<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://jal.tw/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>脆笛酥的家 - cve</title>
        <description></description>
        <link>https://jal.tw/</link>
        <lastBuildDate>Wed, 29 Apr 2026 17:34:13 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://jal.tw/_media/wiki:dokuwiki.svg</url>
            <title>脆笛酥的家</title>
            <link>https://jal.tw/</link>
        </image>
        <item>
            <title>cve-2014-0160</title>
            <link>https://jal.tw/cve:cve-2014-0160?rev=1397733485&amp;do=diff</link>
            <description>CVE-2014-0160 OpenSSL Heartbleed Vulnerability

About Networking Vendors
 Vendor       Affected        Announcement           Announce Date  A10   None External link at A10   2014-04-09  Arbor Networks  None  Internal Field Notification Only (login required)  2014-04-15  Aruba Networks  Few Version  External Document at Aruba Alert  2014-04-08  BlueCoat</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 17 Apr 2014 11:18:05 +0000</pubDate>
        </item>
        <item>
            <title>cve-2014-0224</title>
            <link>https://jal.tw/cve:cve-2014-0224?rev=1403780865&amp;do=diff</link>
            <description>CVE-2014-0224 OpenSSL MITM ChangeCipherSpec (CCS) Injection flaw

In additon, OpenSSL also regarding following seven vulnerabilities. Some of vendor had max tham to a “Security Advisories”
 CVE Number  CVSS base score  Description  CVE-2014-0224  6.8  SSL/TLS MITM vulnerability</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 26 Jun 2014 11:07:45 +0000</pubDate>
        </item>
        <item>
            <title>cve-2014-3566</title>
            <link>https://jal.tw/cve:cve-2014-3566?rev=1414634805&amp;do=diff</link>
            <description>CVE-2014-3566 POODLE - An SSL 3.0 Vulnerability

Found by Googlers, Padding Oracle On Downgraded Legacy Encryption (POODLE) Attack on SSLv3.
Related CVE

	*  CVE-2014-3513, SRTP Memory Leak
	*  CVE-2014-3567, Session Ticket Memory Leak
	*  CVE-2014-3568, Build option no-ssl3 is incomplete</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 30 Oct 2014 02:06:45 +0000</pubDate>
        </item>
        <item>
            <title>cve-2014-6271</title>
            <link>https://jal.tw/cve:cve-2014-6271?rev=1413452633&amp;do=diff</link>
            <description>CVE-2014-6271 GNU bash Shell Multiple Vulnerabilities

Related CVE

	*  CVE-2014-6271
	*  CVE-2014-7169
	*  CVE-2014-7186
	*  CVE-2014-7187

Further Reading

	*  &lt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271&gt;
	*  提姆大師 - BASH ShellShock 漏洞分析(非常詳細的一篇！)
	*  DevCore - Shellshock (Bash CVE-2014-6271) 威脅仍在擴大中，但無需過度恐慌
	*  TDOHacker - 比HeartBleed Bug 更嚴重的漏洞
	*  Tsung-Hao Lee - CVE-2014-6271 - Bash 遠端執行的安全漏洞
	*  &lt;http://seclists.org/oss-sec/2014/q3/650&gt;

About Networking Vendors

	*  查表前有…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 16 Oct 2014 09:43:53 +0000</pubDate>
        </item>
        <item>
            <title>cve-2015-0235</title>
            <link>https://jal.tw/cve:cve-2015-0235?rev=1422881683&amp;do=diff</link>
            <description>CVE-2015-0235 GHOST: glibc gethostbyname buffer overflow

CVE-2015-0235, is a Linux based vulnerability that was recently discovered. Imperva is treating this vulnerability with utmost importance.

Further Reading

	*  &lt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235&gt;
	*  CVE-2015-0235：讓人爆炸的「glibc gethostbyname buffer overflow」 by Gea-Suan Lin
	*  Linux Glibc GHOST 漏洞偵測、修補 CVE-2015-0235 by Tsung
	*  Qualys: The GHOST Vulnerability
	*  How To Patch and Protect Linux Server Against th…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 02 Feb 2015 12:54:43 +0000</pubDate>
        </item>
    </channel>
</rss>
