| Reference | Source | Link | Tags |
|---|
| RETIRED: yaSSL SSL Certificate Handling Remote Buffer Overflow Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| MySQL :: MySQL 5.1 Reference Manual :: C.1.1 Changes in MySQL 5.1.43 (Not yet released) |
CONFIRM |
dev.mysql.com |
Broken Link |
| Bug 555313 – CVE-2009-4484 mysql: yaSSL certificate parsing buffer overflow (vulndisco) |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Third Party Advisory |
| Not Found |
CONFIRM |
bazaar.launchpad.net |
Broken Link |
| Ubuntu update for mysql-dfsg-5 and mysql-dfsg-5.1 - Advisories - Community |
SECUNIA |
secunia.com |
Third Party Advisory |
| yaSSL Certificate Processing Buffer Overflow Vulnerability - Secunia Advisories - Vulnerability Information - Secunia.com |
SECUNIA |
secunia.com |
Third Party Advisory |
| IBM X-Force Exchange |
XF |
exchange.xforce.ibmcloud.com |
Third Party Advisory, VDB Entry |
| MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code - SecurityTracker |
SECTRACK |
securitytracker.com |
Third Party Advisory, VDB Entry |
| yaSSL | News Security Library |
CONFIRM |
www.yassl.com |
Broken Link |
| MySQL :: MySQL 5.0 Reference Manual :: C.1.1 Changes in MySQL 5.0.90 (15 January 2010) |
CONFIRM |
dev.mysql.com |
Broken Link |
| NEOHAPSIS - Peace of Mind Through Integrity and Insight |
MLIST |
archives.neohapsis.com |
Broken Link |
| MySQL yaSSL Certificate Processing Buffer Overflow Vulnerability - Secunia Advisories - Vulnerability Information - Secunia.com |
SECUNIA |
secunia.com |
Third Party Advisory |
| USN-897-1: MySQL vulnerabilities | Ubuntu |
UBUNTU |
ubuntu.com |
Third Party Advisory |
| Debian -- Security Information -- DSA-1997-1 mysql-dfsg-5.0 |
DEBIAN |
www.debian.org |
Third Party Advisory |
| MySQL Bugs: Access denied |
CONFIRM |
bugs.mysql.com |
Exploit, Issue Tracking, Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH |
VUPEN |
www.vupen.com |
Third Party Advisory |
| yaSSL Certificate Processing Buffer Overflow Vulnerability - Secunia.com |
SECUNIA |
secunia.com |
Third Party Advisory |
| MySQL remote exploit demo |
MISC |
intevydis.com |
Broken Link |
| MySQL Lists: commits: bzr commit into mysql-5.0-bugteam branch (ramil:2838) Bug#50227 |
MLIST |
lists.mysql.com |
Patch, Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH |
VUPEN |
www.vupen.com |
Third Party Advisory |
| VulnDisco Pack Professional 8.11 « Intevydis blog |
MISC |
www.intevydis.com |
Broken Link |
| 404 Not Found |
MISC |
intevydis.com |
Broken Link |
| Metasploit Penetration Testing Framework - Module Browser |
MISC |
www.metasploit.com |
Third Party Advisory |
| [dailydave] 20100126 New db bugs |
MLIST |
lists.immunitysec.com |
Broken Link |
| Debian update for mysql-dfsg-5.0 - Secunia.com |
SECUNIA |
secunia.com |
Third Party Advisory |
| MySQL with yaSSL SSL Certificate Handling Remote Stack Buffer Overflow Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| 61956 |
OSVDB |
www.osvdb.org |
Broken Link |
| USN-1397-1: MySQL vulnerabilities | Ubuntu |
UBUNTU |
www.ubuntu.com |
Third Party Advisory |
| yaSSL | Release notes |
CONFIRM |
www.yassl.com |
Broken Link |
| yaSSL Buffer Overflow in Certificate Processing Lets Remote Users Execute Arbitrary Code - SecurityTracker |
SECTRACK |
securitytracker.com |
Third Party Advisory, VDB Entry |
| www.intevydis.com/blog |
MISC |
www.intevydis.com |
Broken Link |
| 404 Not Found |
MISC |
intevydis.com |
Broken Link |
| Possible new MySQL 0day |
MISC |
isc.sans.org |
Third Party Advisory |
| Intevydis blog: MySQL yassl stack overflow |
MISC |
intevydis.blogspot.com |
Broken Link |
| CVS Info for project yassl |
CONFIRM |
yassl.cvs.sourceforge.net |
Third Party Advisory |
| MySQL 5.0.51a Unspecified Remote Code Execution Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |