b9bc31a8673b9bf82104f48"],"2025283":["http://www.threatexpert.com/report.aspx?md5=52765b346c12d55e255a669bb8cfebb8"],"2025287":["http://csecybsec.com/download/zlab/20180121_CSE_Massive_Malvertising_Report.pdf"],"2025288":["http://csecybsec.com/download/zlab/20180121_CSE_Massive_Malvertising_Report.pdf"],"2025289":["http://www.threatexpert.com/report.aspx?md5=f12fc711529b48bcef52c5ca0a52335a","http://community.rsa.com/community/products/netwitness/blog/2018/01/30/apt32-continues-asean-targeting"],"2025291":["http://www.threatexpert.com/report.aspx?md5=f12fc711529b48bcef52c5ca0a52335a","http://community.rsa.com/community/products/netwitness/blog/2018/01/30/apt32-continues-asean-targeting"],"2025302":["http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PUA:Win32/LoadMoney"],"2025303":["http://www.threatexpert.com/report.aspx?md5=844e53381099d572c3864c7a42ddbbf1"],"2025304":["http://www.threatexpert.com/report.aspx?md5=5d4d3ba6823a07f070f5a42cbcc7a5c8"],"2025305":["http://www.flashpoint-intel.com/blog/targeted-attacks-south-korean-entities/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-4878"],"2025314":["http://www.oracle.com/technetwork/java/javase/documentation/9u-relnotes-3704429.html"],"2025315":["http://www.fidelissecurity.com/threatgeek/2018/02/exposing-x509-vulnerabilities"],"2025344":["http://www.threatexpert.com/report.aspx?md5=76516b465b3589547a9c7c7d955238d8"],"2025346":["http://www.threatexpert.com/report.aspx?md5=540c736b7e11287805ddd4f3a9d37934"],"2025358":["http://www.threatexpert.com/report.aspx?md5=aa8def27909596f8477a5374f735eec9","http://www.bleepingcomputer.com/virus-removal/remove-antivirus-pro-2017"],"2025359":["http://www.threatexpert.com/report.aspx?md5=C6C781F0ED065476A4297C2AC96A6D83"],"2025370":["http://www.threatexpert.com/report.aspx?md5=e8c9d8ffe8fae54b15262bf9aeb4172c"],"2025374":["http://www.deependresearch.org/2018/02/yaff-yet-another-fake-flash-campaign.html"],"2025375":["http://www.threatexpert.com/report.aspx?md5=ecd56f1f42f932865e98fd319301e1a5"],"2025376":["http://blogs.securiteam.com/index.php/archives/3171","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-1000353","http://research.checkpoint.com/jenkins-miner-one-biggest-mining-operations-ever-discovered/"],"2025381":["http://www.threatexpert.com/report.aspx?md5=5ba6cf36f57697a1eb5ac8deaa377b4b"],"2025382":["http://blog.malwarebytes.com/threat-analysis/2018/02/chinese-criminal-experiments-with-exploits-in-drive-by-download-campaign/"],"2025383":["http://blog.malwarebytes.com/threat-analysis/2018/02/chinese-criminal-experiments-with-exploits-in-drive-by-download-campaign/"],"2025384":["http://blog.fortinet.com/2018/02/21/omg-mirai-based-bot-turns-iot-devices-into-proxy-servers5a8e05ccc4f85"],"2025385":["http://blog.fortinet.com/2018/02/21/omg-mirai-based-bot-turns-iot-devices-into-proxy-servers5a8e05ccc4f85"],"2025386":["http://bartblaze.blogspot.co.uk/2018/02/fake-steam-desktop-authenticator-steals.html"],"2025387":["http://bartblaze.blogspot.co.uk/2018/02/fake-steam-desktop-authenticator-steals.html"],"2025388":["http://bartblaze.blogspot.co.uk/2018/02/fake-steam-desktop-authenticator-steals.html"],"2025389":["http://bartblaze.blogspot.co.uk/2018/02/fake-steam-desktop-authenticator-steals.html"],"2025390":["http://bartblaze.blogspot.co.uk/2018/02/fake-steam-desktop-authenticator-steals.html"],"2025391":["http://www.threatexpert.com/report.aspx?md5=3ffbde179d54377d55fcac76ebf314cb","http://labsblog.f-secure.com/2016/06/07/qarallax-rat-spying-on-us-visa-applicants/","http://www.trustwave.com/Resources/SpiderLabs-Blog/Quaverse-RAT--Remote-Access-as-a-Service/"],"2025392":["http://www.threatexpert.com/report.aspx?md5=3ffbde179d54377d55fcac76ebf314cb","http://labsblog.f-secure.com/2016/06/07/qarallax-rat-spying-on-us-visa-applicants/","http://www.trustwave.com/Resources/SpiderLabs-Blog/Quaverse-RAT--Remote-Access-as-a-Service/"],"2025393":["http://www.threatexpert.com/report.aspx?md5=3ffbde179d54377d55fcac76ebf314cb","http://labsblog.f-secure.com/2016/06/07/qarallax-rat-spying-on-us-visa-applicants/","http://www.trustwave.com/Resources/SpiderLabs-Blog/Quaverse-RAT--Remote-Access-as-a-Service/"],"2025401":["http://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/"],"2025402":["http://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/"],"2025403":["http://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/"],"2025408":["http://www.threatexpert.com/report.aspx?md5=32485b8cedc5b79aa1bf2d7ceae0ef31"],"2025412":["http://www.threatexpert.com/report.aspx?md5=ce413a29e6cde5701a26e7e4e02ecc66"],"2025413":["http://www.threatexpert.com/report.aspx?md5=a0bbfdb2d4dbfb2f3c182bd394099803"],"2025414":["http://www.threatexpert.com/report.aspx?md5=8c7722acb2f7400df1027fa6741e37d5"],"2025415":["http://www.threatexpert.com/report.aspx?md5=f71d168b5b987d9fde792098ca5cca19"],"2025416":["http://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria/"],"2025424":["http://objective-see.com/blog/blog_0x2B.html"],"2025426":["http://www.exploit-db.com/exploits/44284/","http://www.exploit-db.com/exploits/44283/"],"2025427":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6789","http://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/","http://github.com/ptresearch/AttackDetection/blob/master/CVE-2018-6789/cve-2018-6789.rules"],"2025428":["http://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria/"],"2025429":["http://www.threatexpert.com/report.aspx?md5=1f075616f69983f5b3fc7ba068032c6d"],"2025430":["http://www.threatexpert.com/report.aspx?md5=1f075616f69983f5b3fc7ba068032c6d"],"2025431":["http://www.threatexpert.com/report.aspx?md5=72bcbfd1020d002d2e20e0707b8ef700"],"2025432":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12636","http://blog.trendmicro.com/trendlabs-security-intelligence/vulnerabilities-apache-couchdb-open-door-monero-miners/"],"2025433":["http://www.threatexpert.com/report.aspx?md5=f8b2e89717f77633c7d112c98f2d22ab"],"2025434":["http://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency"],"2025435":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12635","http://blog.trendmicro.com/trendlabs-security-intelligence/vulnerabilities-apache-couchdb-open-door-monero-miners/"],"2025436":["http://www.threatexpert.com/report.aspx?md5=7a8cb1223e006bc7e70169c060d7057b"],"2025437":["http://www.malware-traffic-analysis.net/2018/03/15/index3.html"],"2025438":["http://www.threatexpert.com/report.aspx?md5=26406f5cc72e13c798485f80ad3cbbdb"],"2025439":["http://www.threatexpert.com/report.aspx?md5=e297f2ed2d162ad925ac140915a21405"],"2025440":["http://www.threatexpert.com/report.aspx?md5=e297f2ed2d162ad925ac140915a21405"],"2025441":["http://www.threatexpert.com/report.aspx?md5=e297f2ed2d162ad925ac140915a21405"],"2025446":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2025449":["http://en.wikipedia.org/wiki/Tor_(anonymity_network)"],"2025452":["http://www.threatexpert.com/report.aspx?md5=a85907638378377ff357242a7311244d"],"2025453":["http://www.threatexpert.com/report.aspx?md5=a85907638378377ff357242a7311244d"],"2025454":["http://www.threatexpert.com/report.aspx?md5=a85907638378377ff357242a7311244d"],"2025455":["http://www.threatexpert.com/report.aspx?md5=8b7d3093c477b2e99effde5065affbd5"],"2025459":["http://blog.trendmicro.com/trendlabs-security-intelligence/cryptocurrency-miner-distributed-via-php-weathermap-vulnerability-targets-linux-servers/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2618"],"2025460":["http://scan.lol"],"2025461":["http://scan.lol"],"2025462":["http://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/"],"2025463":["http://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/"],"2025464":["http://www.threatexpert.com/report.aspx?md5=306d3ed0a7c899b5ef9d0e3c91f05193","http://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/"],"2025465":["http://www.threatexpert.com/report.aspx?md5=306d3ed0a7c899b5ef9d0e3c91f05193","http://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/"],"2025466":["http://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/"],"2025467":["http://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/"],"2025468":["http://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/"],"2025469":["http://www.threatexpert.com/report.aspx?md5=41aa955d06abf7df96e746cf1cb781b4"],"2025470":["http://www.threatexpert.com/report.aspx?md5=41aa955d06abf7df96e746cf1cb781b4"],"2025471":["http://www.threatexpert.com/report.aspx?md5=41aa955d06abf7df96e746cf1cb781b4"],"2025472":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-0171","http://embedi.com/blog/cisco-smart-install-remote-code-execution/"],"2025483":["http://www.threatexpert.com/report.aspx?md5=CA427D578AFA51B262272C78D1C04AB9"],"2025484":["http://www.threatexpert.com/report.aspx?md5=1a44b59105e584bac969408f9617133f","http://urlhaus.abuse.ch/url/4452/"],"2025485":["http://www.threatexpert.com/report.aspx?md5=75368c9240a3c238aa3b5518906a3cdb"],"2025486":["http://www.threatexpert.com/report.aspx?md5=1e60050db59e3d977d2a928fff3d34a6","http://bartblaze.blogspot.com/2018/04/maktub-ransomware-possibly-rebranded-as.html"],"2025487":["http://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=BrowserModifier:Win32/Foniad"],"2025488":["http://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=BrowserModifier:Win32/Foniad"],"2025489":["http://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=BrowserModifier:Win32/Foniad"],"2025490":["http://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=BrowserModifier:Win32/Foniad"],"2025491":["http://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=BrowserModifier:Win32/Foniad"],"2025492":["http://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=BrowserModifier:Win32/Foniad"],"2025493":["http://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=BrowserModifier:Win32/Foniad"],"2025494":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7600","http://research.checkpoint.com/uncovering-drupalgeddon-2"],"2025495":["http://www.spamhaus.org/statistics/tlds/"],"2025497":["http://www.spamhaus.org/statistics/tlds/"],"2025498":["http://www.spamhaus.org/statistics/tlds/"],"2025499":["http://www.spamhaus.org/statistics/tlds/"],"2025500":["http://www.spamhaus.org/statistics/tlds/"],"2025501":["http://www.spamhaus.org/statistics/tlds/"],"2025507":["http://ransomwaretracker.abuse.ch"],"2025508":["http://ransomwaretracker.abuse.ch"],"2025509":["http://ransomwaretracker.abuse.ch"],"2025510":["http://ransomwaretracker.abuse.ch"],"2025511":["http://ransomwaretracker.abuse.ch"],"2025512":["http://ransomwaretracker.abuse.ch"],"2025518":["http://www.oracle.com/technetwork/java/javase/10u-relnotes-4108739.html"],"2025519":["http://www.us-cert.gov/ncas/alerts/TA18-106A"],"2025520":["http://www.us-cert.gov/ncas/alerts/TA18-106A","http://github.com/Sab0tag3d/SIET"],"2025521":["http://www.us-cert.gov/ncas/alerts/TA18-106A","http://github.com/Sab0tag3d/SIET"],"2025522":["http://www.us-cert.gov/ncas/alerts/TA18-106A","http://github.com/Sab0tag3d/SIET"],"2025531":["http://www.threatexpert.com/report.aspx?md5=dc2c0b6a8824f5ababf18913ad6d0793"],"2025533":["http://www.bleepingcomputer.com/news/security/hackers-dont-give-site-owners-time-to-patch-start-exploiting-new-drupal-flaw-within-hours","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7602"],"2025534":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7600","http://research.checkpoint.com/uncovering-drupalgeddon-2"],"2025538":["http://www.threatexpert.com/report.aspx?md5=783a48640c0776932fc81925962f273b","http://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html"],"2025539":["http://www.threatexpert.com/report.aspx?md5=783a48640c0776932fc81925962f273b","http://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html"],"2025540":["http://www.threatexpert.com/report.aspx?md5=6899c2219764bac56007ce80021bfcbf","http://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html"],"2025541":["http://www.threatexpert.com/report.aspx?md5=ec629f648434fc3d17e9561532d038c8","http://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html"],"2025542":["http://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html"],"2025543":["http://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html"],"2025544":["http://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html"],"2025545":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9822","http://f5.com/labs/articles/threat-intelligence/cyber-security/zealot-new-apache-struts-campaign-uses-eternalblue-and-eternalsynergy-to-mine-monero-on-internal-networks?sf176487178"],"2025546":["http://www.threatexpert.com/report.aspx?md5=9faf6dedd3e0cd018d2e45bc8855bd4a"],"2025547":["http://www.threatexpert.com/report.aspx?md5=a85907638378377ff357242a7311244d"],"2025548":["http://www.threatexpert.com/report.aspx?md5=a85907638378377ff357242a7311244d"],"2025553":["http://asert.arbornetworks.com/lojack-becomes-a-double-agent/amp/"],"2025557":["http://www.threatexpert.com/report.aspx?md5=2d9ac00470a104b9841d851ddf33cad7","http://www.threatexpert.com/report.aspx?md5=627b903657b28f3a2e388393103722c8","http://www.accenture.com/t20180423T055005Z__w__/us-en/_acnmedia/PDF-76/Accenture-Hogfish-Threat-Analysis.pdf"],"2025559":["http://www.threatexpert.com/report.aspx?md5=892da86e60236c5aaf26e5025af02513"],"2025567":["http://www.threatexpert.com/report.aspx?md5=5f1ab58f0639b5e43fca508eb0d4f97e"],"2025574":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-3088","http://www.exploit-db.com/exploits/42283/"],"2025575":["http://blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en/"],"2025576":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10561","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-10562","http://github.com/f3d0x0/GPON"],"2025577":["http://www.threatexpert.com/report.aspx?md5=3549c3af4417a344b5cbf53dbe7ab36c"],"2025578":["http://www.threatexpert.com/report.aspx?md5=6daa7e95d172c2e54953adae7bdfaffc"],"2025580":["http://www.threatexpert.com/report.aspx?md5=b38a63aea75bcf06fed11067cc75cc7e"],"2025581":["http://www.threatexpert.com/report.aspx?md5=bef6faabe3d80037c18fa7b806f4488e"],"2025582":["http://blog.sucuri.net/2018/05/cryptomining-through-disguised-url-shorteners.html"],"2025583":["http://dctoralves.wordpress.com/2018/05/03/phishing-report-policia-civil/"],"2025584":["http://httpie.org"],"2025586":["http://www.threatexpert.com/report.aspx?md5=31d65e315115c823f619a381576984f8"],"2025589":["http://wisecleaner.com","http://www.threatexpert.com/report.aspx?md5=cd6e96207ea60b3e6e46c393fdcc9e0c"],"2025590":["http://antibody-software.com","http://www.threatexpert.com/report.aspx?md5=8e22d630b992f9cb4d7f6b0aceebb37f"],"2025593":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2025594":["http://bechtsoudis.com/security/put-weevely-on-the-your-nids-radar"],"2025596":["http://www.cert.pl/en/news/single/backswap-malware-analysis"],"2025597":["http://www.cert.pl/en/news/single/backswap-malware-analysis"],"2025598":["http://www.threatexpert.com/report.aspx?md5=cd7a49513771efd9d4de873956ef8af5"],"2025599":["http://sfkino.tistory.com/60"],"2025600":["http://sfkino.tistory.com/60"],"2025601":["http://sfkino.tistory.com/60"],"2025602":["http://sfkino.tistory.com/60"],"2025603":["http://sfkino.tistory.com/60"],"2025604":["http://sfkino.tistory.com/60"],"2025605":["http://sfkino.tistory.com/60"],"2025606":["http://sfkino.tistory.com/60"],"2025626":["http://www.threatexpert.com/report.aspx?md5=aa56a1de9b91446c66d53f12f797bef5"],"2025637":["http://www.threatexpert.com/report.aspx?md5=f4f2425e9735f92cc9f75711aa8cb210"],"2025639":["http://www.clearskysec.com/glancelove/"],"2025640":["http://www.clearskysec.com/glancelove/"],"2025641":["http://www.clearskysec.com/glancelove/"],"2025642":["http://www.clearskysec.com/glancelove/"],"2025643":["http://www.clearskysec.com/glancelove/"],"2025645":["http://www.threatexpert.com/report.aspx?md5=e7c2c1b796dad6210165110b7e8cda7d"],"2025646":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7600","http://research.checkpoint.com/uncovering-drupalgeddon-2"],"2025649":["http://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb"],"2025650":["http://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb"],"2025651":["http://www.threatexpert.com/report.aspx?md5=f45991556122b07d501fa995bd4e74a7"],"2025652":["http://www.threatexpert.com/report.aspx?md5=f45991556122b07d501fa995bd4e74a7"],"2025697":["http://www.threatexpert.com/report.aspx?md5=6887e8e2fb391a1ca84f192efd5c8331"],"2025715":["http://www.malware-traffic-analysis.net/2018/07/05/index.html"],"2025727":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.html"],"2025728":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.html"],"2025729":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.html"],"2025730":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.html"],"2025731":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.html"],"2025735":["http://exploit-db.com/exploits/44912/"],"2025736":["http://www.exploit-db.com/exploits/44937/"],"2025740":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12635"],"2025741":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12636"],"2025742":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12636"],"2025743":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12636"],"2025744":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12254","http://www.exploit-db.com/exploits/44869/"],"2025745":["http://www.exploit-db.com/exploits/44869/"],"2025746":["http://www.exploit-db.com/exploits/44869/"],"2025747":["http://www.exploit-db.com/exploits/44867/"],"2025748":["http://www.exploit-db.com/exploits/44854/"],"2025749":["http://www.exploit-db.com/exploits/44854/"],"2025750":["http://exploit-db.com/exploits/44781/"],"2025751":["http://exploit-db.com/exploits/44781/"],"2025752":["http://exploit-db.com/exploits/44781/"],"2025753":["http://exploit-db.com/exploits/44781/"],"2025754":["http://exploit-db.com/exploits/44781/"],"2025755":["http://exploit-db.com/exploits/44781/"],"2025756":["http://exploit-db.com/exploits/44760/"],"2025757":["http://exploit-db.com/exploits/44949/"],"2025758":["http://exploit-db.com/exploits/44949/"],"2025759":["http://exploit-db.com/raw/44945/"],"2025760":["http://exploit-db.com/exploits/44951/"],"2025761":["http://exploit-db.com/exploits/44951/"],"2025762":["http://exploit-db.com/exploits/44951/"],"2025763":["http://exploit-db.com/exploits/44951/"],"2025764":["http://exploit-db.com/exploits/44956/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-0296"],"2025765":["http://exploit-db.com/exploits/44652/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1111"],"2025766":["http://exploit-db.com/exploits/44784/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6892"],"2025767":["http://exploit-db.com/exploits/44959/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6961"],"2025768":["http://exploit-db.com/exploits/44959/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6961"],"2025769":["http://exploit-db.com/exploits/44957/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7520"],"2025770":["http://exploit-db.com/exploits/44964/"],"2025771":["http://exploit-db.com/exploits/44960/"],"2025772":["http://2018-8733","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8734","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8735","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8736","http://exploit-db.com/exploits/44969/"],"2025773":["http://2018-8733","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8734","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8735","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8736","http://exploit-db.com/exploits/44969/"],"2025774":["http://2018-8733","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8734","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8735","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8736","http://exploit-db.com/exploits/44969/"],"2025775":["http://2018-8733","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8734","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8735","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8736","http://exploit-db.com/exploits/44969/"],"2025776":["http://2018-8733","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8734","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8735","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8736","http://exploit-db.com/exploits/44969/"],"2025777":["http://2018-8733","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8734","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8735","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8736","http://exploit-db.com/exploits/44969/"],"2025778":["http://2018-8733","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8734","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8735","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8736","http://exploit-db.com/exploits/44969/"],"2025779":["http://2018-8733","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8734","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8735","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7573","http://exploit-db.com/exploits/44968/"],"2025780":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12520","http://exploit-db.com/exploits/44973/"],"2025782":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1000094","http://exploit-db.com/exploits/44977/"],"2025783":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12905","http://exploit-db.com/exploits/44977/"],"2025784":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12519","http://exploit-db.com/exploits/44978/"],"2025785":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-13109","http://exploit-db.com/exploits/44982/"],"2025786":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8736","http://exploit-db.com/exploits/44981/"],"2025787":["http://exploit-db.com/exploits/44975/"],"2025788":["http://exploit-db.com/exploits/44553/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-2628"],"2025789":["http://exploit-db.com/exploits/44986/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8738"],"2025790":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12589"],"2025791":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12589"],"2025792":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12589"],"2025793":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6789","http://exploit-db.com/exploits/44571/"],"2025794":["http://exploit-db.com/exploits/44568/"],"2025819":["http://exploit-db.com/exploits/44999/"],"2025820":["http://exploit-db.com/exploits/44993/"],"2025821":["http://exploit-db.com/exploits/44992/"],"2025822":["http://exploit-db.com/exploits/44992/"],"2025823":["http://exploit-db.com/exploits/45002/"],"2025824":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-11885","http://exploit-db.com/exploits/44616/"],"2025825":["http://exploit-db.com/exploits/45007/"],"2025826":["http://exploit-db.com/exploits/45005/"],"2025830":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5955","http://exploit-db.com/exploits/44356/"],"2025835":["http://exploit-db.com/exploits/44292/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-2380"],"2025836":["http://exploit-db.com/exploits/43993/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-3066"],"2025837":["http://exploit-db.com/exploits/43924/"],"2025838":["http://exploit-db.com/exploits/43924/"],"2025839":["http://exploit-db.com/exploits/45031/"],"2025840":["http://exploit-db.com/exploits/45025/"],"2025841":["http://exploit-db.com/exploits/45027/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12463"],"2025842":["http://exploit-db.com/exploits/45027/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12463"],"2025843":["http://exploit-db.com/exploits/45027/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12463"],"2025844":["http://exploit-db.com/exploits/45027/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12463"],"2025845":["http://exploit-db.com/exploits/45036/"],"2025846":["http://exploit-db.com/exploits/45036/"],"2025847":["http://exploit-db.com/exploits/45036/"],"2025848":["http://exploit-db.com/exploits/45036/"],"2025849":["http://exploit-db.com/exploits/45036/"],"2025850":["http://exploit-db.com/exploits/45036/"],"2025851":["http://exploit-db.com/exploits/45036/"],"2025852":["http://exploit-db.com/exploits/45036/"],"2025853":["http://exploit-db.com/exploits/45036/"],"2025854":["http://exploit-db.com/exploits/45036/"],"2025855":["http://exploit-db.com/exploits/45036/"],"2025856":["http://exploit-db.com/exploits/45036/"],"2025857":["http://exploit-db.com/exploits/45036/"],"2025858":["http://exploit-db.com/exploits/45036/"],"2025859":["http://exploit-db.com/exploits/45036/"],"2025860":["http://exploit-db.com/exploits/45036/"],"2025861":["http://exploit-db.com/exploits/45044/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1000049"],"2025862":["http://exploit-db.com/exploits/45044/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1000049"],"2025877":["http://owasp.org/index.php/XML_External_Entity_(XXE)_Processing"],"2025878":["http://owasp.org/index.php/XML_External_Entity_(XXE)_Processing"],"2025880":["http://www.volexity.com/blog/2018/07/19/js-sniffer-e-commerce-data-theft-made-easy/"],"2025881":["http://www.volexity.com/blog/2018/07/19/js-sniffer-e-commerce-data-theft-made-easy/"],"2025882":["http://researchcenter.paloaltonetworks.com/2018/07/unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns/"],"2025883":["http://researchcenter.paloaltonetworks.com/2018/07/unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns/"],"2025884":["http://researchcenter.paloaltonetworks.com/2018/07/unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns/"],"2025885":["http://www.threatexpert.com/report.aspx?md5=0ac55b5056364cdac63aaf05f9d7f654","http://twitter.com/James_inthe_box/status/1020522733984100352?s=03"],"2025887":["http://blog.trendmicro.com/trendlabs-security-intelligence/open-adb-ports-being-exploited-to-spread-possible-satori-variant-in-android-devices/"],"2025888":["http://blog.trendmicro.com/trendlabs-security-intelligence/open-adb-ports-being-exploited-to-spread-possible-satori-variant-in-android-devices/"],"2025889":["http://twitter.com/m0rb/status/1021626709307805696"],"2025890":["http://twitter.com/m0rb/status/1021626709307805696"],"2025891":["http://www.threatexpert.com/report.aspx?md5=d51c2ffce844d42bab2f2c3131e3dbd4","http://researchcenter.paloaltonetworks.com/2018/07/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent/"],"2025892":["http://www.threatexpert.com/report.aspx?md5=d51c2ffce844d42bab2f2c3131e3dbd4","http://researchcenter.paloaltonetworks.com/2018/07/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent/"],"2025894":["http://www.threatexpert.com/report.aspx?md5=d51c2ffce844d42bab2f2c3131e3dbd4","http://researchcenter.paloaltonetworks.com/2018/07/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent/"],"2025895":["http://csecybsec.com/download/zlab/20180723_CSE_APT27_Syria_v1.pdf","http://www.threatexpert.com/report.aspx?md5=6296586cf9a59b25d1b8ab3eeb0c2a33"],"2025896":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025897":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025898":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025899":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025900":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025901":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025902":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025903":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025904":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025905":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025906":["http://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html"],"2025907":["http://github.com/LandGrey/CVE-2018-2894/blob/master/CVE-2018-2894.py","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-2894"],"2025917":["http://exploit-db.com/exploits/45055/"],"2025918":["http://www.threatexpert.com/report.aspx?md5=738b3370230bd3168a97a7171d17ed64","http://docs.google.com/document/d/1oYX3uN6KxIX_StzTH0s0yFNNoHDnV8VgmVqU5WoeErc"],"2025921":["http://www.threatexpert.com/report.aspx?md5=98202283d7752779abd092665e80af71"],"2025922":["http://www.threatexpert.com/report.aspx?md5=CC71620DE7216B186DA2C9BA06703613","http://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/"],"2025923":["http://www.threatexpert.com/report.aspx?md5=CC71620DE7216B186DA2C9BA06703613","http://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/"],"2025924":["http://www.threatexpert.com/report.aspx?md5=CC71620DE7216B186DA2C9BA06703613","http://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/"],"2025925":["http://www.threatexpert.com/report.aspx?md5=CC71620DE7216B186DA2C9BA06703613","http://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/"],"2025926":["http://www.threatexpert.com/report.aspx?md5=CC71620DE7216B186DA2C9BA06703613","http://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/"],"2025927":["http://www.threatexpert.com/report.aspx?md5=CC71620DE7216B186DA2C9BA06703613","http://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/"],"2025928":["http://www.threatexpert.com/report.aspx?md5=CC71620DE7216B186DA2C9BA06703613","http://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/"],"2025929":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-2893","http://github.com/pyn3rd/CVE-2018-2893"],"2025930":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1000207","http://www.exploit-db.com/exploits/45055"],"2025931":["http://www.threatexpert.com/report.aspx?md5=2409c058a86cd8743abb10a5735ef487"],"2025933":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025934":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025935":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025936":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025937":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025938":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025939":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025940":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025941":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025942":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025943":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025944":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025945":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025946":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025947":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025948":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025949":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025950":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025951":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025952":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025953":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025954":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025955":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025956":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025957":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025958":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025959":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025960":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025961":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025962":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025963":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025964":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025965":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025966":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025967":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025968":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025969":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025970":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025971":["http://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/"],"2025972":["http://github.com/mrmtwoj/0day-mikrotik","http://www.helpnetsecurity.com/2018/08/03/mikrotik-cryptojacking-campaign","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14847"],"2025980":["http://tools.ietf.org/html/draft-ietf-doh-dns-over-https-02"],"2025982":["http://www.threatexpert.com/report.aspx?md5=4b5e27e843e1b26aedec66f9e87c9960"],"2025983":["http://krbtgt.pw/smbv3-null-pointer-dereference-vulnerability/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-0833"],"2025984":["http://www.threatexpert.com/report.aspx?md5=41c292b0cb2a4662381635a3316226f4"],"2025987":["http://www.threatexpert.com/report.aspx?md5=cc56d261cbf0ecddcdc70de85af138d1","http://drive.google.com/file/d/1WJCXG2SIkVwPEw5dlAE5U__OfDB88zD0/view"],"2025988":["http://www.threatexpert.com/report.aspx?md5=cc56d261cbf0ecddcdc70de85af138d1","http://drive.google.com/file/d/1WJCXG2SIkVwPEw5dlAE5U__OfDB88zD0/view"],"2025989":["http://www.threatexpert.com/report.aspx?md5=b603017bbcee17a76f5b0ee478d2d935","http://drive.google.com/file/d/1WJCXG2SIkVwPEw5dlAE5U__OfDB88zD0/view"],"2025990":["http://www.threatexpert.com/report.aspx?md5=5509ee41b79c5d82e96038993f0bf3fa","http://blogs.360.cn/blog/apt-c-26/"],"2025991":["http://blogs.360.cn/blog/apt-c-26/","http://www.threatexpert.com/report.aspx?md5=5509ee41b79c5d82e96038993f0bf3fa"],"2025992":["http://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb"],"2025993":["http://www.threatexpert.com/report.aspx?md5=d110be58537aa8420a9c25f4879ca77b"],"2025995":["http://www.vkremez.com/2018/08/lets-learn-dissecting-panda-banker.html"],"2025996":["http://www.vkremez.com/2018/08/lets-learn-dissecting-panda-banker.html"],"2025997":["http://www.vkremez.com/2018/08/lets-learn-dissecting-panda-banker.html"],"2025998":["http://www.vkremez.com/2018/08/lets-learn-dissecting-panda-banker.html"],"2025999":["http://www.vkremez.com/2018/08/lets-learn-dissecting-panda-banker.html"],"2026000":["http://www.vkremez.com/2018/08/lets-learn-dissecting-panda-banker.html"],"2026002":["http://www.threatexpert.com/report.aspx?md5=be312fdb94f3a3c783332ea91ef00ebd"],"2026003":["http://exploit-db.com/exploits/45218/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0657"],"2026004":["http://www.threatexpert.com/report.aspx?md5=8f8d778bea33bc542b58c0631cf9d7e0"],"2026005":["http://exploit-db.com/exploits/45220/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0662"],"2026007":["http://www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html"],"2026008":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15534","http://exploit-db.com/exploits/45240/"],"2026009":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15533","http://exploit-db.com/exploits/45242/"],"2026010":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15533","http://exploit-db.com/exploits/45242/"],"2026011":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15533","http://exploit-db.com/exploits/45242/"],"2026012":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15533","http://exploit-db.com/exploits/45242/"],"2026013":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15533","http://exploit-db.com/exploits/45242/"],"2026014":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15533","http://exploit-db.com/exploits/45242/"],"2026015":["http://exploit-db.com/exploits/45231/"],"2026016":["http://www.threatexpert.com/report.aspx?md5=81cecc440bd57a736ef6e473e77d5a1b","http://blog.talosintelligence.com/2018/08/picking-apart-remcos.html"],"2026017":["http://www.threatexpert.com/report.aspx?md5=5c52234cf35ab8d08b10fcc3c2a9d32b","http://blog.talosintelligence.com/2018/08/picking-apart-remcos.html"],"2026018":["http://www.threatexpert.com/report.aspx?md5=29a0d1bc5abfbbf0bdf15ffa762cac27","http://blog.talosintelligence.com/2018/08/picking-apart-remcos.htm"],"2026019":["http://www.threatexpert.com/report.aspx?md5=5cb07299cedd69f096b09358754831e0","http://blog.talosintelligence.com/2018/08/picking-apart-remcos.html"],"2026020":["http://www.threatexpert.com/report.aspx?md5=63d36de591491d04071b4dc0a39d5fab","http://blog.talosintelligence.com/2018/08/picking-apart-remcos.html"],"2026021":["http://www.threatexpert.com/report.aspx?md5=02655131d4167f3be9b83b0eaa6609f7","http://www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html"],"2026022":["http://www.threatexpert.com/report.aspx?md5=02655131d4167f3be9b83b0eaa6609f7","http://www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html"],"2026023":["http://exploit-db.com/exploits/45124/","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-9866"],"2026025":["http://github.com/jas502n/St2-057/blob/master/README.md","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026026":["http://github.com/jas502n/St2-057/blob/master/README.md","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026027":["http://https://forum.mikrotik.com/viewtopic.php?t=137217"],"2026028":["http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/hp_van_sdn_cmd_inject.rb"],"2026029":["http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/hp_van_sdn_cmd_inject.rb"],"2026030":["http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/hp_van_sdn_cmd_inject.rb"],"2026031":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026032":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026033":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026034":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026035":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026036":["http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/microfocus_secure_messaging_gateway.rb"],"2026037":["http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/microfocus_secure_messaging_gateway.rb"],"2026039":["http://www.fortinet.com/blog/threat-research/android-bondpath--a-mature-spyware.html"],"2026040":["http://www.youtube.com/watch?v=zAB5G-QOyx8"],"2026071":["http://www.threatexpert.com/report.aspx?md5=7afebc844a3313eb2a89b3028fbba7a6","http://otx.alienvault.com/pulse/5b8844d6db17df1779153624"],"2026072":["http://twitter.com/serhack_/status/1037026672787304450"],"2026073":["http://twitter.com/serhack_/status/1037026672787304450"],"2026074":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026075":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026076":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026077":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026078":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026079":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026080":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026081":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026082":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026083":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"],"2026084":["http://seclists.org/oss-sec/2018/q3/142"],"2026085":["http://seclists.org/oss-sec/2018/q3/142"],"2026086":["http://seclists.org/oss-sec/2018/q3/142"],"2026087":["http://seclists.org/oss-sec/2018/q3/142"],"2026088":["http://seclists.org/oss-sec/2018/q3/142"],"2026089":["http://seclists.org/oss-sec/2018/q3/142"],"2026090":["http://seclists.org/oss-sec/2018/q3/142"],"2026091":["http://seclists.org/oss-sec/2018/q3/142"],"2026092":["http://seclists.org/oss-sec/2018/q3/142"],"2026093":["http://seclists.org/oss-sec/2018/q3/142"],"2026094":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026095":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026096":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-11776"],"2026097":["http://www.threatexpert.com/report.aspx?md5=2a2219f1dbb6039f52a5792a87cf760a"],"2026098":["http://www.threatexpert.com/report.aspx?md5=2a2219f1dbb6039f52a5792a87cf760a"],"2026099":["http://www.threatexpert.com/report.aspx?md5=dde4654f1aa9975d1ffea1af8ea5015f"],"2026100":["http://www.threatexpert.com/report.aspx?md5=dde4654f1aa9975d1ffea1af8ea5015f"],"2026101":["http://www.threatexpert.com/report.aspx?md5=ebffb046d0e12b46ba5f27c0176b01c5"],"2026102":["http://www.exploit-db.com/exploits/31683/","http://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/"],"2026103":["http://blogs.securiteam.com/index.php/archives/3445","http://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/"],"2026104":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/"],"2026105":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6884","http://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/"],"2026106":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/"],"2026107":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/"],"2026108":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/"],"2026109":["http://twitter.com/Zerodium/status/1039127214602641409"],"2026110":["http://riskiq.com/blog/labs/magecart-british-airways-breach"],"2026112":["http://bleepingcomputer.com/news/security/feedify-hacked-with-magecart-information-stealing-script"],"2026113":["http://www.threatexpert.com/report.aspx?md5=20148e48668cb5e0b22d437ee0443cfe","http://research.checkpoint.com/ramnits-network-proxy-servers/"],"2026115":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026116":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026117":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026118":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026119":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026120":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026121":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026122":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026123":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026124":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026125":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026126":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026127":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026128":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026129":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026130":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026131":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026132":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026133":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026134":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026135":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026136":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026137":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026138":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026139":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026140":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026141":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026142":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026143":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026144":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026145":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026146":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026147":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026148":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026149":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026150":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026151":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026152":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026153":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026154":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026155":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026156":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026157":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026158":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026159":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026160":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026161":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026162":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026163":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026164":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026165":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026166":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026167":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026168":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026169":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026170":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026171":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026172":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026173":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026174":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026175":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026176":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026177":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026178":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026179":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026180":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026181":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026182":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026183":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026184":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026185":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026186":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026187":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026188":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026189":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026190":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026191":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026192":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026193":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026194":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026195":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026196":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026197":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026198":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026199":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026200":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026201":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026202":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026203":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026204":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026205":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026206":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026207":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026208":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026209":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026210":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026211":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026212":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026213":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026214":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026215":["http://www.riskiq.com/blog/labs/magecart-newegg"],"2026216":["http://www.threatexpert.com/report.aspx?md5=5a7526db56f812e62302912a1c20edd2"],"2026217":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026218":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026219":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026220":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026221":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026222":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026223":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026224":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026225":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026226":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026227":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026228":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026229":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026230":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026231":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026232":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026233":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026234":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026235":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026236":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026237":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026238":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026239":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026240":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026241":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026242":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026243":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026244":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026245":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026246":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026247":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026248":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026249":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026250":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026251":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026252":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026253":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026254":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026255":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026256":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026257":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026258":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026259":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026260":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026261":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026262":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026263":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026264":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026265":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026266":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026267":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026268":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026269":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026270":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026271":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026272":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026273":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026274":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026275":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026276":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026277":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026278":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026279":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026280":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026281":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026282":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026283":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026284":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026285":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026286":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026287":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026288":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026289":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026290":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026291":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026292":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026293":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026294":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026295":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026296":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026297":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026298":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026299":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026300":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026301":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026302":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026303":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026304":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026305":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026306":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026307":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026308":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026309":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026310":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026311":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026312":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026313":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026314":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026315":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026316":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026317":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026318":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026319":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026320":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026321":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026322":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026323":["http://blog.netlab.360.com/threat-alert-a-new-worm-fbot-cleaning-adbminer-is-using-a-blockchain-based-dns-en/"],"2026324":["http://blog.netlab.360.com/threat-alert-a-new-worm-fbot-cleaning-adbminer-is-using-a-blockchain-based-dns-en/"],"2026325":["http://blog.netlab.360.com/threat-alert-a-new-worm-fbot-cleaning-adbminer-is-using-a-blockchain-based-dns-en/"],"2026326":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"],"2026327":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"],"2026328":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"],"2026329":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"],"2026330":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"],"2026331":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/","http://www.threatexpert.com/report.aspx?md5=3b5baecd61190e12a526c51d5ecccbbe"],"2026332":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/","http://www.threatexpert.com/report.aspx?md5=3b5baecd61190e12a526c51d5ecccbbe"],"2026333":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/","http://www.threatexpert.com/report.aspx?md5=3b5baecd61190e12a526c51d5ecccbbe"],"2026334":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"],"2026335":["http://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"],"2026336":["http://www.threatexpert.com/report.aspx?md5=91eaca79943c972cb2ca7ee0e462922c"],"2026337":["http://www.threatexpert.com/report.aspx?md5=91eaca79943c972cb2ca7ee0e462922c"],"2026338":["http://www.threatexpert.com/report.aspx?md5=91eaca79943c972cb2ca7ee0e462922c"],"2026339":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026340":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026341":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026342":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026343":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026344":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026345":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026346":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026347":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026348":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026349":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026350":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026351":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026352":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026353":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026354":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026355":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026356":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026357":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026358":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026359":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026361":["http://www.threatexpert.com/report.aspx?md5=f40248a592ed711d95eb8b48b31a1ed8"],"2026364":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026365":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026366":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026367":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026368":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026369":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026370":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026371":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026372":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026373":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026374":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026375":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026376":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026377":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026378":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026379":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026380":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026381":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026382":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026383":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026384":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026385":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026386":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026387":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026388":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026389":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026390":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026391":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026392":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026393":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026394":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026395":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026396":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026397":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026398":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026399":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026400":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026401":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026402":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026403":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026404":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026405":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026406":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026407":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026408":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026409":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026410":["http://www.symantec.com/blogs/expert-perspectives/ongoing-android-malware-campaign-targets-palestinians-part-2"],"2026411":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8373","http://blog.trendmicro.com/trendlabs-security-intelligence/new-cve-2018-8373-exploit-spotted-in-the-wild/"],"2026413":["http://www.threatexpert.com/report.aspx?md5=11f792cc617cf5c08603d4da829a1fa9"],"2026414":["http://www.threatexpert.com/report.aspx?md5=11f792cc617cf5c08603d4da829a1fa9"],"2026415":["http://www.threatexpert.com/report.aspx?md5=11f792cc617cf5c08603d4da829a1fa9"],"2026427":["http://www.threatexpert.com/report.aspx?md5=cac1aedbcb417dcba511db5caae4b8c0"],"2026428":["http://blog.talosintelligence.com/2018/09/vpnfilter-part-3.html"],"2026429":["http://blog.talosintelligence.com/2018/09/vpnfilter-part-3.html"],"2026431":["http://researchcenter.paloaltonetworks.com/2018/10/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/","http://www.threatexpert.com/report.aspx?md5=0f1d3ed85fee2acc23a8a26e0dc12e0f","http://www.threatexpert.com/report.aspx?md5=a2fe5dcb08ae8b72e8bc98ddc0b918e7"],"2026432":["http://researchcenter.paloaltonetworks.com/2018/10/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/","http://www.threatexpert.com/report.aspx?md5=0f1d3ed85fee2acc23a8a26e0dc12e0f","http://www.threatexpert.com/report.aspx?md5=a2fe5dcb08ae8b72e8bc98ddc0b918e7"],"2026433":["http://www.threatexpert.com/report.aspx?md5=4f3cc55c79b37a52d8f087dbf7093dcd"],"2100223":["http://www.securityfocus.com/bid/16213","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-0189"],"2100227":["http://www.securityfocus.com/bid/16267","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-0250","http://www.osvdb.org/displayvuln.php?osvdb_id=22493"],"2100230":["http://www.google.com/talk/"],"2100232":["http://www.google.com/talk/"],"2100233":["http://www.google.com/talk/"],"2100235":["http://www.google.com/talk/"],"2100236":["http://www.google.com/talk/"],"2100252":["http://www.securityfocus.com/bid/134","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0009","http://www.rfc-editor.org/rfc/rfc1035.txt"],"2100256":["http://cgi.nessus.org/plugins/dump.php3?id=10728"],"2100257":["http://cgi.nessus.org/plugins/dump.php3?id=10028"],"2100289":["http://www.securityfocus.com/bid/156","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0006"],"2100327":["http://www.securityfocus.com/bid/2220","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0152"],"2100336":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0082"],"2100349":["http://www.securityfocus.com/bid/113","http://www.securityfocus.com/bid/2242","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0368"],"2100361":["http://www.securityfocus.com/bid/2241","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0080","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0955"],"2100362":["http://www.securityfocus.com/bid/2240","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0202","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0997"],"2100494":["http://www.securityfocus.com/bid/1806"],"2100497":["http://www.securityfocus.com/bid/1806","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0884"],"2100516":["http://cgi.nessus.org/plugins/dump.php3?id=10546"],"2100518":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0183"],"2100530":["http://www.securityfocus.com/bid/1163","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0347"],"2100569":["http://www.securityfocus.com/bid/2417","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0236","http://www.cert.org/advisories/CA-2001-05.html"],"2100577":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0647"],"2100584":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0626"],"2100588":["http://www.securityfocus.com/bid/122","http://www.securityfocus.com/bid/3382","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0003","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0687","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1075","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0717","http://www.cert.org/advisories/CA-2001-05.html"],"2100590":["http://www.securityfocus.com/bid/5914","http://www.securityfocus.com/bid/6016","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1042","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1043","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1232"],"2100593":["http://www.securityfocus.com/bid/2417","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0236","http://www.cert.org/advisories/CA-2001-05.html"],"2100595":["http://www.securityfocus.com/bid/2714","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0331"],"2100654":["http://www.securityfocus.com/bid/2283","http://www.securityfocus.com/bid/9696","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0260"],"2100659":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0096","http://cgi.nessus.org/plugins/dump.php3?id=10248"],"2100660":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0531","http://cgi.nessus.org/plugins/dump.php3?id=10249"],"2100672":["http://www.securityfocus.com/bid/10248","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0096"],"2100680":["http://www.securityfocus.com/bid/4797","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1209"],"2100686":["http://www.securityfocus.com/bid/5205","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0642","http://cgi.nessus.org/plugins/dump.php3?id=10642","http://www.microsoft.com/technet/security/bulletin/MS02-034"],"2100688":["http://www.securityfocus.com/bid/4797","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1209","http://cgi.nessus.org/plugins/dump.php3?id=10673"],"2100689":["http://www.securityfocus.com/bid/5205","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0642","http://cgi.nessus.org/plugins/dump.php3?id=10642","http://www.microsoft.com/technet/security/bulletin/MS02-034"],"2100690":["http://www.securityfocus.com/bid/2041","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1086","http://www.microsoft.com/technet/security/bulletin/MS00-092.mspx"],"2100695":["http://www.securityfocus.com/bid/1204","http://www.microsoft.com/technet/security/bulletin/MS01-060.mspx"],"2100951":["http://www.securityfocus.com/bid/989","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0386","http://cgi.nessus.org/plugins/dump.php3?id=10078"],"2100953":["http://www.securityfocus.com/bid/1205"],"2100958":["http://www.securityfocus.com/bid/4078","http://cgi.nessus.org/plugins/dump.php3?id=10575"],"2100959":["http://www.securityfocus.com/bid/1205"],"2100961":["http://www.securityfocus.com/bid/4078","http://cgi.nessus.org/plugins/dump.php3?id=10575"],"2100965":["http://www.securityfocus.com/bid/4078","http://cgi.nessus.org/plugins/dump.php3?id=10575"],"2100975":["http://www.securityfocus.com/bid/149","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0278","http://cgi.nessus.org/plugins/dump.php3?id=10362","http://support.microsoft.com/default.aspx?scid=kb#-#-EN-US#-#-q188806"],"2100977":["http://www.securityfocus.com/bid/4078","http://cgi.nessus.org/plugins/dump.php3?id=10575"],"2100981":["http://www.securityfocus.com/bid/1806","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0884","http://cgi.nessus.org/plugins/dump.php3?id=10537"],"2100982":["http://www.securityfocus.com/bid/1806","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0884","http://cgi.nessus.org/plugins/dump.php3?id=10537"],"2100983":["http://www.securityfocus.com/bid/1806","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0884","http://cgi.nessus.org/plugins/dump.php3?id=10537"],"2100987":["http://www.securityfocus.com/bid/1488","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0630","http://cgi.nessus.org/plugins/dump.php3?id=10680"],"2100993":["http://www.securityfocus.com/bid/189","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1538","http://cgi.nessus.org/plugins/dump.php3?id=11032"],"2101009":["http://cgi.nessus.org/plugins/dump.php3?id=10573"],"2101013":["http://www.securityfocus.com/bid/2252","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1376"],"2101016":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0778","http://cgi.nessus.org/plugins/dump.php3?id=10491","http://cgi.nessus.org/plugins/dump.php3?id=10991"],"2101018":["http://www.securityfocus.com/bid/2110","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0407"],"2101046":["http://cgi.nessus.org/plugins/dump.php3?id=10370"],"2101055":["http://www.securityfocus.com/bid/2518"],"2101108":["http://www.securityfocus.com/bid/1532","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0760"],"2101222":["http://www.securityfocus.com/archive/1/422405/30/0/threaded","http://www.critical.lt/?vulnerabilities/200"],"2101229":["http://www.securityfocus.com/bid/9237"],"2101239":["http://www.securityfocus.com/bid/1163","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0347","http://cgi.nessus.org/plugins/dump.php3?id=10392"],"2101242":["http://www.securityfocus.com/bid/1065","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0071"],"2101243":["http://www.securityfocus.com/bid/1065","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0071"],"2101244":["http://www.securityfocus.com/bid/1065","http://www.securityfocus.com/bid/968","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0071","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0126","http://cgi.nessus.org/plugins/dump.php3?id=10115"],"2101245":["http://www.securityfocus.com/bid/1065","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0071"],"2101256":["http://www.cert.org/advisories/CA-2001-19.html"],"2101264":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0647"],"2101271":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0626"],"2101274":["http://www.securityfocus.com/bid/122","http://www.securityfocus.com/bid/3382","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0003","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0687","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1075","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0717","http://www.cert.org/advisories/CA-2001-05.html"],"2101276":["http://www.securityfocus.com/bid/5914","http://www.securityfocus.com/bid/6016","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1042","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1043","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1232"],"2101279":["http://www.securityfocus.com/bid/2417","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0236","http://www.cert.org/advisories/CA-2001-05.html"],"2101289":["http://www.cert.org/advisories/CA-2001-26.html"],"2101323":["http://www.securityfocus.com/bid/3474","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0838"],"2101379":["http://www.securityfocus.com/bid/3507","http://www.securityfocus.com/bid/8542","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0325","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-1021","http://labs.defcom.com/adv/2001/def-2001-31.txt"],"2101384":["http://www.securityfocus.com/bid/3723","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0876","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0877","http://www.microsoft.com/technet/security/bulletin/MS01-059.mspx"],"2101388":["http://www.securityfocus.com/bid/3723","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0876"],"2101401":["http://www.securityfocus.com/bid/167","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0736","http://cgi.nessus.org/plugins/dump.php3?id=1007"],"2101402":["http://cgi.nessus.org/plugins/dump.php3?id=11032"],"2101403":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0737","http://cgi.nessus.org/plugins/dump.php3?id=10576","http://cgi.nessus.org/plugins/dump.php3?id=12048"],"2101411":["http://www.securityfocus.com/bid/2112","http://www.securityfocus.com/bid/4088","http://www.securityfocus.com/bid/4089","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0517","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0012","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0013"],"2101412":["http://www.securityfocus.com/bid/2112","http://www.securityfocus.com/bid/4088","http://www.securityfocus.com/bid/4089","http://www.securityfocus.com/bid/7212","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0517","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0012","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0013"],"2101413":["http://www.securityfocus.com/bid/4088","http://www.securityfocus.com/bid/4089","http://www.securityfocus.com/bid/4132","http://www.securityfocus.com/bid/7212","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0012","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0013"],"2101414":["http://www.securityfocus.com/bid/4088","http://www.securityfocus.com/bid/4089","http://www.securityfocus.com/bid/4132","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0012","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0013"],"2101427":["http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html"],"2101435":["http://cgi.nessus.org/plugins/dump.php3?id=10728"],"2101487":["http://www.securityfocus.com/bid/2110","http://www.securityfocus.com/bid/4236","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0407","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0421","http://cgi.nessus.org/plugins/dump.php3?id=10371"],"2101519":["http://www.securityfocus.com/bid/3009","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0731"],"2101529":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0838","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0755","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0770"],"2101562":["http://www.securityfocus.com/bid/2120","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0065"],"2101603":["http://cgi.nessus.org/plugins/dump.php3?id=10498"],"2101616":["http://cgi.nessus.org/plugins/dump.php3?id=10028"],"2101634":["http://www.securityfocus.com/bid/791","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1511","http://cgi.nessus.org/plugins/dump.php3?id=10325"],"2101635":["http://www.securityfocus.com/bid/1652","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0840","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0841","http://cgi.nessus.org/plugins/dump.php3?id=10559"],"2101649":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0509","http://cgi.nessus.org/plugins/dump.php3?id=10173","http://www.cert.org/advisories/CA-1996-11.html"],"2101666":["http://cgi.nessus.org/plugins/dump.php3?id=10039"],"2101672":["http://www.securityfocus.com/bid/2601","http://www.securityfocus.com/bid/9215","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0421"],"2101728":["http://www.securityfocus.com/bid/2601","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0421"],"2101734":["http://www.securityfocus.com/bid/10078","http://www.securityfocus.com/bid/1227","http://www.securityfocus.com/bid/1504","http://www.securityfocus.com/bid/1690","http://www.securityfocus.com/bid/4638","http://www.securityfocus.com/bid/7307","http://www.securityfocus.com/bid/8376","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1510","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1514","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1519","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1539","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0479","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0656","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0761","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0943","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1035","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1194","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0256","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0794","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0826","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0126","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1522","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0271","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0286"],"2101746":["http://www.securityfocus.com/bid/4674","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0033","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0084"],"2101747":["http://www.securityfocus.com/bid/4674","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0033","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0084"],"2101779":["http://www.securityfocus.com/bid/4884"],"2101780":["http://www.securityfocus.com/bid/4713","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0379"],"2101842":["http://www.securityfocus.com/bid/13727","http://www.securityfocus.com/bid/502","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1557","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1255","http://cgi.nessus.org/plugins/dump.php3?id=10123","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-2795","http://cgi.nessus.org/plugins/dump.php3?id=10125"],"2101844":["http://www.securityfocus.com/bid/12995","http://www.securityfocus.com/bid/130","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0042","http://cgi.nessus.org/plugins/dump.php3?id=10292"],"2101859":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0508","http://cgi.nessus.org/plugins/dump.php3?id=10995"],"2101860":["http://cgi.nessus.org/plugins/dump.php3?id=10999"],"2101861":["http://cgi.nessus.org/plugins/dump.php3?id=10999"],"2101864":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0880","http://cgi.nessus.org/plugins/dump.php3?id=10319"],"2101867":["http://cgi.nessus.org/plugins/dump.php3?id=10891"],"2101874":["http://cgi.nessus.org/plugins/dump.php3?id=10851"],"2101877":["http://www.securityfocus.com/bid/1658","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0868","http://cgi.nessus.org/plugins/dump.php3?id=10188","http://cgi.nessus.org/plugins/dump.php3?id=10503"],"2101888":["http://www.securityfocus.com/bid/5427","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0826"],"2101892":["http://www.securityfocus.com/bid/2112","http://www.securityfocus.com/bid/8974","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0517"],"2101894":["http://www.securityfocus.com/bid/5731","http://www.securityfocus.com/bid/6024","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1226","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1235","http://www.kb.cert.org/vuls/id/875073"],"2101895":["http://www.securityfocus.com/bid/5731","http://www.securityfocus.com/bid/6024","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1226","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1235","http://www.kb.cert.org/vuls/id/875073"],"2101896":["http://www.securityfocus.com/bid/5731","http://www.securityfocus.com/bid/6024","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1226","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1235","http://www.kb.cert.org/vuls/id/875073"],"2101897":["http://www.securityfocus.com/bid/5731","http://www.securityfocus.com/bid/6024","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1226","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1235","http://www.kb.cert.org/vuls/id/875073"],"2101903":["http://www.securityfocus.com/bid/1110","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0284","http://cgi.nessus.org/plugins/dump.php3?id=10374"],"2101904":["http://www.securityfocus.com/bid/1110","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0284","http://cgi.nessus.org/plugins/dump.php3?id=10374"],"2101907":["http://www.securityfocus.com/bid/524","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0696"],"2101908":["http://www.securityfocus.com/bid/524","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0696"],"2101909":["http://www.securityfocus.com/bid/524","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0696","http://www.cert.org/advisories/CA-99-08-cmsd.html"],"2101912":["http://www.securityfocus.com/bid/0866","http://www.securityfocus.com/bid/866","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0977"],"2101913":["http://www.securityfocus.com/bid/1480","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0666"],"2101914":["http://www.securityfocus.com/bid/1480","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0666"],"2101915":["http://www.securityfocus.com/bid/1480","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0666"],"2101916":["http://www.securityfocus.com/bid/1480","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0666"],"2101919":["http://www.securityfocus.com/bid/11069","http://www.securityfocus.com/bid/1227","http://www.securityfocus.com/bid/1690","http://www.securityfocus.com/bid/6869","http://www.securityfocus.com/bid/7251","http://www.securityfocus.com/bid/7950","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0219","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1058","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1510","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1035","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1194","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0781","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0126","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0405"],"2101920":["http://www.securityfocus.com/bid/229","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0800"],"2101921":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0040"],"2101936":["http://www.securityfocus.com/bid/830","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0822","http://cgi.nessus.org/plugins/dump.php3?id=10184"],"2101937":["http://www.securityfocus.com/bid/948","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0096","http://cgi.nessus.org/plugins/dump.php3?id=10197"],"2101942":["http://www.securityfocus.com/bid/819"],"2101948":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0532","http://cgi.nessus.org/plugins/dump.php3?id=10595"],"2101963":["http://www.securityfocus.com/bid/864","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0974"],"2101964":["http://www.securityfocus.com/bid/122","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0003"],"2101965":["http://www.securityfocus.com/bid/122","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0003"],"2101972":["http://www.securityfocus.com/bid/10078","http://www.securityfocus.com/bid/10720","http://www.securityfocus.com/bid/1690","http://www.securityfocus.com/bid/3884","http://www.securityfocus.com/bid/8601","http://www.securityfocus.com/bid/9285","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1519","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1539","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1035","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0126","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0895"],"2101973":["http://www.securityfocus.com/bid/612","http://www.securityfocus.com/bid/7278","http://www.securityfocus.com/bid/9872","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-0911","http://cgi.nessus.org/plugins/dump.php3?id=12108"],"2101974":["http://www.securityfocus.com/bid/2972","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0826"],"2101975":["http://www.securityfocus.com/bid/2972","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0826","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-1021"],"2101976":["http://www.securityfocus.com/bid/2972","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0133","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0826","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-1021"],"2101979":["http://www.securityfocus.com/bid/5520","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1436","http://cgi.nessus.org/plugins/dump.php3?id=11158"],"2101992":["http://www.securityfocus.com/bid/2618","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0680","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1054","http://cgi.nessus.org/plugins/dump.php3?id=11112"],"2102003":["http://www.securityfocus.com/bid/5310","http://www.securityfocus.com/bid/5311","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0649","http://cgi.nessus.org/plugins/dump.php3?id=11214","http://vil.nai.com/vil/content/v_99992.htm"],"2102004":["http://www.securityfocus.com/bid/5310","http://www.securityfocus.com/bid/5311","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0649","http://cgi.nessus.org/plugins/dump.php3?id=11214","http://vil.nai.com/vil/content/v_99992.htm"],"2102005":["http://www.securityfocus.com/bid/6665","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0027","http://www.kb.cert.org/vuls/id/850785"],"2102006":["http://www.securityfocus.com/bid/6665","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0027","http://www.kb.cert.org/vuls/id/850785"],"2102007":["http://www.securityfocus.com/bid/6665","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0027","http://www.kb.cert.org/vuls/id/850785"],"2102010":["http://www.securityfocus.com/bid/6650","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0015"],"2102011":["http://www.securityfocus.com/bid/6650","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0015"],"2102014":["http://www.securityfocus.com/bid/1892"],"2102015":["http://www.securityfocus.com/bid/1892"],"2102017":["http://www.securityfocus.com/bid/2714","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0331"],"2102025":["http://www.securityfocus.com/bid/2763","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0779"],"2102061":["http://www.securityfocus.com/bid/2518","http://www.securityfocus.com/bid/6721","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0042"],"2102073":["http://www.securityfocus.com/bid/2671","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0330"],"2102082":["http://www.securityfocus.com/bid/5072","http://www.securityfocus.com/bid/5075","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0359"],"2102093":["http://www.securityfocus.com/bid/7123","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0028"],"2102103":["http://www.securityfocus.com/bid/7294","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0201","http://www.digitaldefense.net/labs/advisories/DDI-1013.txt"],"2102104":["http://www.securityfocus.com/bid/7459"],"2102123":["http://cgi.nessus.org/plugins/dump.php3?id=11633"],"2102125":["http://www.securityfocus.com/bid/7674","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0392","http://cgi.nessus.org/plugins/dump.php3?id=11677"],"2102156":["http://cgi.nessus.org/plugins/dump.php3?id=11685"],"2102184":["http://www.securityfocus.com/bid/8179","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0252","http://cgi.nessus.org/plugins/dump.php3?id=11800"],"2102185":["http://www.securityfocus.com/bid/8179","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0252","http://cgi.nessus.org/plugins/dump.php3?id=11800"],"2102193":["http://www.securityfocus.com/bid/8205","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0352","http://cgi.nessus.org/plugins/dump.php3?id=11808","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2102251":["http://www.securityfocus.com/bid/8234","http://www.securityfocus.com/bid/8458","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0528","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0605","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0715","http://cgi.nessus.org/plugins/dump.php3?id=11798","http://cgi.nessus.org/plugins/dump.php3?id=11835","http://www.microsoft.com/technet/security/bulletin/MS03-039.mspx"],"2102252":["http://www.securityfocus.com/bid/8234","http://www.securityfocus.com/bid/8458","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0528","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0605","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0715","http://cgi.nessus.org/plugins/dump.php3?id=11798","http://cgi.nessus.org/plugins/dump.php3?id=11835","http://www.microsoft.com/technet/security/bulletin/MS03-039.mspx"],"2102257":["http://www.securityfocus.com/bid/8826","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0717","http://cgi.nessus.org/plugins/dump.php3?id=11888","http://cgi.nessus.org/plugins/dump.php3?id=11890","http://www.microsoft.com/technet/security/bulletin/MS03-043.mspx"],"2102258":["http://www.securityfocus.com/bid/8826","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0717","http://cgi.nessus.org/plugins/dump.php3?id=11888","http://cgi.nessus.org/plugins/dump.php3?id=11890","http://www.microsoft.com/technet/security/bulletin/MS03-043.mspx"],"2102259":["http://www.securityfocus.com/bid/6991","http://www.securityfocus.com/bid/7230","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1337","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0161"],"2102308":["http://www.securityfocus.com/bid/9011","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0812","http://www.microsoft.com/technet/security/bulletin/MS03-049.mspx"],"2102309":["http://www.securityfocus.com/bid/9011","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0812","http://www.microsoft.com/technet/security/bulletin/MS03-049.mspx"],"2102310":["http://www.securityfocus.com/bid/9011","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0812","http://www.microsoft.com/technet/security/bulletin/MS03-049.mspx"],"2102311":["http://www.securityfocus.com/bid/9011","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0812","http://www.microsoft.com/technet/security/bulletin/MS03-049.mspx"],"2102315":["http://www.securityfocus.com/bid/9011","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0812","http://www.microsoft.com/technet/security/bulletin/MS03-049.mspx"],"2102316":["http://www.securityfocus.com/bid/9011","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0812","http://www.microsoft.com/technet/security/bulletin/MS03-049.mspx"],"2102317":["http://www.securityfocus.com/bid/9178","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0977"],"2102330":["http://www.securityfocus.com/bid/8861"],"2102373":["http://www.securityfocus.com/bid/7909","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0133","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-1021"],"2102374":["http://www.securityfocus.com/bid/10184","http://www.securityfocus.com/bid/7909","http://www.securityfocus.com/bid/9675","http://cve.mitre.org/cgi-bin/cvename.cgi?name=1999-1544"],"2102383":["http://www.securityfocus.com/bid/9633","http://www.securityfocus.com/bid/9635","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0818","http://cgi.nessus.org/plugins/dump.php3?id=12052","http://cgi.nessus.org/plugins/dump.php3?id=12065","http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx"],"2102384":["http://www.securityfocus.com/bid/9633","http://www.securityfocus.com/bid/9635","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0818","http://cgi.nessus.org/plugins/dump.php3?id=12052","http://cgi.nessus.org/plugins/dump.php3?id=12054","http://cgi.nessus.org/plugins/dump.php3?id=12065"],"2102385":["http://www.securityfocus.com/bid/9633","http://www.securityfocus.com/bid/9635","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0818","http://cgi.nessus.org/plugins/dump.php3?id=12052","http://cgi.nessus.org/plugins/dump.php3?id=12054","http://cgi.nessus.org/plugins/dump.php3?id=12065"],"2102386":["http://www.securityfocus.com/bid/9633","http://www.securityfocus.com/bid/9635","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0818","http://cgi.nessus.org/plugins/dump.php3?id=12052","http://cgi.nessus.org/plugins/dump.php3?id=12055","http://cgi.nessus.org/plugins/dump.php3?id=12065","http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx"],"2102389":["http://www.securityfocus.com/bid/8315","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0133","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-1021","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0466"],"2102390":["http://www.securityfocus.com/bid/8315","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0466"],"2102391":["http://www.securityfocus.com/bid/8315","http://www.securityfocus.com/bid/8542","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0133","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0466"],"2102392":["http://www.securityfocus.com/bid/8315","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0466","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0287","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0298"],"2102401":["http://www.securityfocus.com/bid/9752","http://www.eeye.com/html/Research/Advisories/AD20040226.html"],"2102402":["http://www.securityfocus.com/bid/9752","http://www.eeye.com/html/Research/Advisories/AD20040226.html"],"2102409":["http://www.securityfocus.com/bid/9794"],"2102416":["http://www.securityfocus.com/bid/9751","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-1021","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0330"],"2102449":["http://www.securityfocus.com/bid/9953"],"2102491":["http://www.securityfocus.com/bid/8811","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0813","http://cgi.nessus.org/plugins/dump.php3?id=12206","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102496":["http://www.securityfocus.com/bid/8811","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0813","http://cgi.nessus.org/plugins/dump.php3?id=12206","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102507":["http://www.securityfocus.com/bid/10108","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0533","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102510":["http://www.securityfocus.com/bid/10108","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0533","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102511":["http://www.securityfocus.com/bid/10108","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0533","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102512":["http://www.securityfocus.com/bid/10108","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0533","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102513":["http://www.securityfocus.com/bid/10108","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0533","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102523":["http://www.securityfocus.com/bid/10183","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0230","http://www.uniras.gov.uk/vuls/2004/236929/index.htm"],"2102524":["http://www.securityfocus.com/bid/10108","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0533","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102525":["http://www.securityfocus.com/bid/10108","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0533","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102526":["http://www.securityfocus.com/bid/10108","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0533","http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx"],"2102546":["http://www.securityfocus.com/bid/9751","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-1021","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0330","http://cgi.nessus.org/plugins/dump.php3?id=12080"],"2102547":["http://www.securityfocus.com/bid/9978"],"2102548":["http://www.securityfocus.com/bid/9972"],"2102549":["http://www.securityfocus.com/bid/9973"],"2102576":["http://www.appsecinc.com/Policy/PolicyCheck93.html"],"2102585":["http://cgi.nessus.org/plugins/dump.php3?id=10386"],"2102587":["http://www.emule-project.net"],"2102600":["http://www.appsecinc.com/Policy/PolicyCheck633.html"],"2102602":["http://www.appsecinc.com/Policy/PolicyCheck87.html"],"2102603":["http://www.appsecinc.com/Policy/PolicyCheck633.html"],"2102604":["http://www.appsecinc.com/Policy/PolicyCheck633.html"],"2102605":["http://www.appsecinc.com/Policy/PolicyCheck91.html"],"2102606":["http://www.appsecinc.com/Policy/PolicyCheck634.html"],"2102607":["http://www.appsecinc.com/Policy/PolicyCheck634.html"],"2102610":["http://www.appsecinc.com/Policy/PolicyCheck633.html"],"2102614":["http://www.securityfocus.com/bid/9587","http://www.nextgenss.com/advisories/ora_time_zone.txt"],"2102616":["http://www.appsecinc.com/Policy/PolicyCheck97.html"],"2102618":["http://www.appsecinc.com/Policy/PolicyCheck632.html"],"2102619":["http://www.appsecinc.com/Policy/PolicyCheck634.html"],"2102621":["http://www.appsecinc.com/Policy/PolicyCheck97.html"],"2102622":["http://www.appsecinc.com/Policy/PolicyCheck97.html"],"2102623":["http://www.appsecinc.com/Policy/PolicyCheck97.html"],"2102624":["http://www.appsecinc.com/Policy/PolicyCheck94.html"],"2102625":["http://www.appsecinc.com/Policy/PolicyCheck94.html"],"2102626":["http://www.appsecinc.com/Policy/PolicyCheck91.html"],"2102627":["http://www.appsecinc.com/Policy/PolicyCheck90.html"],"2102628":["http://www.appsecinc.com/Policy/PolicyCheck90.html"],"2102629":["http://www.appsecinc.com/Policy/PolicyCheck94.html"],"2102630":["http://www.appsecinc.com/Policy/PolicyCheck94.html"],"2102631":["http://www.appsecinc.com/Policy/PolicyCheck90.html"],"2102632":["http://www.appsecinc.com/Policy/PolicyCheck90.html"],"2102634":["http://www.appsecinc.com/Policy/PolicyCheck97.html"],"2102635":["http://www.appsecinc.com/Policy/PolicyCheck632.html"],"2102636":["http://www.appsecinc.com/Policy/PolicyCheck632.html"],"2102637":["http://www.appsecinc.com/Policy/PolicyCheck634.html"],"2102638":["http://www.appsecinc.com/Policy/PolicyCheck634.html"],"2102639":["http://www.appsecinc.com/Policy/PolicyCheck90.html"],"2102640":["http://www.appsecinc.com/Policy/PolicyCheck90.html"],"2102642":["http://www.appsecinc.com/Policy/PolicyCheck629.html"],"2102644":["http://www.nextgenss.com/advisories/ora_from_tz.txt"],"2102646":["http://www.appsecinc.com/Policy/PolicyCheck630.html"],"2102648":["http://www.appsecinc.com/Policy/PolicyCheck631.html"],"2102649":["http://www.appsecinc.com/Policy/PolicyCheck52.html"],"2102650":["http://www.appsecinc.com/Policy/PolicyCheck62.html"],"2102652":["http://www.appsecinc.com/Policy/PolicyCheck632.html"],"2102653":["http://www.appsecinc.com/Policy/PolicyCheck632.html"],"2102654":["http://www.securityfocus.com/bid/7193"],"2102703":["http://www.securityfocus.com/bid/10871","http://www.nextgenss.com/advisories/ora-isqlplus.txt"],"2102708":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102709":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102711":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102712":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102713":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102714":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102715":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102717":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102718":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102719":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102720":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102721":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102722":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102723":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102724":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102725":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102727":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102728":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102729":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102730":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102731":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102732":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102733":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102734":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102735":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102736":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102737":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102738":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102739":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102740":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102741":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102742":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102743":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102744":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102745":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102746":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102747":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102748":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102749":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102750":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102751":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102752":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102753":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102754":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102755":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102756":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102757":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102758":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102759":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102760":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102761":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102762":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102763":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102764":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102765":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102766":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102767":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102769":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102770":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102771":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102772":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102773":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102774":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102775":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102776":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102777":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102778":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102779":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102780":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102781":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102782":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102783":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102784":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102785":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102786":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102788":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102789":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102790":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102791":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102792":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102793":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102795":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102796":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102797":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102798":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102799":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102800":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102801":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102802":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102804":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102805":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102806":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102807":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102808":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102809":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102810":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102811":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102812":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102822":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102830":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102850":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102851":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102852":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102853":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102854":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102855":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102856":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102857":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102859":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102877":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102893":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102895":["http://www.appsecinc.com/resources/alerts/oracle/2004-0001/25.html"],"2102928":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102929":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102930":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102931":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102932":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102933":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102934":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102935":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102936":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102937":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102938":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102939":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102946":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102947":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102948":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102949":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102956":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102957":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102958":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102959":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102960":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102961":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102962":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102963":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102964":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102965":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102966":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102967":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102968":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102969":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102970":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2102971":["http://www.securityfocus.com/bid/11372","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0206"],"2103001":["http://www.securityfocus.com/bid/9633","http://www.securityfocus.com/bid/9635","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0818","http://cgi.nessus.org/plugins/dump.php3?id=12052","http://cgi.nessus.org/plugins/dump.php3?id=12065","http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx"],"2103002":["http://www.securityfocus.com/bid/9633","http://www.securityfocus.com/bid/9635","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0818","http://cgi.nessus.org/plugins/dump.php3?id=12052","http://cgi.nessus.org/plugins/dump.php3?id=12065","http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx"],"2103003":["http://www.securityfocus.com/bid/9633","http://www.securityfocus.com/bid/9635","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0818","http://cgi.nessus.org/plugins/dump.php3?id=12052","http://cgi.nessus.org/plugins/dump.php3?id=12065","http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx"],"2103007":["http://www.securityfocus.com/bid/11675"],"2103018":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103019":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103020":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103022":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103024":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103026":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103027":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103028":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103029":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103030":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103032":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103034":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103035":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103036":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103038":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103040":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1154"],"2103058":["http://www.securityfocus.com/bid/1110"],"2103066":["http://www.securityfocus.com/bid/11775"],"2103068":["http://www.securityfocus.com/bid/11775"],"2103070":["http://www.securityfocus.com/bid/11775"],"2103072":["http://www.securityfocus.com/bid/11775","http://www.securityfocus.com/bid/13727","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1256"],"2103073":["http://www.securityfocus.com/bid/11775"],"2103074":["http://www.securityfocus.com/bid/11775"],"2103075":["http://www.securityfocus.com/bid/11775"],"2103076":["http://www.securityfocus.com/bid/11775"],"2103114":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103115":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103116":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103117":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103118":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103119":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103120":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103121":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103122":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103123":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103124":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103125":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103126":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103127":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103128":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103129":["http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx"],"2103152":["http://www.securityfocus.com/bid/4797","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1209","http://cgi.nessus.org/plugins/dump.php3?id=10673"],"2103156":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103157":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103158":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103159":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103160":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103161":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103162":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103163":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103164":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103165":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103166":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103167":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103168":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103169":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103170":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103171":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103172":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103173":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103174":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103175":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103176":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103177":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103178":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103179":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103180":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103181":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103182":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103183":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103184":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103185":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103186":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103187":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103188":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103189":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103190":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103191":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0995","http://www.eeye.com/html/Research/Advisories/AD20030910.html","http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx"],"2103193":["http://www.securityfocus.com/bid/1912","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0886"],"2103218":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377","http://www.microsoft.com/technet/security/bulletin/MS00-040.mspx"],"2103219":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103220":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103221":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103222":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103223":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103224":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103225":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103226":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103227":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103228":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103229":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103230":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103231":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103232":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377"],"2103233":["http://www.securityfocus.com/bid/1331","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-0377","http://www.microsoft.com/technet/security/bulletin/MS00-040.mspx"],"2103238":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103239":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103256":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103257":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103258":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103259":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103260":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103261":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103262":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103263":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103264":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103265":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103266":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103267":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103268":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103269":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103270":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103271":["http://www.securityfocus.com/bid/6005","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-1561","http://www.microsoft.com/technet/security/bulletin/MS03-010.mspx"],"2103273":["http://www.securityfocus.com/bid/4797","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2000-1209","http://cgi.nessus.org/plugins/dump.php3?id=10673"],"2103274":["http://www.securityfocus.com/bid/3681","http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0797"],"2103461":["http://marc.theaimsgroup.com/?l=bugtraq&m=111911095424496&w=2"],"2230012":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160"],"2230013":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160"],"2230014":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0160"],"2400000":["http://www.spamhaus.org/drop/drop.lasso"],"2400001":["http://www.spamhaus.org/drop/drop.lasso"],"2400002":["http://www.spamhaus.org/drop/drop.lasso"],"2400003":["http://www.spamhaus.org/drop/drop.lasso"],"2400004":["http://www.spamhaus.org/drop/drop.lasso"],"2400005":["http://www.spamhaus.org/drop/drop.lasso"],"2400006":["http://www.spamhaus.org/drop/drop.lasso"],"2400007":["http://www.spamhaus.org/drop/drop.lasso"],"2400008":["http://www.spamhaus.org/drop/drop.lasso"],"2400009":["http://www.spamhaus.org/drop/drop.lasso"],"2400010":["http://www.spamhaus.org/drop/drop.lasso"],"2400011":["http://www.spamhaus.org/drop/drop.lasso"],"2400012":["http://www.spamhaus.org/drop/drop.lasso"],"2400013":["http://www.spamhaus.org/drop/drop.lasso"],"2400014":["http://www.spamhaus.org/drop/drop.lasso"],"2400015":["http://www.spamhaus.org/drop/drop.lasso"],"2400016":["http://www.spamhaus.org/drop/drop.lasso"],"2400017":["http://www.spamhaus.org/drop/drop.lasso"],"2400018":["http://www.spamhaus.org/drop/drop.lasso"],"2400019":["http://www.spamhaus.org/drop/drop.lasso"],"2400020":["http://www.spamhaus.org/drop/drop.lasso"],"2400021":["http://www.spamhaus.org/drop/drop.lasso"],"2400022":["http://www.spamhaus.org/drop/drop.lasso"],"2400023":["http://www.spamhaus.org/drop/drop.lasso"],"2400024":["http://www.spamhaus.org/drop/drop.lasso"],"2400025":["http://www.spamhaus.org/drop/drop.lasso"],"2400026":["http://www.spamhaus.org/drop/drop.lasso"],"2400027":["http://www.spamhaus.org/drop/drop.lasso"],"2400028":["http://www.spamhaus.org/drop/drop.lasso"],"2400029":["http://www.spamhaus.org/drop/drop.lasso"],"2400030":["http://www.spamhaus.org/drop/drop.lasso"],"2400031":["http://www.spamhaus.org/drop/drop.lasso"],"2400032":["http://www.spamhaus.org/drop/drop.lasso"],"2402000":["http://feeds.dshield.org/block.txt"],"2403300":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403301":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403302":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403303":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403304":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403305":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403306":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403307":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403308":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403309":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403310":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403311":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403312":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403313":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403314":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403315":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403316":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403317":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403318":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403319":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403320":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403321":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403322":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403323":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403324":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403325":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403326":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403327":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403328":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403329":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403330":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403331":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403332":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403333":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403334":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403335":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403336":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403337":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403338":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403339":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403340":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403341":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403342":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403343":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403344":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403345":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403346":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403347":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403348":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403349":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403350":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403351":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403352":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403353":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403354":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403355":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403356":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403357":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403358":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403359":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403360":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403361":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403362":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403363":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403364":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403365":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403366":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403367":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403368":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403369":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403370":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403371":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403372":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403373":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403374":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403375":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403376":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403377":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403378":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403379":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403380":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403381":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403382":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403383":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403384":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403385":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403386":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403387":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403388":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403389":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403390":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403391":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403392":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403393":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403394":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403395":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403396":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403397":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403398":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2403399":["http://www.cinsscore.com","http://www.networkcloaking.com/cins"],"2404000":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404001":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404002":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404003":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404004":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404005":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404006":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404007":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404008":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404009":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404010":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404011":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404012":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404013":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404014":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404015":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404016":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404017":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404018":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404019":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404020":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404021":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404022":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404023":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404024":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404025":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404026":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404027":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404028":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404029":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404030":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404031":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2404150":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404151":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404152":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404153":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404154":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404155":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404156":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404157":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404158":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404159":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404160":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404161":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404162":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404163":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404164":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404165":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404166":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404167":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404168":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404169":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404170":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404171":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://zeustracker.abuse.ch"],"2404300":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404301":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404302":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404303":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404304":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404305":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404306":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404307":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404308":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404309":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404310":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404311":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404312":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404313":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404314":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404315":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404316":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404317":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404318":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404319":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404320":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404321":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404322":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404323":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404324":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://feodotracker.abuse.ch"],"2404400":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404401":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404402":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404403":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404404":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404405":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404406":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404407":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404408":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404409":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404410":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404411":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404412":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404413":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404414":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404415":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404416":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404417":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404418":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404419":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404420":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404421":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404422":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404423":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404424":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404425":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404426":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404427":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404428":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404429":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404430":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404431":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404432":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404433":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404434":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404435":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404436":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404437":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404438":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404439":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404440":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404441":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404442":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404443":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404444":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404445":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404446":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404447":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404448":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404449":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404450":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404451":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404452":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404453":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404454":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404455":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404456":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404457":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404458":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404459":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404460":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404461":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404462":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404463":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404464":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404465":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404466":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404467":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404468":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404469":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404470":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404471":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404472":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404473":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404474":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404475":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404476":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404477":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404478":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404479":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404480":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404481":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404482":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404483":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404484":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404485":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404486":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404487":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404488":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404489":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404490":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404491":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404492":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404493":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404494":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404495":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404496":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404497":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404498":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404499":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404500":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404501":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404502":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404503":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404504":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404505":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404506":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404507":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404508":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404509":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404510":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404511":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404512":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404513":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404514":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404515":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404516":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404517":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404518":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404519":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404520":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404521":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404522":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404523":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404524":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404525":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404526":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404527":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404528":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404529":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404530":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404531":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404532":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404533":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404534":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404535":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404536":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404537":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404538":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404539":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404540":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404541":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404542":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404543":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404544":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404545":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404546":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404547":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404548":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404549":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404550":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404551":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404552":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404553":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404554":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404555":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404556":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404557":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2404558":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://ransomwaretracker.abuse.ch"],"2405000":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405001":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405002":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405003":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405004":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405005":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405006":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405007":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405008":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405009":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405010":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405011":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405012":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405013":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405014":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405015":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405016":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2405017":["http://doc.emergingthreats.net/bin/view/Main/BotCC","http://www.shadowserver.org"],"2500000":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500002":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500004":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500006":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500008":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500010":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500012":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500014":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500016":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500018":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500020":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500022":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500024":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500026":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500028":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500030":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500032":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500034":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500036":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500038":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500040":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500042":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500044":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2500046":["http://doc.emergingthreats.net/bin/view/Main/CompromisedHosts"],"2520000":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520002":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520004":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520006":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520008":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520010":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520012":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520014":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520016":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520018":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520020":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520022":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520024":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520026":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520028":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520030":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520032":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520034":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520036":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520038":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520040":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520042":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520044":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520046":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520048":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520050":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520052":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520054":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520056":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520058":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520060":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520062":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520064":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520066":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520068":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520070":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520072":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520074":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520076":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520078":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520080":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520082":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520084":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520086":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520088":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520090":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520092":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520094":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520096":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520098":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520100":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520102":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520104":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520106":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520108":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520110":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520112":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520114":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520116":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520118":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520120":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520122":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520124":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520126":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520128":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520130":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520132":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520134":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520136":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520138":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520140":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520142":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520144":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520146":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520148":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520150":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520152":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520154":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520156":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520158":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520160":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2520162":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522000":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522002":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522004":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522006":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522008":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522010":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522012":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522014":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522016":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522018":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522020":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522022":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522024":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522026":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522028":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522030":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522032":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522034":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522036":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522038":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522040":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522042":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522044":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522046":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522048":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522050":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522052":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522054":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522056":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522058":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522060":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522062":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522064":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522066":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522068":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522070":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522072":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522074":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522076":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522078":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522080":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522082":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522084":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522086":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522088":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522090":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522092":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522094":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522096":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522098":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522100":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522102":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522104":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522106":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522108":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522110":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522112":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522114":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522116":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522118":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522120":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522122":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522124":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522126":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522128":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522130":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522132":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522134":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522136":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522138":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522140":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522142":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522144":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522146":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522148":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522150":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522152":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522154":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522156":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522158":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522160":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522162":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522164":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522166":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522168":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522170":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522172":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522174":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522176":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522178":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522180":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522182":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522184":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522186":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522188":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522190":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522192":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522194":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522196":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522198":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522200":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522202":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522204":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522206":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522208":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522210":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522212":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522214":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522216":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522218":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522220":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522222":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522224":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522226":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522228":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522230":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522232":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522234":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522236":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522238":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522240":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522242":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522244":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522246":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522248":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522250":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522252":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522254":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522256":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522258":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522260":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522262":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522264":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522266":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522268":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522270":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522272":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522274":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522276":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522278":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522280":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522282":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522284":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522286":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522288":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522290":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522292":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522294":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522296":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522298":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522300":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522302":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522304":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522306":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522308":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522310":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522312":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522314":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522316":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522318":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522320":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522322":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522324":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522326":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522328":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522330":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522332":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522334":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522336":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522338":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522340":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522342":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522344":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522346":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522348":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522350":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522352":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522354":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522356":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522358":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522360":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522362":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522364":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522366":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522368":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522370":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522372":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522374":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522376":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522378":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522380":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522382":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522384":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522386":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522388":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522390":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522392":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522394":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522396":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522398":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522400":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522402":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522404":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522406":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522408":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522410":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522412":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522414":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522416":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522418":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522420":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522422":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522424":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522426":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522428":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522430":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522432":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522434":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522436":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522438":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522440":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522442":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522444":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522446":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522448":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522450":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522452":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522454":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522456":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522458":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522460":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522462":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522464":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522466":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522468":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522470":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522472":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522474":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522476":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522478":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522480":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522482":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522484":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522486":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522488":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522490":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522492":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522494":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522496":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522498":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522500":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522502":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522504":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522506":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522508":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522510":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522512":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522514":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522516":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522518":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522520":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522522":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522524":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522526":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522528":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522530":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522532":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522534":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522536":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522538":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522540":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522542":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522544":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522546":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522548":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522550":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522552":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522554":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522556":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522558":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522560":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522562":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522564":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522566":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522568":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522570":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522572":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522574":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522576":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522578":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522580":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522582":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522584":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522586":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522588":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522590":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522592":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522594":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522596":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522598":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522600":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522602":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522604":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522606":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522608":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522610":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522612":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522614":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522616":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522618":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522620":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522622":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522624":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522626":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522628":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522630":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522632":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522634":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522636":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522638":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522640":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522642":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522644":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522646":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522648":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522650":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522652":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522654":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522656":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522658":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522660":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522662":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522664":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522666":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522668":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522670":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522672":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522674":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522676":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522678":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522680":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522682":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522684":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522686":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522688":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522690":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522692":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522694":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522696":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522698":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522700":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522702":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522704":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522706":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522708":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522710":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522712":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522714":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522716":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522718":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522720":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522722":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522724":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522726":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522728":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522730":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522732":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522734":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522736":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522738":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522740":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522742":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522744":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522746":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522748":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522750":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522752":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522754":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522756":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522758":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522760":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522762":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522764":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522766":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522768":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522770":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522772":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522774":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522776":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522778":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522780":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522782":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522784":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522786":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522788":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522790":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522792":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522794":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522796":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522798":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522800":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522802":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522804":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522806":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522808":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522810":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522812":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522814":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522816":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522818":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522820":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522822":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522824":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522826":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522828":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522830":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522832":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522834":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522836":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522838":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522840":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522842":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522844":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522846":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522848":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522850":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522852":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522854":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522856":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522858":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522860":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522862":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522864":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522866":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522868":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522870":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522872":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522874":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522876":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522878":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522880":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522882":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522884":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522886":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522888":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522890":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522892":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522894":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522896":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522898":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522900":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522902":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522904":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522906":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522908":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522910":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522912":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522914":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522916":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522918":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522920":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522922":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522924":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522926":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522928":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522930":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522932":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522934":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522936":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522938":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522940":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522942":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522944":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522946":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522948":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522950":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522952":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522954":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522956":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522958":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522960":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522962":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522964":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522966":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522968":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522970":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522972":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522974":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522976":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522978":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522980":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522982":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522984":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522986":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522988":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522990":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522992":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522994":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522996":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2522998":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523000":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523002":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523004":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523006":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523008":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523010":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523012":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523014":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523016":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523018":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523020":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523022":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523024":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523026":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523028":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523030":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523032":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523034":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523036":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523038":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523040":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523042":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523044":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523046":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523048":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523050":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523052":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523054":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523056":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523058":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523060":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523062":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523064":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523066":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523068":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523070":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523072":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523074":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523076":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523078":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523080":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523082":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523084":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523086":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523088":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523090":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523092":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523094":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523096":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523098":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523100":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523102":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523104":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523106":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523108":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523110":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523112":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523114":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523116":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523118":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523120":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523122":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523124":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523126":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523128":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523130":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523132":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523134":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523136":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523138":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523140":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523142":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523144":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523146":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523148":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523150":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523152":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523154":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523156":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523158":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523160":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523162":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523164":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523166":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523168":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523170":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523172":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523174":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523176":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523178":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523180":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523182":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523184":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523186":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523188":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523190":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523192":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523194":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523196":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523198":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523200":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523202":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523204":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523206":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523208":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523210":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523212":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523214":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523216":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523218":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523220":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523222":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523224":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523226":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523228":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523230":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523232":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523234":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523236":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523238":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523240":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523242":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523244":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523246":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523248":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523250":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523252":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523254":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523256":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523258":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523260":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523262":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523264":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523266":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523268":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523270":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523272":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523274":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523276":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523278":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523280":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523282":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523284":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523286":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523288":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523290":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523292":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523294":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523296":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523298":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523300":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523302":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523304":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523306":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523308":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523310":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523312":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523314":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523316":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523318":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523320":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523322":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523324":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523326":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523328":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523330":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523332":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523334":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523336":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523338":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523340":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523342":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523344":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523346":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523348":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523350":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523352":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523354":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523356":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523358":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523360":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523362":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523364":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523366":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523368":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523370":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523372":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523374":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523376":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523378":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523380":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523382":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523384":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523386":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523388":["http://doc.emergingthreats.net/bin/view/Main/TorRules"],"2523390":["http://doc.emergingthreats.net/bin/view/Main/TorRules"]}')},1652:function(t,e,c){"use strict";Object.defineProperty(e,"__esModule",{value:!0});var r=c(1634);e.db=r}}]);