English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 76783 CVE descriptions
and 40246 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.102039
Category:Mac OS X Local Security Checks
Title:Mac OS X 10.6.3 Update / Mac OS X Security Update 2010-002
Summary:Checks for existence of Mac OS X 10.6.3 Update / Mac OS X Security Update 2010-002
Description:
Overview:
The remote host is missing Mac OS X 10.6.3 Update / Mac OS X Security Update 2010-002.
One or more of the following components are affected:

AppKit
Application Firewall
AFP Server
Apache
ClamAV
CoreAudio
CoreMedia
CoreTypes
CUPS
curl
Cyrus IMAP
Cyrus SASL
DesktopServices
Disk Images
Directory Services
Dovecot
Event Monitor
FreeRADIUS
FTP Server
iChat Server
ImageIO
Image RAW
Libsystem
Mail
Mailman
MySQL
OS Services
Password Server
perl
PHP
Podcast Producer
Preferences
PS Normalizer
QuickTime
Ruby
Server Admin
SMB
Tomcat
unzip
vim
Wiki Server
X11
xar

Solution:
Update your Mac OS X operating system.

For more information see:
http://support.apple.com/kb/HT4077
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-0056
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Common Vulnerability Exposure (CVE) ID: CVE-2009-2801
Common Vulnerability Exposure (CVE) ID: CVE-2010-0057
Common Vulnerability Exposure (CVE) ID: CVE-2010-0533
Common Vulnerability Exposure (CVE) ID: CVE-2009-3095
Bugtraq: 20091124 rPSA-2009-0155-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/508075/100/0/threaded
http://intevydis.com/vd-list.shtml
Debian Security Information: DSA-1934 (Google Search)
http://www.debian.org/security/2009/dsa-1934
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html
HPdes Security Advisory: HPSBOV02683
http://marc.info/?l=bugtraq&m=130497311408250&w=2
HPdes Security Advisory: SSRT090208
SuSE Security Announcement: SUSE-SA:2009:050 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8662
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9363
http://secunia.com/advisories/37152
Common Vulnerability Exposure (CVE) ID: CVE-2010-0058
Common Vulnerability Exposure (CVE) ID: CVE-2010-0059
Bugtraq: 20100402 ZDI-10-041: Apple QuickTime QDM2/QDCA Atom Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510517/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-041
http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6922
Common Vulnerability Exposure (CVE) ID: CVE-2010-0060
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7513
Common Vulnerability Exposure (CVE) ID: CVE-2010-0062
Bugtraq: 20100402 ZDI-10-036: Apple QuickTime H.263 PictureHeader Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510510/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-036
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6626
Common Vulnerability Exposure (CVE) ID: CVE-2010-0063
Common Vulnerability Exposure (CVE) ID: CVE-2010-0393
http://www.cups.org/str.php?L3482
http://security.gentoo.org/glsa/glsa-201207-10.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:072
http://www.mandriva.com/security/advisories?name=MDVSA-2010:073
http://www.ubuntu.com/usn/USN-906-1
BugTraq ID: 38524
http://www.securityfocus.com/bid/38524
Common Vulnerability Exposure (CVE) ID: CVE-2009-2417
Bugtraq: 20090824 rPSA-2009-0124-1 curl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/506055/100/0/threaded
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
http://www.ubuntu.com/usn/USN-1158-1
BugTraq ID: 36032
http://www.securityfocus.com/bid/36032
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10114
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8542
http://secunia.com/advisories/36238
http://secunia.com/advisories/36475
http://secunia.com/advisories/37471
http://secunia.com/advisories/45047
http://www.vupen.com/english/advisories/2009/2263
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: curl-certificate-security-bypass(52405)
http://xforce.iss.net/xforce/xfdb/52405
Common Vulnerability Exposure (CVE) ID: CVE-2009-0037
Bugtraq: 20090312 rPSA-2009-0042-1 curl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/501757/100/0/threaded
Bugtraq: 20090711 VMSA-2009-0009 ESX Service Console updates for udev, sudo, and curl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504849/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2009/000060.html
http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/
http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf
Debian Security Information: DSA-1738 (Google Search)
http://www.debian.org/security/2009/dsa-1738
http://security.gentoo.org/glsa/glsa-200903-21.xml
http://www.redhat.com/support/errata/RHSA-2009-0341.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602
SuSE Security Announcement: SUSE-SR:2009:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
http://www.ubuntu.com/usn/USN-726-1
BugTraq ID: 33962
http://www.securityfocus.com/bid/33962
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11054
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6074
http://www.securitytracker.com/id?1021783
http://secunia.com/advisories/34138
http://secunia.com/advisories/34202
http://secunia.com/advisories/34255
http://secunia.com/advisories/34259
http://secunia.com/advisories/34237
http://secunia.com/advisories/34251
http://secunia.com/advisories/34399
http://secunia.com/advisories/35766
http://www.vupen.com/english/advisories/2009/0581
http://www.vupen.com/english/advisories/2009/1865
XForce ISS Database: curl-location-security-bypass(49030)
http://xforce.iss.net/xforce/xfdb/49030
Common Vulnerability Exposure (CVE) ID: CVE-2009-2632
https://lists.andrew.cmu.edu/pipermail/cyrus-cvs/2009-September/001253.html
https://lists.andrew.cmu.edu/pipermail/cyrus-cvs/2009-September/001254.html
http://dovecot.org/list/dovecot-news/2009-September/000135.html
http://www.openwall.com/lists/oss-security/2009/09/14/3
Debian Security Information: DSA-1881 (Google Search)
http://www.debian.org/security/2009/dsa-1881
https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00491.html
SuSE Security Announcement: SUSE-SR:2009:016 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
http://www.ubuntu.com/usn/USN-838-1
BugTraq ID: 36296
http://www.securityfocus.com/bid/36296
BugTraq ID: 36377
http://www.securityfocus.com/bid/36377
http://www.osvdb.org/58103
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10082
http://secunia.com/advisories/36629
http://secunia.com/advisories/36632
http://secunia.com/advisories/36698
http://secunia.com/advisories/36713
http://secunia.com/advisories/36904
http://www.vupen.com/english/advisories/2009/2559
http://www.vupen.com/english/advisories/2009/2641
Common Vulnerability Exposure (CVE) ID: CVE-2009-0688
Debian Security Information: DSA-1807 (Google Search)
http://www.debian.org/security/2009/dsa-1807
http://security.gentoo.org/glsa/glsa-200907-09.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:113
http://www.redhat.com/support/errata/RHSA-2009-1116.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.448834
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259148-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-264248-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-273910-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020755.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021699.1-1
SuSE Security Announcement: SUSE-SR:2009:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://www.ubuntu.com/usn/usn-790-1
Cert/CC Advisory: TA10-103B
http://www.us-cert.gov/cas/techalerts/TA10-103B.html
CERT/CC vulnerability note: VU#238019
http://www.kb.cert.org/vuls/id/238019
BugTraq ID: 34961
http://www.securityfocus.com/bid/34961
http://osvdb.org/54514
http://osvdb.org/54515
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10687
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6136
http://www.securitytracker.com/id?1022231
http://secunia.com/advisories/35094
http://secunia.com/advisories/35097
http://secunia.com/advisories/35102
http://secunia.com/advisories/35206
http://secunia.com/advisories/35239
http://secunia.com/advisories/35321
http://secunia.com/advisories/35416
http://secunia.com/advisories/35497
http://secunia.com/advisories/35746
http://secunia.com/advisories/39428
http://www.vupen.com/english/advisories/2009/1313
http://www.vupen.com/english/advisories/2009/2012
XForce ISS Database: solaris-sasl-saslencode64-bo(50554)
http://xforce.iss.net/xforce/xfdb/50554
Common Vulnerability Exposure (CVE) ID: CVE-2010-0064
Common Vulnerability Exposure (CVE) ID: CVE-2010-0537
Common Vulnerability Exposure (CVE) ID: CVE-2010-0065
Common Vulnerability Exposure (CVE) ID: CVE-2010-0497
Common Vulnerability Exposure (CVE) ID: CVE-2010-0498
Common Vulnerability Exposure (CVE) ID: CVE-2010-0535
Common Vulnerability Exposure (CVE) ID: CVE-2010-0500
Common Vulnerability Exposure (CVE) ID: CVE-2010-0524
BugTraq ID: 39234
http://www.securityfocus.com/bid/39234
Common Vulnerability Exposure (CVE) ID: CVE-2010-0501
Common Vulnerability Exposure (CVE) ID: CVE-2006-1329
http://www.redhat.com/support/errata/RHSA-2008-0261.html
BugTraq ID: 17155
http://www.securityfocus.com/bid/17155
http://www.vupen.com/english/advisories/2006/1009
http://secunia.com/advisories/19281
XForce ISS Database: jabberd-sasl-dos(25334)
http://xforce.iss.net/xforce/xfdb/25334
Common Vulnerability Exposure (CVE) ID: CVE-2010-0502
Common Vulnerability Exposure (CVE) ID: CVE-2010-0503
Common Vulnerability Exposure (CVE) ID: CVE-2010-0504
Common Vulnerability Exposure (CVE) ID: CVE-2010-0505
Bugtraq: 20100405 ZDI-10-058: Apple Mac OS X ImageIO Framework JPEG2000 Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510539/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-058
Common Vulnerability Exposure (CVE) ID: CVE-2010-0041
http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html
http://lists.apple.com/archives/security-announce/2010//Mar/msg00003.html
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
BugTraq ID: 38671
http://www.securityfocus.com/bid/38671
BugTraq ID: 38676
http://www.securityfocus.com/bid/38676
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6885
http://www.securitytracker.com/id?1023706
http://secunia.com/advisories/39135
Common Vulnerability Exposure (CVE) ID: CVE-2010-0042
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
BugTraq ID: 38677
http://www.securityfocus.com/bid/38677
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7561
http://secunia.com/advisories/42314
Common Vulnerability Exposure (CVE) ID: CVE-2010-0043
BugTraq ID: 38673
http://www.securityfocus.com/bid/38673
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6901
Common Vulnerability Exposure (CVE) ID: CVE-2010-0506
Common Vulnerability Exposure (CVE) ID: CVE-2010-0507
Common Vulnerability Exposure (CVE) ID: CVE-2009-0689
http://securityreason.com/achievement_securityalert/63
http://securityreason.com/achievement_securityalert/72
http://securityreason.com/achievement_securityalert/73
http://securityreason.com/achievement_securityalert/71
http://securityreason.com/achievement_securityalert/77
http://securityreason.com/achievement_securityalert/78
http://securityreason.com/achievement_securityalert/69
http://securityreason.com/achievement_securityalert/76
http://securityreason.com/achievement_securityalert/75
http://securityreason.com/achievement_securityalert/81
Bugtraq: 20091120 K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507977/100/0/threaded
Bugtraq: 20091120 SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507979/100/0/threaded
Bugtraq: 20091210 Camino 1.6.10 Remote Array Overrun (Arbitrary code execution) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/508423/100/0/threaded
Bugtraq: 20091210 Flock 2.5.2 Remote Array Overrun (Arbitrary code execution) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/508417/100/0/threaded
http://secunia.com/secunia_research/2009-35/
http://www.mandriva.com/security/advisories?name=MDVSA-2009:294
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330
http://www.redhat.com/support/errata/RHSA-2009-1601.html
http://www.redhat.com/support/errata/RHSA-2010-0153.html
http://www.redhat.com/support/errata/RHSA-2010-0154.html
RedHat Security Advisories: RHSA-2014:0311
http://rhn.redhat.com/errata/RHSA-2014-0311.html
RedHat Security Advisories: RHSA-2014:0312
http://rhn.redhat.com/errata/RHSA-2014-0312.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1
SuSE Security Announcement: SUSE-SR:2009:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
SuSE Security Announcement: SUSE-SR:2010:013 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://www.ubuntu.com/usn/USN-915-1
BugTraq ID: 35510
http://www.securityfocus.com/bid/35510
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6528
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9541
http://securitytracker.com/id?1022478
http://secunia.com/advisories/37431
http://secunia.com/advisories/37682
http://secunia.com/advisories/37683
http://secunia.com/advisories/38066
http://secunia.com/advisories/39001
http://secunia.com/advisories/38977
http://www.vupen.com/english/advisories/2009/3297
http://www.vupen.com/english/advisories/2009/3299
http://www.vupen.com/english/advisories/2009/3334
http://www.vupen.com/english/advisories/2010/0094
http://www.vupen.com/english/advisories/2010/0648
http://www.vupen.com/english/advisories/2010/0650
Common Vulnerability Exposure (CVE) ID: CVE-2010-0508
Common Vulnerability Exposure (CVE) ID: CVE-2010-0525
Common Vulnerability Exposure (CVE) ID: CVE-2008-0564
Bugtraq: 20080215 rPSA-2008-0056-1 mailman (Google Search)
http://www.securityfocus.com/archive/1/archive/1/488236/100/0/threaded
http://mail.python.org/pipermail/mailman-announce/2008-February/000096.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00452.html
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:061
http://www.redhat.com/support/errata/RHSA-2011-0307.html
SuSE Security Announcement: SUSE-SR:2008:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
http://www.ubuntu.com/usn/usn-586-1
BugTraq ID: 27630
http://www.securityfocus.com/bid/27630
http://secunia.com/advisories/43549
http://www.vupen.com/english/advisories/2008/0422
http://secunia.com/advisories/28794
http://secunia.com/advisories/28916
http://secunia.com/advisories/28966
http://secunia.com/advisories/29249
http://secunia.com/advisories/29388
http://secunia.com/advisories/31687
http://www.vupen.com/english/advisories/2011/0542
Common Vulnerability Exposure (CVE) ID: CVE-2008-4456
Bugtraq: 20080930 MySQL command-line client HTML injection vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/496842/100/0/threaded
Bugtraq: 20080930 RE: MySQL command-line client HTML injection vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/496877/100/0/threaded
Bugtraq: 20081004 RE: RE: MySQL command-line client HTML injection vulnerability (Google Search)
http://seclists.org/bugtraq/2008/Oct/0026.html
Bugtraq: 20081029 Re: MySQL command-line client HTML injection vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497158/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/497885/100/0/threaded
http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability
Debian Security Information: DSA-1783 (Google Search)
http://www.debian.org/security/2009/dsa-1783
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094
http://www.redhat.com/support/errata/RHSA-2010-0110.html
http://www.redhat.com/support/errata/RHSA-2009-1289.html
http://ubuntu.com/usn/usn-897-1
BugTraq ID: 31486
http://www.securityfocus.com/bid/31486
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11456
http://secunia.com/advisories/32072
http://secunia.com/advisories/34907
http://secunia.com/advisories/38517
http://secunia.com/advisories/36566
http://securityreason.com/securityalert/4357
XForce ISS Database: mysql-commandline-xss(45590)
http://xforce.iss.net/xforce/xfdb/45590
Common Vulnerability Exposure (CVE) ID: CVE-2008-7247
http://lists.mysql.com/commits/59711
http://marc.info/?l=oss-security&m=125908040022018&w=2
https://bugzilla.redhat.com/show_bug.cgi?id=543619
http://www.mandriva.com/security/advisories?name=MDVSA-2010:044
SuSE Security Announcement: SUSE-SR:2010:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
SuSE Security Announcement: SUSE-SR:2010:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
BugTraq ID: 38043
http://www.securityfocus.com/bid/38043
http://www.vupen.com/english/advisories/2010/1107
Common Vulnerability Exposure (CVE) ID: CVE-2009-2446
Bugtraq: 20090708 MySQL <= 5.0.45 post auth format string vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504799/100/0/threaded
http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:179
BugTraq ID: 35609
http://www.securityfocus.com/bid/35609
http://www.osvdb.org/55734
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11857
http://securitytracker.com/id?1022533
http://secunia.com/advisories/35767
http://www.vupen.com/english/advisories/2009/1857
XForce ISS Database: mysql-dispatchcommand-format-string(51614)
http://xforce.iss.net/xforce/xfdb/51614
Common Vulnerability Exposure (CVE) ID: CVE-2009-4019
http://marc.info/?l=oss-security&m=125881733826437&w=2
http://marc.info/?l=oss-security&m=125883754215621&w=2
http://marc.info/?l=oss-security&m=125901161824278&w=2
Debian Security Information: DSA-1997 (Google Search)
http://www.debian.org/security/2010/dsa-1997
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html
http://www.redhat.com/support/errata/RHSA-2010-0109.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11349
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8500
http://secunia.com/advisories/37717
http://secunia.com/advisories/38573
Common Vulnerability Exposure (CVE) ID: CVE-2009-4030
http://lists.mysql.com/commits/89940
http://www.openwall.com/lists/oss-security/2009/11/19/3
http://www.openwall.com/lists/oss-security/2009/11/24/6
http://marc.info/?l=oss-security&m=125908080222685&w=2
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11116
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8156
Common Vulnerability Exposure (CVE) ID: CVE-2010-0509
Common Vulnerability Exposure (CVE) ID: CVE-2010-0510
Common Vulnerability Exposure (CVE) ID: CVE-2008-5302
Bugtraq: 20090120 rPSA-2009-0011-1 perl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500210/100/0/threaded
http://www.openwall.com/lists/oss-security/2008/11/28/2
http://www.gossamer-threads.com/lists/perl/porters/233695#233695
Debian Security Information: DSA-1678 (Google Search)
http://www.debian.org/security/2008/dsa-1678
http://www.mandriva.com/security/advisories?name=MDVSA-2010:116
http://www.redhat.com/support/errata/RHSA-2010-0458.html
SuSE Security Announcement: SUSE-SR:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://www.ubuntu.com/usn/usn-700-1
http://www.ubuntu.com/usn/usn-700-2
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11076
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6890
http://secunia.com/advisories/33314
http://secunia.com/advisories/32980
http://secunia.com/advisories/40052
XForce ISS Database: perl-filepath-symlink(47043)
http://xforce.iss.net/xforce/xfdb/47043
Common Vulnerability Exposure (CVE) ID: CVE-2008-5303
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9699
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6680
XForce ISS Database: filepath-rmtree-symlink(47044)
http://xforce.iss.net/xforce/xfdb/47044
Common Vulnerability Exposure (CVE) ID: CVE-2009-3557
http://www.openwall.com/lists/oss-security/2009/11/20/2
http://www.openwall.com/lists/oss-security/2009/11/20/3
http://www.openwall.com/lists/oss-security/2009/11/20/5
http://news.php.net/php.announce/79
HPdes Security Advisory: HPSBUX02543
http://marc.info/?l=bugtraq&m=127680701405735&w=2
HPdes Security Advisory: SSRT100152
http://www.mandriva.com/security/advisories?name=MDVSA-2009:302
http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
http://www.mandriva.com/security/advisories?name=MDVSA-2009:303
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7396
http://secunia.com/advisories/37412
http://secunia.com/advisories/37821
http://secunia.com/advisories/40262
http://securityreason.com/securityalert/6601
http://www.vupen.com/english/advisories/2009/3593
Common Vulnerability Exposure (CVE) ID: CVE-2009-3558
http://securityreason.com/securityalert/6600
Common Vulnerability Exposure (CVE) ID: CVE-2009-3559
http://bugs.php.net/bug.php?id=50063
Common Vulnerability Exposure (CVE) ID: CVE-2009-4017
Bugtraq: 20091120 PHP "multipart/form-data" denial of service (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507982/100/0/threaded
http://seclists.org/fulldisclosure/2009/Nov/228
http://www.openwall.com/lists/oss-security/2009/11/20/7
http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/
Debian Security Information: DSA-1940 (Google Search)
http://www.debian.org/security/2009/dsa-1940
HPdes Security Advisory: HPSBMA02568
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
HPdes Security Advisory: SSRT100219
http://www.mandriva.com/security/advisories?name=MDVSA-2009:305
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10483
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6667
http://secunia.com/advisories/37482
http://secunia.com/advisories/41480
http://secunia.com/advisories/41490
XForce ISS Database: php-multipart-formdata-dos(54455)
http://xforce.iss.net/xforce/xfdb/54455
Common Vulnerability Exposure (CVE) ID: CVE-2009-4142
Debian Security Information: DSA-2001 (Google Search)
http://www.debian.org/security/2010/dsa-2001
BugTraq ID: 37389
http://www.securityfocus.com/bid/37389
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10005
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7085
http://securitytracker.com/id?1023372
http://secunia.com/advisories/38648
Common Vulnerability Exposure (CVE) ID: CVE-2009-4143
http://www.mandriva.com/security/advisories?name=MDVSA-2010:045
BugTraq ID: 37390
http://www.securityfocus.com/bid/37390
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7439
Common Vulnerability Exposure (CVE) ID: CVE-2010-0511
Common Vulnerability Exposure (CVE) ID: CVE-2010-0512
BugTraq ID: 39153
http://www.securityfocus.com/bid/39153
Common Vulnerability Exposure (CVE) ID: CVE-2010-0513
BugTraq ID: 39151
http://www.securityfocus.com/bid/39151
http://osvdb.org/63409
Common Vulnerability Exposure (CVE) ID: CVE-2010-0514
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7043
Common Vulnerability Exposure (CVE) ID: CVE-2010-0515
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6783
Common Vulnerability Exposure (CVE) ID: CVE-2010-0516
Bugtraq: 20100402 ZDI-10-040: Apple QuickTime RLE Bit Depth Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510513/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-040
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7062
Common Vulnerability Exposure (CVE) ID: CVE-2010-0517
Bugtraq: 20100402 ZDI-10-037: Apple QuickTime MJPEG Sample Dimensions Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510511/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-037
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6673
Common Vulnerability Exposure (CVE) ID: CVE-2010-0518
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7077
Common Vulnerability Exposure (CVE) ID: CVE-2010-0519
Bugtraq: 20100402 ZDI-10-043: Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510519/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-043
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7498
Common Vulnerability Exposure (CVE) ID: CVE-2010-0520
Bugtraq: 20100402 ZDI-10-044: Apple QuickTime FLI LinePacket Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510520/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-044
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6801
Common Vulnerability Exposure (CVE) ID: CVE-2010-0526
Bugtraq: 20100402 ZDI-10-035: Apple QuickTime genl Atom Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510508/100/0/threaded
Bugtraq: 20100402 ZDI-10-045: Apple QuickTime MPEG-1 genl Atom Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/510530/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-035
http://www.zerodayinitiative.com/advisories/ZDI-10-045
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6927
Common Vulnerability Exposure (CVE) ID: CVE-2009-2422
http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s
BugTraq ID: 35579
http://www.securityfocus.com/bid/35579
http://secunia.com/advisories/35702
http://www.vupen.com/english/advisories/2009/1802
XForce ISS Database: rubyonrails-validatedigest-sec-bypass(51528)
http://xforce.iss.net/xforce/xfdb/51528
Common Vulnerability Exposure (CVE) ID: CVE-2009-3009
http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source
Debian Security Information: DSA-1887 (Google Search)
http://www.debian.org/security/2009/dsa-1887
SuSE Security Announcement: SUSE-SR:2009:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
BugTraq ID: 36278
http://www.securityfocus.com/bid/36278
http://www.osvdb.org/57666
http://securitytracker.com/id?1022824
http://secunia.com/advisories/36600
http://secunia.com/advisories/36717
http://www.vupen.com/english/advisories/2009/2544
XForce ISS Database: rubyonrails-unicode-xss(53036)
http://xforce.iss.net/xforce/xfdb/53036
Common Vulnerability Exposure (CVE) ID: CVE-2009-4214
http://www.openwall.com/lists/oss-security/2009/11/27/2
http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1
http://www.openwall.com/lists/oss-security/2009/12/08/3
Debian Security Information: DSA-2260 (Google Search)
http://www.debian.org/security/2011/dsa-2260
Debian Security Information: DSA-2301 (Google Search)
http://www.debian.org/security/2011/dsa-2301
SuSE Security Announcement: SUSE-SR:2010:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
BugTraq ID: 37142
http://www.securityfocus.com/bid/37142
http://www.securitytracker.com/id?1023245
http://secunia.com/advisories/37446
http://secunia.com/advisories/38915
http://www.vupen.com/english/advisories/2009/3352
Common Vulnerability Exposure (CVE) ID: CVE-2009-1904
http://mail-index.netbsd.org/pkgsrc-changes/2009/06/10/msg024708.html
http://groups.google.com/group/rubyonrails-security/msg/fad60751e2b9b4f6?dmode=source
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00731.html
http://security.gentoo.org/glsa/glsa-200906-02.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:160
http://www.redhat.com/support/errata/RHSA-2009-1140.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.430805
http://www.ubuntu.com/usn/USN-805-1
BugTraq ID: 35278
http://www.securityfocus.com/bid/35278
http://osvdb.org/55031
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9780
http://www.securitytracker.com/id?1022371
http://secunia.com/advisories/35399
http://secunia.com/advisories/35527
http://secunia.com/advisories/35699
http://secunia.com/advisories/35593
http://secunia.com/advisories/35937
http://secunia.com/advisories/37705
http://www.vupen.com/english/advisories/2009/1563
XForce ISS Database: ruby-bigdecimal-dos(51032)
http://xforce.iss.net/xforce/xfdb/51032
Common Vulnerability Exposure (CVE) ID: CVE-2010-0521
Common Vulnerability Exposure (CVE) ID: CVE-2010-0522
Common Vulnerability Exposure (CVE) ID: CVE-2009-2906
Bugtraq: 20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507856/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1
http://www.ubuntu.com/usn/USN-839-1
BugTraq ID: 36573
http://www.securityfocus.com/bid/36573
http://osvdb.org/58519
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7090
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9944
http://www.securitytracker.com/id?1022976
http://secunia.com/advisories/36893
http://secunia.com/advisories/36918
http://secunia.com/advisories/36937
http://secunia.com/advisories/36953
http://secunia.com/advisories/37428
http://www.vupen.com/english/advisories/2009/2810
XForce ISS Database: samba-smb-dos(53575)
http://xforce.iss.net/xforce/xfdb/53575
Common Vulnerability Exposure (CVE) ID: CVE-2009-0580
Bugtraq: 20090603 [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504045/100/0/threaded
Bugtraq: 20090604 Re: [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504108/100/0/threaded
Bugtraq: 20090605 [SECURITY] CVE-2009-0580 UPDATED Apache Tomcat User enumeration vulnerability with FORM authentication (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504125/100/0/threaded
Debian Security Information: DSA-2207 (Google Search)
http://www.debian.org/security/2011/dsa-2207
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html
HPdes Security Advisory: HPSBUX02579
http://marc.info/?l=bugtraq&m=129070310906557&w=2
HPdes Security Advisory: SSRT100203
HPdes Security Advisory: HPSBUX02860
http://marc.info/?l=bugtraq&m=136485229118404&w=2
HPdes Security Advisory: SSRT101146
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
http://www.mandriva.com/security/advisories?name=MDVSA-2009:138
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1
SuSE Security Announcement: SUSE-SR:2009:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
BugTraq ID: 35196
http://www.securityfocus.com/bid/35196
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6628
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9101
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:18915
http://securitytracker.com/id?1022332
http://secunia.com/advisories/35326
http://secunia.com/advisories/35344
http://secunia.com/advisories/35685
http://secunia.com/advisories/35788
http://secunia.com/advisories/37460
http://secunia.com/advisories/42368
http://www.vupen.com/english/advisories/2009/1496
http://www.vupen.com/english/advisories/2009/1856
http://www.vupen.com/english/advisories/2010/3056
XForce ISS Database: tomcat-jsecuritycheck-info-disclosure(50930)
http://xforce.iss.net/xforce/xfdb/50930
Common Vulnerability Exposure (CVE) ID: CVE-2009-0033
Bugtraq: 20090603 [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504044/100/0/threaded
http://jvn.jp/en/jp/JVN87272440/index.html
BugTraq ID: 35193
http://www.securityfocus.com/bid/35193
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10231
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5739
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19110
http://securitytracker.com/id?1022331
XForce ISS Database: tomcat-ajp-dos(50928)
http://xforce.iss.net/xforce/xfdb/50928
Common Vulnerability Exposure (CVE) ID: CVE-2009-0783
Bugtraq: 20090604 [SECURITY] CVE-2009-0783 Apache Tomcat Information disclosure (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504090/100/0/threaded
BugTraq ID: 35416
http://www.securityfocus.com/bid/35416
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10716
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6450
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:18913
http://www.securitytracker.com/id?1022336
XForce ISS Database: tomcat-xml-information-disclosure(51195)
http://xforce.iss.net/xforce/xfdb/51195
Common Vulnerability Exposure (CVE) ID: CVE-2008-5515
Bugtraq: 20090608 [SECURITY] CVE-2008-5515 RequestDispatcher directory traversal vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504170/100/0/threaded
Bugtraq: 20090610 [SECURITY] UPDATED CVE-2008-5515 RequestDispatcher directory traversal vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504202/100/0/threaded
SuSE Security Announcement: SUSE-SR:2010:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
http://jvn.jp/en/jp/JVN63832775/index.html
BugTraq ID: 35263
http://www.securityfocus.com/bid/35263
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10422
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6445
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19452
http://secunia.com/advisories/35393
http://secunia.com/advisories/39317
http://secunia.com/advisories/44183
http://www.vupen.com/english/advisories/2009/1520
http://www.vupen.com/english/advisories/2009/1535
Common Vulnerability Exposure (CVE) ID: CVE-2009-0781
Bugtraq: 20090306 [SECURITY] CVE-2009-0781 XSS in Apache Tomcat examples web application (Google Search)
http://www.securityfocus.com/archive/1/archive/1/501538/100/0/threaded
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11041
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6564
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19345
XForce ISS Database: tomcat-cal2-xss(49213)
http://xforce.iss.net/xforce/xfdb/49213
Common Vulnerability Exposure (CVE) ID: CVE-2009-2901
Bugtraq: 20100124 [SECURITY] CVE-2009-2901 Apache Tomcat insecure partial deploy after failed undeploy (Google Search)
http://www.securityfocus.com/archive/1/archive/1/509151/100/0/threaded
Bugtraq: 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX (Google Search)
http://www.securityfocus.com/archive/1/archive/1/516397/100/0/threaded
HPdes Security Advisory: HPSBST02955
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2010:177
SuSE Security Announcement: openSUSE-SU-2012:1700 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html
SuSE Security Announcement: openSUSE-SU-2012:1701 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html
SuSE Security Announcement: openSUSE-SU-2013:0147 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html
http://ubuntu.com/usn/usn-899-1
BugTraq ID: 37942
http://www.securityfocus.com/bid/37942
http://securitytracker.com/id?1023503
http://secunia.com/advisories/38316
http://secunia.com/advisories/38346
http://secunia.com/advisories/38541
http://secunia.com/advisories/43310
http://secunia.com/advisories/57126
http://www.vupen.com/english/advisories/2010/0213
XForce ISS Database: tomcat-autodeploy-security-bypass(55856)
http://xforce.iss.net/xforce/xfdb/55856
Common Vulnerability Exposure (CVE) ID: CVE-2009-2902
Bugtraq: 20100124 [SECURITY] CVE-2009-2902 Apache Tomcat unexpected file deletion in work directory (Google Search)
http://www.securityfocus.com/archive/1/archive/1/509150/100/0/threaded
HPdes Security Advisory: HPSBUX02541
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113
HPdes Security Advisory: SSRT100145
http://www.redhat.com/support/errata/RHSA-2010-0119.html
http://www.redhat.com/support/errata/RHSA-2010-0580.html
http://www.redhat.com/support/errata/RHSA-2010-0582.html
BugTraq ID: 37945
http://www.securityfocus.com/bid/37945
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7092
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19431
http://securitytracker.com/id?1023504
http://secunia.com/advisories/38687
http://secunia.com/advisories/40330
http://secunia.com/advisories/40813
http://www.vupen.com/english/advisories/2010/1559
http://www.vupen.com/english/advisories/2010/1986
XForce ISS Database: apache-tomcat-war-directory-traversal(55857)
http://xforce.iss.net/xforce/xfdb/55857
Common Vulnerability Exposure (CVE) ID: CVE-2009-2693
Bugtraq: 20100124 [SECURITY] CVE-2009-2693 Apache Tomcat unexpected file deletion and/or alteration (Google Search)
http://www.securityfocus.com/archive/1/archive/1/509148/100/0/threaded
BugTraq ID: 37944
http://www.securityfocus.com/bid/37944
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7017
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19355
http://securitytracker.com/id?1023505
XForce ISS Database: tomcat-war-directory-traversal(55855)
http://xforce.iss.net/xforce/xfdb/55855
Common Vulnerability Exposure (CVE) ID: CVE-2008-0888
Bugtraq: 20080321 rPSA-2008-0116-1 unzip (Google Search)
http://www.securityfocus.com/archive/1/archive/1/489967/100/0/threaded
Bugtraq: 20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues (Google Search)
http://www.securityfocus.com/archive/1/archive/1/493080/100/0/threaded
Debian Security Information: DSA-1522 (Google Search)
http://www.debian.org/security/2008/dsa-1522
http://security.gentoo.org/glsa/glsa-200804-06.xml
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:068
http://www.redhat.com/support/errata/RHSA-2008-0196.html
SuSE Security Announcement: SUSE-SR:2008:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
http://www.ubuntu.com/usn/usn-589-1
BugTraq ID: 28288
http://www.securityfocus.com/bid/28288
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9733
http://www.vupen.com/english/advisories/2008/0913/references
http://www.vupen.com/english/advisories/2008/1744
http://www.securitytracker.com/id?1019634
http://secunia.com/advisories/29427
http://secunia.com/advisories/29440
http://secunia.com/advisories/29415
http://secunia.com/advisories/29432
http://secunia.com/advisories/29406
http://secunia.com/advisories/29495
http://secunia.com/advisories/29392
http://secunia.com/advisories/29681
http://secunia.com/advisories/30535
http://secunia.com/advisories/31204
XForce ISS Database: unzip-inflatedynamic-code-execution(41246)
http://xforce.iss.net/xforce/xfdb/41246
Common Vulnerability Exposure (CVE) ID: CVE-2008-2712
Bugtraq: 20080613 Collection of Vulnerabilities in Fully Patched Vim 7.1 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/493352/100/0/threaded
Bugtraq: 20080701 Re: Collection of Vulnerabilities in Fully Patched Vim 7.1 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/493353/100/0/threaded
Bugtraq: 20080811 rPSA-2008-0247-1 gvim vim vim-minimal (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495319/100/0/threaded
http://marc.info/?l=bugtraq&m=121494431426308&w=2
Bugtraq: 20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502322/100/0/threaded
http://www.rdancer.org/vulnerablevim.html
http://www.openwall.com/lists/oss-security/2008/06/16/2
http://www.openwall.com/lists/oss-security/2008/10/15/1
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.redhat.com/support/errata/RHSA-2008-0617.html
http://www.redhat.com/support/errata/RHSA-2008-0580.html
http://www.redhat.com/support/errata/RHSA-2008-0618.html
SuSE Security Announcement: SUSE-SR:2009:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://www.ubuntu.com/usn/USN-712-1
BugTraq ID: 29715
http://www.securityfocus.com/bid/29715
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11109
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6238
http://secunia.com/advisories/34418
http://secunia.com/advisories/32858
http://secunia.com/advisories/32864
http://www.vupen.com/english/advisories/2008/1851/references
http://www.vupen.com/english/advisories/2008/2780
http://www.vupen.com/english/advisories/2009/0033
http://www.securitytracker.com/id?1020293
http://secunia.com/advisories/30731
http://secunia.com/advisories/32222
http://secunia.com/advisories/33410
http://securityreason.com/securityalert/3951
http://www.vupen.com/english/advisories/2009/0904
XForce ISS Database: vim-scripts-command-execution(43083)
http://xforce.iss.net/xforce/xfdb/43083
Common Vulnerability Exposure (CVE) ID: CVE-2008-4101
Bugtraq: 20080822 Vim: Arbitrary Code Execution in Commands: K, Control-], g] (Google Search)
http://www.securityfocus.com/archive/1/495662
Bugtraq: 20080825 RE: Arbitrary Code Execution in Commands: K, Control-], g] (Google Search)
http://www.securityfocus.com/archive/1/495703
http://www.openwall.com/lists/oss-security/2008/09/11/4
http://www.openwall.com/lists/oss-security/2008/09/11/3
http://www.openwall.com/lists/oss-security/2008/09/16/5
http://www.openwall.com/lists/oss-security/2008/09/16/6
http://ftp.vim.org/pub/vim/patches/7.2/7.2.010
http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33
http://groups.google.com/group/vim_dev/attach/9290f26f9bc11b33/K-arbitrary-command-execution.patch.v3?part=2
http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2
http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/6ad2d5b50a96668e
http://www.rdancer.org/vulnerablevim-K.html
BugTraq ID: 30795
http://www.securityfocus.com/bid/30795
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10894
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5812
http://secunia.com/advisories/31592
XForce ISS Database: vim-normal-command-execution(44626)
http://xforce.iss.net/xforce/xfdb/44626
Common Vulnerability Exposure (CVE) ID: CVE-2009-0316
http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html
http://www.openwall.com/lists/oss-security/2009/01/26/2
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484305
http://www.mandriva.com/security/advisories?name=MDVSA-2009:047
BugTraq ID: 33447
http://www.securityfocus.com/bid/33447
XForce ISS Database: vim-pysyssetargv-privilege-escalation(48275)
http://xforce.iss.net/xforce/xfdb/48275
Common Vulnerability Exposure (CVE) ID: CVE-2010-0523
Common Vulnerability Exposure (CVE) ID: CVE-2010-0534
Common Vulnerability Exposure (CVE) ID: CVE-2009-2042
Bugtraq: 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html
http://lists.vmware.com/pipermail/security-announce/2010/000090.html
Debian Security Information: DSA-2032 (Google Search)
http://www.debian.org/security/2010/dsa-2032
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00218.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00630.html
http://security.gentoo.org/glsa/glsa-200906-01.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:063
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.551809
http://ubuntu.com/usn/usn-913-1
BugTraq ID: 35233
http://www.securityfocus.com/bid/35233
http://secunia.com/advisories/35346
http://secunia.com/advisories/35470
http://secunia.com/advisories/35524
http://secunia.com/advisories/35594
http://secunia.com/advisories/39206
http://secunia.com/advisories/39215
http://secunia.com/advisories/39251
http://www.vupen.com/english/advisories/2009/1510
http://www.vupen.com/english/advisories/2010/0637
http://www.vupen.com/english/advisories/2010/0847
http://www.vupen.com/english/advisories/2010/0682
XForce ISS Database: libpng-interlaced-image-info-disclosure(50966)
http://xforce.iss.net/xforce/xfdb/50966
Common Vulnerability Exposure (CVE) ID: CVE-2003-0063
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html
Bugtraq: 20030224 Terminal Emulator Security Issues (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2
Debian Security Information: DSA-380 (Google Search)
http://www.debian.org/security/2003/dsa-380
http://www.redhat.com/support/errata/RHSA-2003-064.html
http://www.redhat.com/support/errata/RHSA-2003-065.html
http://www.redhat.com/support/errata/RHSA-2003-066.html
http://www.redhat.com/support/errata/RHSA-2003-067.html
BugTraq ID: 6940
http://www.securityfocus.com/bid/6940
http://www.iss.net/security_center/static/11414.php
Common Vulnerability Exposure (CVE) ID: CVE-2010-0055
CopyrightCopyright (C) 2010 LSS

This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.