Lines Matching full:credit
602 Credit:
632 Credit:
671 Credit:
695 Credit:
718 Credit:
754 Credit:
908 Credit:
932 Credit:
954 Credit:
981 Credit:
1007 Credit:
1031 Credit:
1057 Credit:
1082 Credit:
1130 Credit:
1149 Credit:
1176 Credit:
1208 Credit:
1235 Credit:
1263 Credit:
1289 Credit:
1368 Credit: This weakness was discovered by Matthew Van Gundy of Cisco.
1393 Credit: This weakness was discovered by Matthew Van Gundy of Cisco.
1418 Credit: This weakness was discovered by Matthew Van Gundy of Cisco.
1447 Credit: This weakness was discovered by Matthew Van Gundy of Cisco.
1465 Credit: This weakness was discovered by Robert Pajak of ABB.
1484 Credit: This weakness was discovered by Sharon Goldberg and Aanchal
1505 Credit: This weakness was discovered by Magnus Stubman.
1537 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
1566 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
1590 Credit: This weakness was discovered independently by Brian Utterback of
1669 Credit: This weakness was discovered by Nicolas Edet of Cisco.
1687 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
1705 Credit: This weakness was discovered by Jakub Prokes of Red Hat.
1724 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
1740 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
1792 Credit: This weakness was discovered independently by Loganaden
1815 Credit: This problem was discovered by Michael Tatarinov.
1844 Credit: This weakness was discovered by Stephen Gray and
1872 Credit: This weakness was discovered by Yihan Lian of the Cloud
1890 Credit: This weakness was discovered by Yihan Lian of the Cloud
1913 Credit: This weakness was discovered by Yihan Lian of the Cloud
1934 Credit: This weakness was discovered by Yihan Lian of the Cloud
1964 Credit: This weakness was discovered by Matt Street and others of
2005 Credit: This weakness was discovered by Miroslav Lichvar of RedHat
2026 Credit: This weakness was discovered by Matthew Van Gundy of Cisco ASIG.
2064 * Fix some Credit: attributions in the NEWS file. Harlan Stenn.
2129 Credit: This weakness was discovered by Jonathan Gardner of Cisco ASIG.
2150 Credit: This weakness was discovered by Matthey Van Gundy and
2173 Credit: This weakness was discovered by Stephen Gray at Cisco ASIG.
2194 Credit: This weakness was discovered by Aanchal Malhotra of Boston
2217 Credit: This weakness was discovered by Stephen Gray of Cisco ASIG.
2244 Credit: This weakness was discovered by Jonathan Gardner of Cisco ASIG.
2267 Credit: This weakness was discovered by Jonathan Gardner at Cisco ASIG.
2307 Credit: This weakness was discovered by Matt Street of Cisco ASIG.
2325 Credit: This weakness was discovered by Aanchal Malhotra of Boston
2385 Credit: This weakness was discovered by Aanchal Malhotra,
2475 Credit: This weakness was discovered by Tenable Network Security.
2507 Credit: This weakness was discovered by Aanchal Malhotra,
2535 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
2552 Credit: This weakness was discovered by Tenable Network Security.
2578 Credit: This weakness was discovered by Aleksandar Nikolic of Cisco Talos.
2603 Credit: This weakness was discovered by Yves Younan of Cisco Talos.
2632 Credit: This weakness was discovered by Yves Younan of Cisco Talos.
2658 Credit: This weakness was discovered by Yves Younan of Cisco Talos.
2682 Credit: This weakness was discovered by Yves Younan and
2710 Credit: This weakness was discovered by Yves Younan of Cisco Talos.
2737 Credit: This weakness was discovered by Yves Younan and
2763 Credit: This weakness was discovered by John D "Doug" Birdwell of IDA.org.
2786 Credit: This weakness was discovered by Matthew Van Gundy of Cisco ASIG.
3131 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat.
3174 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat.
3260 Credit: This vulnerability was discovered by Stephen Roettger of the
3288 Credit: This vulnerability was discovered by Stephen Roettger of
3341 Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
3363 Credit: This vulnerability was discovered in ntp-4.2.6 by
3385 Credit: This vulnerability was discovered by Stephen Roettger of the
3403 Credit: This vulnerability was discovered by Stephen Roettger of the
3421 Credit: This vulnerability was discovered by Stephen Roettger of the
3446 Credit: This vulnerability was discovered by Stephen Roettger of the
3766 Credit for finding this vulnerability goes to Robin Park and Dmitri
3797 Credit for finding this vulnerability goes to Chris Ries of CMU.
3802 Credit for finding this vulnerability goes to Geoff Keating of Apple.
3805 Credit for finding this issue goes to Dave Hart.
3828 Credit for finding this issue goes to the Google Security Team for
4368 Credit:
4398 Credit:
4437 Credit:
4461 Credit:
4484 Credit:
4520 Credit:
4674 Credit:
4698 Credit:
4720 Credit:
4747 Credit:
4773 Credit:
4797 Credit:
4823 Credit:
4848 Credit:
4896 Credit:
4915 Credit:
4942 Credit:
4974 Credit:
5001 Credit:
5029 Credit:
5055 Credit:
5134 Credit: This weakness was discovered by Matthew Van Gundy of Cisco.
5159 Credit: This weakness was discovered by Matthew Van Gundy of Cisco.
5184 Credit: This weakness was discovered by Matthew Van Gundy of Cisco.
5213 Credit: This weakness was discovered by Matthew Van Gundy of Cisco.
5231 Credit: This weakness was discovered by Robert Pajak of ABB.
5250 Credit: This weakness was discovered by Sharon Goldberg and Aanchal
5271 Credit: This weakness was discovered by Magnus Stubman.
5303 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
5332 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
5356 Credit: This weakness was discovered independently by Brian Utterback of
5435 Credit: This weakness was discovered by Nicolas Edet of Cisco.
5453 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
5471 Credit: This weakness was discovered by Jakub Prokes of Red Hat.
5490 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
5506 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
5558 Credit: This weakness was discovered independently by Loganaden
5581 Credit: This problem was discovered by Michael Tatarinov.
5610 Credit: This weakness was discovered by Stephen Gray and
5638 Credit: This weakness was discovered by Yihan Lian of the Cloud
5656 Credit: This weakness was discovered by Yihan Lian of the Cloud
5679 Credit: This weakness was discovered by Yihan Lian of the Cloud
5700 Credit: This weakness was discovered by Yihan Lian of the Cloud
5730 Credit: This weakness was discovered by Matt Street and others of
5771 Credit: This weakness was discovered by Miroslav Lichvar of RedHat
5792 Credit: This weakness was discovered by Matthew Van Gundy of Cisco ASIG.
5830 * Fix some Credit: attributions in the NEWS file. Harlan Stenn.
5895 Credit: This weakness was discovered by Jonathan Gardner of Cisco ASIG.
5916 Credit: This weakness was discovered by Matthey Van Gundy and
5939 Credit: This weakness was discovered by Stephen Gray at Cisco ASIG.
5960 Credit: This weakness was discovered by Aanchal Malhotra of Boston
5983 Credit: This weakness was discovered by Stephen Gray of Cisco ASIG.
6010 Credit: This weakness was discovered by Jonathan Gardner of Cisco ASIG.
6033 Credit: This weakness was discovered by Jonathan Gardner at Cisco ASIG.
6073 Credit: This weakness was discovered by Matt Street of Cisco ASIG.
6091 Credit: This weakness was discovered by Aanchal Malhotra of Boston
6151 Credit: This weakness was discovered by Aanchal Malhotra,
6241 Credit: This weakness was discovered by Tenable Network Security.
6273 Credit: This weakness was discovered by Aanchal Malhotra,
6301 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
6318 Credit: This weakness was discovered by Tenable Network Security.
6344 Credit: This weakness was discovered by Aleksandar Nikolic of Cisco Talos.
6369 Credit: This weakness was discovered by Yves Younan of Cisco Talos.
6398 Credit: This weakness was discovered by Yves Younan of Cisco Talos.
6424 Credit: This weakness was discovered by Yves Younan of Cisco Talos.
6448 Credit: This weakness was discovered by Yves Younan and
6476 Credit: This weakness was discovered by Yves Younan of Cisco Talos.
6503 Credit: This weakness was discovered by Yves Younan and
6529 Credit: This weakness was discovered by John D "Doug" Birdwell of IDA.org.
6552 Credit: This weakness was discovered by Matthew Van Gundy of Cisco ASIG.
6897 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat.
6940 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat.
7026 Credit: This vulnerability was discovered by Stephen Roettger of the
7054 Credit: This vulnerability was discovered by Stephen Roettger of
7107 Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
7129 Credit: This vulnerability was discovered in ntp-4.2.6 by
7151 Credit: This vulnerability was discovered by Stephen Roettger of the
7169 Credit: This vulnerability was discovered by Stephen Roettger of the
7187 Credit: This vulnerability was discovered by Stephen Roettger of the
7212 Credit: This vulnerability was discovered by Stephen Roettger of the
7532 Credit for finding this vulnerability goes to Robin Park and Dmitri
7563 Credit for finding this vulnerability goes to Chris Ries of CMU.
7568 Credit for finding this vulnerability goes to Geoff Keating of Apple.
7571 Credit for finding this issue goes to Dave Hart.
7594 Credit for finding this issue goes to the Google Security Team for