View | Details | Raw Unified | Return to bug 201231
Collapse All | Expand All

(-)vuln.xml (+26 lines)
Lines 57-62 Link Here
57
57
58
-->
58
-->
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
  <vuln vid="543b5939-2067-11e5-a4a5-002590263bf5">
61
    <topic>turnserver -- SQL injection vulnerability</topic>
62
    <affects>
63
      <package>
64
	<name>turnserver</name>
65
	<range><lt>4.4.5.3</lt></range>
66
      </package>
67
    </affects>
68
    <description>
69
      <body xmlns="http://www.w3.org/1999/xhtml">
70
	<p>Oleg Moskalenko reports:</p>
71
	<blockquote cite="http://turnserver.open-sys.org/downloads/v4.4.5.3/ChangeLog">
72
	  <p>SQL injection security hole fixed.</p>
73
	</blockquote>
74
      </body>
75
    </description>
76
    <references>
77
      <url>http://turnserver.open-sys.org/downloads/v4.4.5.3/ChangeLog</url>
78
      <mlist>https://groups.google.com/d/msg/turn-server-project-rfc5766-turn-server/Dj3MmgyZX1o/ZaFo3zvxIw0J</mlist>
79
    </references>
80
    <dates>
81
      <discovery>2015-06-20</discovery>
82
      <entry>2015-07-02</entry>
83
    </dates>
84
  </vuln>
85
60
  <vuln vid="9c7177ff-1fe1-11e5-9a01-bcaec565249c">
86
  <vuln vid="9c7177ff-1fe1-11e5-9a01-bcaec565249c">
61
    <topic>libxml2 -- Enforce the reader to run in constant memory</topic>
87
    <topic>libxml2 -- Enforce the reader to run in constant memory</topic>
62
    <affects>
88
    <affects>

Return to bug 201231