BugTraq Mode:
(Page 3 of 1626)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
PDF Shaper v3.5 - (MSF) Remote Buffer Overflow Vulnerability 2015-08-20
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
PDF Shaper v3.5 - (MSF) Remote Buffer Overflow Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1579

Video: https://youtu.be/-HTEIisSiH8

Release Date:
=============
2015-08-16

Vulnerability Laboratory I

[ more ]  [ reply ]
Microsoft HTA (HTML Application) - Remote Code Execution Vulnerability (MS14-064) 2015-08-20
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Microsoft HTA (HTML Application) - Remote Code Execution Vulnerability (MS14-064)

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1576

Video: http://youtu.be/Vkswz7vt23M

http://web.nvd.nist.gov/view/vuln/detail?vulnId=

[ more ]  [ reply ]
[SECURITY] [DSA 3341-1] conntrack security update 2015-08-20
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3341-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
August 20, 2015

[ more ]  [ reply ]
ESA-2015-132: EMC Documentum D2 Fail Open Vulnerability 2015-08-20
Security Alert (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2015-132: EMC Documentum D2 Fail Open Vulnerability

EMC Identifier: ESA-2015-132

CVE Identifier: CVE-2015-4537

Severity Rating: CVSS v2 Base Score: 8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C)

Affected products:

? EMC Documentum D2 4.2 and earli

[ more ]  [ reply ]
[SECURITY] [DSA 3340-1] zendframework security update 2015-08-19
Alessandro Ghedini (ghedo debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3340-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Alessandro Ghedini
August 19, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3339-1] openjdk-6 security update 2015-08-19
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3339-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
August 19, 2015

[ more ]  [ reply ]
[security bulletin] HPSBUX03400 SSRT102211 rev.1 - HP-UX Running BIND, Remote Denial of Service (DoS) 2015-08-19
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04769567

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04769567
Version: 1

HPSBUX03400 S

[ more ]  [ reply ]
CVE-2015-3269 Apache Flex BlazeDS Insecure Xml Entity Expansion Vulnerability 2015-08-19
Christofer Dutz (cdutz apache org)
CVE-2015-3269 Apache Flex BlazeDS Insecure Xml Entity Expansion
Vulnerability

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Flex BlazeDS 4.7.0

Description: When receiving XML encoded AMF messages containing DTD
entities, the
default XML parser configura

[ more ]  [ reply ]
Privilege escalation through RPC commands in EMC Documentum Content Server (incomplete fix in CVE-2015-4532) 2015-08-19
andrew panfilov tel
Product: EMC Documentum Content Server
Vendor: EMC
Version: ANY
CVE: N/A
Risk: High
Status: public/not fixed

For detailed description see attached VRF#HUFG9EBA.txt and VRF#HX5OLZ0F.txt,
for vendor announcement see CVE-2015-4532 in
http://seclists.org/bugtraq/2015/Aug/86. The problem is PoC code p

[ more ]  [ reply ]
Re: CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information 2015-08-19
Asher995 gmail com (2 replies)

Good brunettes will obtain loads of favorable assessment from their customers. There are several online assessment websites the place you may try to discover a overview of the brunette escort that you've got chosen. Since there are a number of brunette escorts in Istanbul, it should be a cakewalk

[ more ]  [ reply ]
RE: CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information 2015-08-19
Chillman, Paul, Vodafone UK (Paul Chillman vodafone com)
[SYSS-2015-041] XSS in OpenText Secure MFT 2015-08-19
adrian vollmer syss de
Advisory ID: SYSS-2015-041
Product: Secure MFT
Vendor: OpenText
Affected Version(s): 2013 R1, 2014 R1, 2014 R2
Tested Version(s): 2014 R2 SP4
Vulnerability Type: Cross-Site Scripting (CWE-79)
Risk Level: Medium
Solution Status: Fixed
Vendor Notification: 2015-08-05
Solution Date: 2015-08-14
Public D

[ more ]  [ reply ]
Trend Micro Deep Discovery XSS 2015-08-19
apparitionsec gmail com
[+] Credits: John Page aka hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-DDI-081815b.txt

Vendor:
================================
www.trendmicro.com

Product:
==============================================================
T

[ more ]  [ reply ]
Trend Micro Deep Discovery Authentication Bypass 2015-08-19
apparitionsec gmail com
[+] Credits: John Page aka hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-DDI-0818.txt

Vendor:
================================
www.trendmicro.com

Product:
===================================
Trend Micro Deep Discovery 3.7.

[ more ]  [ reply ]
CVE-2015-5699 - Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, Vulnerable to Local Privilege Escalation 2015-08-18
Gregory Pickett (gpickett71 yahoo com)
Title
===================
Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, Vulnerable to Local Privilege Escalation

Summary
===================
Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, is vulnerable to local privilege escalation via Command Injection. Cumu

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-15:20.expat 2015-08-18
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

========================================================================
=====
FreeBSD-SA-15:20.expat Security Advisory
The FreeBSD Project

Topic:

[ more ]  [ reply ]
[SECURITY] [DSA 3338-1] python-django security update 2015-08-18
Alessandro Ghedini (ghedo debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3338-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Alessandro Ghedini
August 18, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3337-1] gdk-pixbuf security update 2015-08-18
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3337-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
August 18, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3325-2] apache2 regression update 2015-08-18
Stefan Fritsch (sf debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3325-2 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Stefan Fritsch
August 18, 2015

[ more ]  [ reply ]
Re: [ERPSCAN-15-013] SAP NetWeaver AS Java CIM UPLOAD â?? XXE 2015-08-18
rahfsk gmail com
ERPSCAN Research Advisory [ERPSCAN-15-013] SAP NetWeaver AS Java CIM
UPLOAD â?? XXE

Application: SAP NetWeaver AS Java
Versions Affected: SAP NetWeaver AS Java 7.4, probably others
Vendor URL: http://SAP.com
Bugs: XML External Entity
Sent: 16.06.2014
Reported: 17.06.2014
Vendor response: 17.06.2014

[ more ]  [ reply ]
Re: [SECURITY] [DSA 3336-1] nss security update 2015-08-17
miguelmellolopes gmail com
....
.....

[ more ]  [ reply ]
EMC Documentum Content Server: arbitrary code execution (incomplete fix in CVE-2015-4532) 2015-08-17
andrew panfilov tel (1 replies)
Product: EMC Documentum Content Server
Vendor: EMC
Version: ANY
CVE: N/A
Risk: High
Status: public/not fixed

For detailed description see http://seclists.org/bugtraq/2015/Jul/51

New behavior introduced in CVE-2015-4532:

API> ?,c,execute do_method WITH METHOD='dm_bp_transition', ARGUMENTS='

[ more ]  [ reply ]
[SECURITY] [DSA 3336-1] nss security update 2015-08-17
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3336-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
August 17, 2015

[ more ]  [ reply ]
sysadmin privilege in EMC Documentum Content Server 2015-08-17
andrew panfilov tel
Product: EMC Documentum Content Server
Vendor: EMC
Version: ANY
CVE: N/A
Risk: High
Status: public/not fixed

In 2011 Yuri Simone discovered a security flaw in EMC Documentum Content
Server, which allows users with sysadmin privileges to elevate their
privileges to superuser (see CVE-2011-4144). O

[ more ]  [ reply ]
Insufficient certificate validation in EMC Secure Remote Services Virtual Edition 2015-08-17
Securify B.V. (lists securify nl)
------------------------------------------------------------------------

Insufficient certificate validation in EMC Secure Remote Services
Virtual Edition
------------------------------------------------------------------------

Han Sahin, November 2014

----------------------------------------------

[ more ]  [ reply ]
(Page 3 of 1626)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus