http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052461.html
http://securityreason.com/securityalert/2279
http://www.matousec.com/info/advisories/Comodo-DLL-injection-via-weak-hash-function-exploitation.php
http://www.securityfocus.com/archive/1/460209/100/100/threaded
https://exchange.xforce.ibmcloud.com/vulnerabilities/32530
|