BugTraq Mode:
(Page 7 of 1563)  < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >
CVE-2014-4958: Stored Attribute-Based Cross-Site Scripting (XSS) Vulnerability in Telerik UI for ASP.NET AJAX RadEditor Control 2014-09-25
main gsmcnamara com
All versions of the popular UI for ASP.NET AJAX RadEditor Control product by Telerik may be affected by a high-risk stored attribute-based cross-site scripting (XSS) vulnerability that is assigned CVE-2014-4958. This WYSIWYG rich text editor is ?...what Microsoft chose to use in MSDN, CodePlex, Tech

[ more ]  [ reply ]
[SECURITY] [DSA 3033-1] nss security update 2014-09-25
Yves-Alexis Perez (corsac debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3033-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Yves-Alexis Perez
September 25, 2014

[ more ]  [ reply ]
[security bulletin] HPSBST03103 rev.1 - HP Storage EVA Command View Suite running OpenSSL, Remote Unauthorized Access, Disclosure of Information 2014-09-24
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04425253

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04425253
Version: 1

HPSBST03103 re

[ more ]  [ reply ]
[ MDVSA-2014:186 ] bash 2014-09-24
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:186
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
Cisco Security Advisory: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability 2014-09-24
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability

Advisory ID: cisco-sa-20140924-sip

Revision 1.0

For Public Release 2014 September 24 16:00 UTC (GMT)

Summary
+======

A vulnerability in the Session Initiation Protocol

[ more ]  [ reply ]
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS Software Multicast Domain Name System 2014-09-24
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Multiple Vulnerabilities in Cisco IOS Software Multicast Domain Name System

Advisory ID: cisco-sa-20140924-mdns

Revision 1.0

For Public Release 2014 September 24 16:00 UTC (GMT)

Summary
+======

The Cisco IOS Software implementation of the multicas

[ more ]  [ reply ]
Cisco Security Advisory: Cisco IOS Software Network Address Translation Denial of Service Vulnerability 2014-09-24
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software Network Address Translation Denial of Service Vulnerability

Advisory ID: cisco-sa-20140924-nat

Revision 1.0

For Public Release 2014 September 24 16:00 UTC (GMT)

Summary
+======

A vulnerability in the Network Address Translation

[ more ]  [ reply ]
Cisco Security Advisory: Cisco IOS Software DHCP Version 6 Denial of Service Vulnerability 2014-09-24
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software DHCP Version 6 Denial of Service Vulnerability

Advisory ID: cisco-sa-20140924-dhcpv6

Revision 1.0

For Public Release 2014 September 24 16:00 UTC (GMT)

Summary
+======

A vulnerability in the DHCP version 6 (DHCPv6) server impleme

[ more ]  [ reply ]
Cisco Security Advisory: Cisco IOS Software Metadata Vulnerabilities 2014-09-24
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software Metadata Vulnerabilities

Advisory ID: cisco-sa-20140924-metadata

Revision 1.0

For Public Release 2014 September 24 16:00 UTC (GMT)

Summary
+======

Two vulnerabilities in the metadata flow feature of Cisco IOS Software could allo

[ more ]  [ reply ]
Cisco Security Advisory: Cisco IOS Software RSVP Vulnerability 2014-09-24
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS Software RSVP Vulnerability

Advisory ID: cisco-sa-20140924-rsvp

Revision 1.0

For Public Release 2014 September 24 16:00 UTC (GMT)

Summary
+======

A vulnerability in the implementation of the Resource Reservation Protocol (RSVP) in Cisco

[ more ]  [ reply ]
[ MDVSA-2014:184 ] net-snmp 2014-09-24
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:184
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:183 ] phpmyadmin 2014-09-24
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:183
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:182 ] zarafa 2014-09-24
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:182
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:181 ] dump 2014-09-24
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:181
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:185 ] libgadu 2014-09-24
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:185
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:183 ] phpmyadmin 2014-09-24
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:183
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[SECURITY] [DSA 3032-1] bash security update 2014-09-24
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3032-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
September 24, 2014

[ more ]  [ reply ]
Two SQL Injections in All In One WP Security WordPress plugin 2014-09-24
High-Tech Bridge Security Research (advisory htbridge com)
Advisory ID: HTB23231
Product: All In One WP Security WordPress plugin
Vendor: Tips and Tricks HQ, Peter, Ruhul, Ivy
Vulnerable Version(s): 3.8.2 and probably prior
Tested Version: 3.8.2
Advisory Publication: September 3, 2014 [without technical details]
Vendor Notification: September 3, 2014
Ve

[ more ]  [ reply ]
[SECURITY] [DSA 3031-1] apt security update 2014-09-23
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3031-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Salvatore Bonaccorso
September 23, 2014

[ more ]  [ reply ]
CVE-2014-6603 suricata 2.0.3 Out-of-bounds access in SSH parser 2014-09-23
Steffen Bauch (mail steffenbauch de)
CVE-2014-6603 suricata 2.0.3 Out-of-bounds access in SSH application parser

1. Background

Suricata is a high performance Network IDS, IPS and Network Security
Monitoring engine developed by the Open Information Security Foundation
(OISF).

2. Summary Information

It was found out that the applic

[ more ]  [ reply ]
[KIS-2014-10] X2Engine <= 4.1.7 (FileUploadsFilter.php) Unrestricted File Upload Vulnerability 2014-09-23
Egidio Romano (research karmainsecurity com)
------------------------------------------------------------------------
--------
X2Engine <= 4.1.7 (FileUploadsFilter.php) Unrestricted File Upload Vulnerability
------------------------------------------------------------------------
--------

[-] Software Link:

http://www.x2engine.com/

[-] Affe

[ more ]  [ reply ]
[KIS-2014-09] X2Engine <= 4.1.7 (SiteController.php) PHP Object Injection Vulnerability 2014-09-23
Egidio Romano (research karmainsecurity com)
------------------------------------------------------------------------
-
X2Engine <= 4.1.7 (SiteController.php) PHP Object Injection Vulnerability
------------------------------------------------------------------------
-

[-] Software Link:

http://www.x2engine.com/

[-] Affected Versions:

All v

[ more ]  [ reply ]
Glype proxy local address filter bypass 2014-09-22
Securify B.V. (lists securify nl)
------------------------------------------------------------------------

Glype proxy local address filter bypass
------------------------------------------------------------------------

Securify, September 2014

------------------------------------------------------------------------

Abstract
------

[ more ]  [ reply ]
[security bulletin] HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access 2014-09-22
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04451722

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04451722
Version: 1

HPSBPI03107 re

[ more ]  [ reply ]
Glype proxy privacy settings can be disabled via CSRF 2014-09-22
Securify B.V. (lists securify nl)
------------------------------------------------------------------------

Glype proxy privacy settings can be disabled via CSRF
------------------------------------------------------------------------

Securify, September 2014

------------------------------------------------------------------------

A

[ more ]  [ reply ]
Glype proxy cookie jar path traversal allows code execution 2014-09-22
Securify B.V. (lists securify nl)
------------------------------------------------------------------------

Glype proxy cookie jar path traversal allows code execution
------------------------------------------------------------------------

Securify, September 2014

--------------------------------------------------------------------

[ more ]  [ reply ]
[ MDVSA-2014:180 ] gnupg 2014-09-22
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:180
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
Re: TP-LINK WDR4300 - Stored XSS & DoS 2014-09-22
ozelisyan gmail com
**2014-09-16:
Vendor released a fix.

http://www.tp-link.com/resources/software/TL-WDR4300_v1_140916.zip

[ more ]  [ reply ]
(Page 7 of 1563)  < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus