BugTraq Mode:
(Page 7 of 1679)  < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >
May 2016 - HipChat Server - Critical Security Advisory 2016-05-13
David Black (dblack atlassian com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Note: the current version of this advisory can be found at
https://confluence.atlassian.com/x/96hMMQ .

CVE IDs:
* CVE-2016-3714 - ImageMagick - Insufficient shell characters
filtering leads to (potentially * remote) code execution
* CVE-2016-3715 -

[ more ]  [ reply ]
[security bulletin] HPSBMU03589 rev.1 - HPE Version Control Repository Manager (VCRM), Remote Denial of Service (DoS) 2016-05-12
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05131044

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05131044
Version: 1

HPSBMU03589

[ more ]  [ reply ]
[security bulletin] HPSBMU03591 rev.1 - HPE Server Migration Pack, Remote Denial of Service (DoS) 2016-05-12
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05130958

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05130958
Version: 1

HPSBMU03591

[ more ]  [ reply ]
[SECURITY] [DSA 3575-1] libxstream-java security update 2016-05-12
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3575-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
May 12, 2016

[ more ]  [ reply ]
[security bulletin] HPSBGN03597 rev.1 - HPE Cloud Optimizer (Virtualization Performance Viewer) using glibc Remote Denial of Service (DoS) 2016-05-12
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05125672

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05125672
Version: 1

HPSBGN03597 r

[ more ]  [ reply ]
[slackware-security] mozilla-thunderbird (SSA:2016-132-01) 2016-05-12
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mozilla-thunderbird (SSA:2016-132-01)

New mozilla-thunderbird packages are available for Slackware 14.1 and -current
to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
p

[ more ]  [ reply ]
[security bulletin] HPSBST03599 rev.1 - HPE 3PAR OS running OpenSSH, Remote Denial of Service (DoS), Access Restriction Bypass 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05128992

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05128992
Version: 1

HPSBST03599 r

[ more ]  [ reply ]
[security bulletin] HPSBST03598 rev.1 - HPE 3PAR OS using glibc, Remote Denial of Service (DoS), Arbitrary Code Execution 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05128937

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05128937
Version: 1

HPSBST03598 r

[ more ]  [ reply ]
[security bulletin] HPSBST03586 rev.1 - HPE 3PAR OS, Remote Unauthorized Modification 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05128722

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05128722
Version: 1

HPSBST03586 r

[ more ]  [ reply ]
[security bulletin] HPSBNS03581 rev.2 - HPE NonStop Servers running Samba (NS-Samba), Multiple Remote Vulnerabilities 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05082964

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05082964
Version: 2

HPSBNS03581 r

[ more ]  [ reply ]
[security bulletin] HPSBHF03592 rev.1 - HPE VAN SDN Controller OVA using OpenSSL, Multiple Remote Vulnerabilities 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05126404

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05126404
Version: 1

HPSBHF03592

[ more ]  [ reply ]
[SECURITY] [DSA 3565-2] monotone ovito pdns qtcreator softhsm regression update 2016-05-11
Sebastien Delafond (seb debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3565-2 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Sebastien Delafond
May 11, 2016

[ more ]  [ reply ]
BulletProof Security 53.3 - Security Advisory - Multiple XSS Vulnerabilities 2016-05-10
Onur Yilmaz (onur netsparker com)
Information
--------------------
Advisory by Netsparker
Name: Multiple XSS Vulnerabilities in BulletProof Security
Affected Software : BulletProof Security
Affected Versions: v53.3 and possibly below
Vendor Homepage : https://wordpress.org/plugins/bulletproof-security/
Vulnerability Type : Cross-sit

[ more ]  [ reply ]
[slackware-security] imagemagick (SSA:2016-132-01) 2016-05-11
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] imagemagick (SSA:2016-132-01)

New imagemagick packages are available for Slackware 14.0, 14.1, and -current
to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/pa

[ more ]  [ reply ]
[security bulletin] HPSBUX03574 rev.1 - HPE HP-UX CIFS-Server (Samba), Remote Access Restriction Bypass, Authentication bypass, Denial of Service (DoS), Unauthorized Access to Files, Access Restriction Bypass, Unauthorized Information Disclosure 2016-05-10
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05115993

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05115993
Version: 1

HPSBUX03574 r

[ more ]  [ reply ]
[security bulletin] HPSBUX03596 rev.1 - HPE HP-UX running CIFS Server (Samba), Remote Access Restriction Bypass, Unauthorized Access 2016-05-10
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05121842

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05121842
Version: 1

HPSBUX03596 r

[ more ]  [ reply ]
[SECURITY] [DSA 3574-1] libarchive security update 2016-05-10
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3574-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
May 10, 2016

[ more ]  [ reply ]
Intuit QuickBooks 2007 - 2016 Arbitrary Code Execution 2016-05-10
support thegrideon com
+ Credits: Maxim Tomashevich from Thegrideon Software
+ Website: https://www.thegrideon.com/
+ Details: https://www.thegrideon.com/qb-internals-sql.html

Vendor:
---------------------
www.intuit.com
www.intuit.ca
www.intuit.co.uk

Product:
---------------------
QuickBooks Desktop
versions: 2007 - 2

[ more ]  [ reply ]
Trend Micro Direct Pass - Filter Bypass & Cross Site Scripting Vulnerability 2016-05-10
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Trend Micro Direct Pass - Filter Bypass & Cross Site Scripting Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1716

Trend Micro Security ID: 1-1-1039900197

Release Date:
=============
2016-05-01

Vulner

[ more ]  [ reply ]
Stanford University - Multiple SQL Injection Vulnerabilities 2016-05-10
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Stanford University - Multiple SQL Injection Vulnerabilities

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1829

Release Date:
=============
2016-05-09

Vulnerability Laboratory ID (VL-ID):
==========================

[ more ]  [ reply ]
Notes v4.5 iOS - Arbitrary File Upload Vulnerability 2016-05-10
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Notes v4.5 iOS - Arbitrary File Upload Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1832

Release Date:
=============
2016-04-25

Vulnerability Laboratory ID (VL-ID):
==================================

[ more ]  [ reply ]
Skype Manager - (Email Change) Filter Bypass Vulnerability 2016-05-10
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Skype Manager - (Email Change) Filter Bypass Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1672

MSRC Case 32353 TRK:0001002845

Release Date:
=============
2016-05-09

Vulnerability Laboratory ID (VL-I

[ more ]  [ reply ]
Wordpress Truemag Theme - Client Side Cross Site Scripting Web Vulnerability 2016-05-10
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Wordpress Truemag Theme - Client Side Cross Site Scripting Web Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1839

Release Date:
=============
2016-04-29

Vulnerability Laboratory ID (VL-ID):
==========

[ more ]  [ reply ]
[security bulletin] HPSBUX03577 SSRT102172 rev.1 - HP-UX VxFS, Local Unauthorized Access to Files 2016-05-09
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05121749

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05121749
Version: 1

HPSBUX03577 S

[ more ]  [ reply ]
[SECURITY] [DSA 3573-1] qemu security update 2016-05-09
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3573-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
May 09, 2016

[ more ]  [ reply ]
[SECURITY] [DSA 3572-1] websvn security update 2016-05-09
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3572-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
May 09, 2016

[ more ]  [ reply ]
WordPress Plugin event-registration 6.02.02: SQL-Injection and persistent XSS 2016-05-09
mail michaelhelwig de
* Exploit Title: WordPress Plugin event-registration 6.02.02: SQL-Injection and persistent XSS
* Discovery Date: 2016/03/13
* Public Disclosure Date: 2016/05/09
* Exploit Author: Michael Helwig
* Contact: https://twitter.com/c0dmtr1x | https://codemetrix.net
* Vendor Homepage: http://wpeventregister

[ more ]  [ reply ]
[SECURITY] [DSA 3571-1] ikiwiki security update 2016-05-08
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3571-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
May 08, 2016

[ more ]  [ reply ]
(Page 7 of 1679)  < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus