BugTraq Mode:
(Page 11 of 1563)  < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >
Apple iOS v7.1.2 - Merge Apps Service Local Bypass Vulnerability 2014-09-02
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Apple iOS v7.1.2 - Merge Apps Service Local Bypass Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1280

Video: http://www.vulnerability-lab.com/get_content.php?id=1281

Vulnerability Magazine: http://vulne

[ more ]  [ reply ]
[ MDVSA-2014:171 ] dhcpcd 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:171
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:170 ] jakarta-commons-httpclient 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:170
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
Defense in depth -- the Microsoft way (part 18): Microsoft Office 2010 registers command lines with unquoted pathnames 2014-09-02
Stefan Kanthak (stefan kanthak nexgo de)
Hi @ll,

Microsoft Office 2010 registers the following command lines with unquoted
pathnames containing spaces for various supported file types:

| C:\> FType | FIND.EXE "=%ProgramFiles%\Microsoft "
|
| access=C:\Program Files\Microsoft Office\Office14\protocolhandler.exe "%1"
| Access.ACCDAExtensio

[ more ]  [ reply ]
[ MDVSA-2014:169 ] bugzilla 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:169
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:168 ] libvncserver 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:168
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:167 ] file 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:167
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:166 ] serf 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:166
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:165 ] krb5 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:165
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:163 ] python-imaging 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:163
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:164 ] phpmyadmin 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:164
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:162 ] catfish 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:162
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:161 ] subversion 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:161
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:160 ] gpgme 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:160
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-02
John Leo (johnleo checkssh com)
Good to hear from you!

"marginally better"
We never said this is perfect. checkssh.com stops LOCAL bad boys. That's all.

"both myself and that site are BOTH falling victim"
Ah, here is the source code...
https://checkssh.com/result/indexdotphp.txt
It's extremely short and easy to read. You can set

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-01
john (mail johnbond org)
On 01/09/14 10:43, Stephanie Daugherty wrote:
> Sure it shows me the fingerprint, but it doesn't tell me for sure if that's
> the RIGHT fingerprint or the fingerprint of an imposter,
>
> It's entirely possible that both myself and that site are BOTH falling
> victim to a MITM attack.(routing attack

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-01
Jeroen van der Ham (jeroen dckd nl) (1 replies)
Hi,

On 1 Sep 2014, at 10:43, Stephanie Daugherty <sdaugherty (at) gmail (dot) com [email concealed]> wrote:

> Sure it shows me the fingerprint, but it doesn't tell me for sure if that's
> the RIGHT fingerprint or the fingerprint of an imposter,
>
> It's entirely possible that both myself and that site are BOTH falling
> vict

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-02
John Leo (johnleo checkssh com)
[SECURITY] [DSA 3015-1] lua5.1 security update 2014-09-01
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3015-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
September 01, 2014

[ more ]  [ reply ]
[SECURITY] [DSA 3016-1] lua5.2 security update 2014-09-01
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3016-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
September 01, 2014

[ more ]  [ reply ]
WWW File Share Pro v7.0 - Denial of Service Vulnerability 2014-09-01
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
WWW File Share Pro v7.0 - Denial of Service Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1310

Video: http://www.vulnerability-lab.com/get_content.php?id=1309

http://cwe.mitre.org/data/definitions/121.h

[ more ]  [ reply ]
Avira License Application - Cross Site Request Forgery Vulnerability 2014-09-01
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Avira License Application - Cross Site Request Forgery Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1302

Video: http://www.vulnerability-lab.com/get_content.php?id=1301

Release Date:
=============
201

[ more ]  [ reply ]
SSH host key fingerprint - through HTTPS 2014-09-01
John Leo (johnleo checkssh com) (3 replies)
This tool displays SSH host key fingerprint - through HTTPS.

SSH is about security; host key matters a lot here; and you can know for sure by using this tool. It means you know precisely how to answer this question:
The authenticity of host 'blah.blah.blah (10.10.10.10)' can't be established.
RSA k

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-01
maxigas (maxigas anargeek net) (1 replies)
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-02
John Leo (johnleo checkssh com)
Re: SSH host key fingerprint - through HTTPS 2014-09-01
Chris Nehren cnehren+bugtraq (at) pobox (dot) com [email concealed] (cnehren+bugtraq pobox com) (1 replies)
Re: SSH host key fingerprint - through HTTPS 2014-09-02
Lukasz Biegaj (l biegaj netshock pl) (1 replies)
Re: SSH host key fingerprint - through HTTPS 2014-09-02
Jamie Riden (jamie riden gmail com)
Re: SSH host key fingerprint - through HTTPS 2014-09-01
Micha Borrmann (micha borrmann syss de) (1 replies)
Re: SSH host key fingerprint - through HTTPS 2014-09-02
John Leo (johnleo checkssh com)
(Page 11 of 1563)  < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus