20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow | Exploit Mailing List Third Party Advisory
|
20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) | Mailing List Third Party Advisory
|
https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability | |
62691 | |
http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/ | |
http://linux.oracle.com/errata/ELSA-2015-0090.html | |
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21695835 | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10100 | |
62698 | |
http://linux.oracle.com/errata/ELSA-2015-0092.html | |
62692 | |
https://bto.bluecoat.com/security-advisory/sa90 | |
62690 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21695860 | |
62715 | |
20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability | |
62688 | |
62681 | |
62667 | |
https://www.sophos.com/en-us/support/knowledgebase/121879.aspx | |
http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html | Exploit Third Party Advisory VDB Entry
|
62517 | |
62640 | |
62680 | |
20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow | Mailing List Third Party Advisory
|
http://www-01.ibm.com/support/docview.wss?uid=swg21696600 | |
62883 | |
62870 | |
62871 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21696526 | |
62879 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21696602 | |
62865 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21696618 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21696243 | |
DSA-3142 | |
RHSA-2015:0126 | |
http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html | Third Party Advisory VDB Entry
|
72325 | Third Party Advisory VDB Entry
|
MDVSA-2015:039 | |
HPSBHF03289 | Issue Tracking Mailing List Third Party Advisory
|
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 | Broken Link Permissions Required
|
https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt | |
http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf | Broken Link URL Repurposed
|
http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry
|
HPSBGN03270 | Issue Tracking Mailing List Third Party Advisory
|
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html | |
APPLE-SA-2015-06-30-2 | Mailing List Third Party Advisory
|
http://support.apple.com/kb/HT204942 | |
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | |
https://support.apple.com/HT205267 | |
APPLE-SA-2015-09-30-3 | Mailing List Third Party Advisory
|
https://support.apple.com/HT205375 | |
APPLE-SA-2015-10-21-4 | Mailing List Third Party Advisory
|
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | |
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | |
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html | Patch Third Party Advisory
|
91787 | Third Party Advisory VDB Entry
|
HPSBGN03285 | Issue Tracking Mailing List Third Party Advisory
|
HPSBGN03247 | Issue Tracking Mailing List Third Party Advisory
|
HPSBMU03330 | Issue Tracking Mailing List Third Party Advisory
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html | Patch Third Party Advisory
|
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668 | |
https://www.f-secure.com/en/web/labs_global/fsc-2015-1 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21696131 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21695774 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21695695 | |
62816 | |
62813 | |
62812 | |
62758 | |
GLSA-201503-04 | |
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html | Patch Third Party Advisory
|
1032909 | Third Party Advisory VDB Entry
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | Patch Third Party Advisory
|
https://security.netapp.com/advisory/ntap-20150127-0001/ | |
20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235 | Exploit Third Party Advisory VDB Entry
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | Patch Third Party Advisory
|
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes | |
20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series | Exploit Mailing List Third Party Advisory
|
20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series | Exploit Mailing List Third Party Advisory
|
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html | Exploit Third Party Advisory VDB Entry
|
https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf | |
[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim | |
20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices | Exploit Mailing List Third Party Advisory
|
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html | Exploit Third Party Advisory VDB Entry
|
https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9 | |
20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series | Exploit Mailing List Third Party Advisory
|
http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html | Exploit Third Party Advisory VDB Entry
|