BugTraq Mode:
(Page 7 of 1684)  < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >
[SECURITY] [DSA 3599-1] p7zip security update 2016-06-09
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3599-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 09, 2016

[ more ]  [ reply ]
CVE-2016-3085: Apache CloudStack Authentication Bypass Vulnerability 2016-06-09
John Kinsella (jlk apache org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

CVE-2016-3085: Apache CloudStack Authentication Bypass Vulnerability

CVSS v2:
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Vendors:
The Apache Software Foundation
Accelerite, Inc

Versions affected:
CloudStack versions 4.5.0 and newer

Description:
Apache Cloud

[ more ]  [ reply ]
ESA-2016-064: EMC Data Domain Information Disclosure Vulnerability 2016-06-08
Security Alert (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2016-064: EMC Data Domain Information Disclosure Vulnerability

EMC Identifier: ESA-2016-064

CVE Identifier: CVE-2016-0910

Severity Rating: CVSS v3 Base Score: 8.2 (AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)

Affected products:

EMC Data Domain

[ more ]  [ reply ]
ESA-2016-072: EMC NetWorker Remote Code Execution Vulnerability 2016-06-08
Security Alert (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2016-072: EMC NetWorker Remote Code Execution Vulnerability

EMC Identifier: ESA-2016-072

CVE Identifier: CVE-2016-0916

Severity Rating: CVSS v3 Base Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected products:

EMC NetWorker 8.2

[ more ]  [ reply ]
[security bulletin] HPSBMU03614 rev.1 - HPE Systems Insight Manager using Samba, Multiple Remote Vulnerabilities 2016-06-08
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05166182

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05166182
Version: 1

HPSBMU03614

[ more ]  [ reply ]
[security bulletin] HPSBMU03584 rev.2 - HPE Network Node Manager I (NNMi), Multiple Remote Vulnerabilities 2016-06-08
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05103564

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05103564
Version: 2

HPSBMU03584 r

[ more ]  [ reply ]
[security bulletin] HPSBGN03618 rev.1 - HPE Service Manager remote Denial of Service (DoS), Disclosure of Information, Unauthorized Read Access to Files, Server Side Request Forgery 2016-06-08
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05167176

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05167176
Version: 1

HPSBGN03618 r

[ more ]  [ reply ]
[security bulletin] HPSBGN03624 rev.1 - HPE Project and Portfolio Management Center, Remote Disclosure of Sensitive Information, Execution of Arbitrary of Commands 2016-06-08
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05167126

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05167126
Version: 1

HPSBGN03624 r

[ more ]  [ reply ]
Cisco EPC 3928 Multiple Vulnerabilities 2016-06-08
patryk bogdan secorda com
# Title: Cisco EPC 3928 Multiple Vulnerabilities
# Vendor: http://www.cisco.com/
# Vulnerable Version(s): Cisco Model EPC3928 DOCSIS 3.0 8x4 Wireless Residential Gateway
# CVE References: CVE-2015-6401 / CVE-2015-6402 / CVE-2016-1328 / CVE-2016-1336 / CVE-2016-1337
# Author: Patryk Bogdan from Secor

[ more ]  [ reply ]
[SECURITY] [DSA 3598-1] vlc security update 2016-06-07
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3598-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
June 07, 2016

[ more ]  [ reply ]
[security bulletin] HPSBGN03623 rev.1 - HPE Universal CMDB, Remote Disclosure of Sensitive Information 2016-06-07
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05164813

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05164813
Version: 1

HPSBGN03623

[ more ]  [ reply ]
[security bulletin] HPSBGN03622 rev.1 - HPE UCMDB, Universal Discovery, and UCMDB Configuration Manager using Apache Commons Collection, Remote Code Executon 2016-06-07
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05164408

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05164408
Version: 1

HPSBGN03622

[ more ]  [ reply ]
[security bulletin] HPSBGN03621 rev.1 - HPE Universal CMDB using OpenSSL, Remote Disclosure of Sensitive Information 2016-06-07
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05164821

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05164821
Version: 1

HPSBGN03621

[ more ]  [ reply ]
[CVE-2016-0392] IBM GPFS / Spectrum Scale Command Injection 2016-06-07
john fitzpatrick mwrinfosecurity com
###[IBM GPFS / Spectrum Scale Command Injection]###

A command injection vulnerability in GPFS / Spectrum Scale allows attackers to escalate privileges to root

* Product: IBM GPFS / Spectrum Scale
* Severity: High
* CVE Reference: CVE-2016-0392
* Type: Command injection
* Author: John Fitzpatrick (

[ more ]  [ reply ]
[SECURITY] [DSA 3597-1] expat security update 2016-06-07
Luciano Bello (luciano debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3597-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Luciano Bello
June 07, 2016

[ more ]  [ reply ]
Wordpress Levo-Slideshow v2.3 - Persistent Vulnerability 2016-06-07
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Wordpress Levo-Slideshow v2.3 - Persistent Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1855

Release Date:
=============
2016-06-06

Vulnerability Laboratory ID (VL-ID):
==============================

[ more ]  [ reply ]
Microsoft Education - Code Execution Vulnerability 2016-06-07
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Microsoft Education - Code Execution Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1669

MSRC Case: 32314
TRK: 0001002809

Research Article: http://www.kieranclaessens.be/uncategorized/microsoft-educatio

[ more ]  [ reply ]
Wordpress Levo-Slideshow 2.3 - Arbitrary File Upload Vulnerability 2016-06-07
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Wordpress Levo-Slideshow 2.3 - Arbitrary File Upload Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1854

Release Date:
=============
2016-06-07

Vulnerability Laboratory ID (VL-ID):
====================

[ more ]  [ reply ]
Mapbox (API) - Filter Bypass & Persistent Vulnerability 2016-06-07
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Mapbox (API) - Filter Bypass & Persistent Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1787

ID: #119802

Release Date:
=============
2016-06-06

Vulnerability Laboratory ID (VL-ID):
==================

[ more ]  [ reply ]
[security bulletin] HPSBGN03620 rev.1 - HPE Helion OpenStack using OpenSSL and QEMU, Remote Unauthorized Data Access 2016-06-07
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05164862

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05164862
Version: 1

HPSBGN03620 r

[ more ]  [ reply ]
[security bulletin] HPSBGN03619 rev.1 - HPE Discovery and Dependency Mapping Inventory (DDMi) using Java Deserialization, remote Code Execution 2016-06-07
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05164819

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05164819
Version: 1

HPSBGN03619 r

[ more ]  [ reply ]
[security bulletin] HPSBGN03442 rev.2 - HP Helion OpenStack using glibc, Remote Denial of Service (DoS), Arbitrary Code Execution 2016-06-07
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05028479

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05028479
Version: 2

HPSBGN03442 r

[ more ]  [ reply ]
Re: rConfig, the open source network device configuration management tool, Vulnerable to Local File Inclusion 2016-06-06
Gregory Pickett (gpickett71 yahoo com)
rConfig v3.1.1 introduced whitelisting. This is how to get past that. :)

Greg

Verification of Vulnerability (for v3.1.1)
===================
The following steps can be carried out in duplicating this vulnerability.

Step 1:
Enter the following into your browser address bar:

http://<SERVER>/l

[ more ]  [ reply ]
[SECURITY] [DSA 3596-1] spice security update 2016-06-06
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3596-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 06, 2016

[ more ]  [ reply ]
[SECURITY] [DSA 3595-1] mariadb-10.0 security update 2016-06-05
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3595-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 05, 2016

[ more ]  [ reply ]
[SECURITY] [DSA 3548-3] samba regression update 2016-06-05
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3548-3 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 05, 2016

[ more ]  [ reply ]
[SECURITY] [DSA 3594-1] chromium-browser security update 2016-06-04
Michael Gilbert (mgilbert debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3594-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Michael Gilbert
June 04, 2016

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-16:24.ntp 2016-06-04
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

========================================================================
=====
FreeBSD-SA-16:24.ntp Security Advisory
The FreeBSD Project

Topic:

[ more ]  [ reply ]
[slackware-security] ntp (SSA:2016-155-01) 2016-06-04
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] ntp (SSA:2016-155-01)

New ntp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches

[ more ]  [ reply ]
[security bulletin] - Linux Kernel Flaw, ASN.1 DER decoder for x509 certificate DER 2016-06-03
HP Security Alert (hp-security-alert hp com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:
https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c0515855
5

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05158555
Version: 1

HPSBHF3548 - Linux Kernel F

[ more ]  [ reply ]
(Page 7 of 1684)  < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus