| Reference | Source | Link | Tags |
|---|
| [security-announce] SUSE-SU-2015:0868-1: important: Security update for |
SUSE |
lists.opensuse.org |
Mailing List, Third Party Advisory |
| '[security bulletin] HPSBUX03337 SSRT102066 rev.1 - HP-UX Apache Web Server Suite running Apache Web ' - MARC |
HP |
marc.info |
Mailing List, Third Party Advisory |
| USN-2987-1: GD library vulnerabilities | Ubuntu |
UBUNTU |
www.ubuntu.com |
Third Party Advisory |
| Apple OS X Multiple Flaws Let Remote and Local Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Deny Service and Let Local Users Gain Elevated Privileges - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| APPLE-SA-2015-09-30-3 OS X El Capitan 10.11 |
APPLE |
lists.apple.com |
Mailing List, Third Party Advisory |
| openSUSE-SU-2015:0644-1: moderate: Security update for php5 |
SUSE |
lists.opensuse.org |
Mailing List, Third Party Advisory |
| Mageia Advisory: MGASA-2015-0040 - Updated php packages fix security vulnerabilities |
CONFIRM |
advisories.mageia.org |
Third Party Advisory |
| Bug 1188639 – CVE-2014-9709 gd: buffer read overflow in gd_gif_in.c |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Third Party Advisory |
| libgd / gd-libgd
/ commit / 47eb44b2e90c
— Bitbucket |
CONFIRM |
bitbucket.org |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
rhn.redhat.com |
Third Party Advisory |
| PHP LibGD Extension 'gd_gif_in.c' Stack Buffer Overflow Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| Red Hat Customer Portal |
REDHAT |
rhn.redhat.com |
Third Party Advisory |
| GD: Multiple vulnerabilities (GLSA 201607-04) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| Oracle Linux Bulletin - January 2016 |
CONFIRM |
www.oracle.com |
Third Party Advisory |
| PHP: Multiple vulnerabilities (GLSA 201606-10) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| PHP :: You must be logged in |
CONFIRM |
bugs.php.net |
Vendor Advisory |
| Support / Security / Advisories / / MDVSA-2015:153 | Mandriva |
MANDRIVA |
www.mandriva.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
rhn.redhat.com |
Third Party Advisory |
| About the security content of OS X El Capitan v10.11 - Apple Support |
CONFIRM |
support.apple.com |
Third Party Advisory |
| Oracle Solaris Third Party Bulletin - April 2015 |
CONFIRM |
www.oracle.com |
Third Party Advisory |
| PHP: PHP 5 ChangeLog |
CONFIRM |
php.net |
Exploit, Vendor Advisory |
| Debian -- Security Information -- DSA-3215-1 libgd2 |
DEBIAN |
www.debian.org |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
rhn.redhat.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |