BugTraq Mode:
(Page 8 of 1580)  < Prev  3 4 5 6 7 8 9 10 11 12 13  Next >
[ MDVSA-2014:249 ] qemu 2014-12-14
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:249
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:248 ] graphviz 2014-12-14
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:248
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:247 ] jasper 2014-12-14
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:247
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:246 ] openvpn 2014-12-14
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:246
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
ESA-2014-173: RSA® Authentication Manager Unvalidated Redirect Vulnerability 2014-12-12
Security Alert (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2014-173: RSA® Authentication Manager Unvalidated Redirect Vulnerability

EMC Identifier: ESA-2014-173

CVE Identifier: CVE-2014-2516

Severity Rating: CVSS v2 Base Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)

Affected Products:

? R

[ more ]  [ reply ]
ESA-2014-163: RSA Archer® GRC Platform Multiple Vulnerabilities 2014-12-12
Security Alert (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2014-163: RSA Archer® GRC Platform Multiple Vulnerabilities

EMC Identifier: ESA-2014-163

CVE Identifier: See below for individual identifiers

Severity Rating: View details below for individual CVSSv2 scores

Affected Products:

RSA A

[ more ]  [ reply ]
ESA-2014-164: EMC Isilon InsightIQ Cross-Site Scripting Vulnerability 2014-12-12
Security Alert (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2014-164: EMC Isilon InsightIQ Cross-Site Scripting Vulnerability

EMC Identifier: ESA-2014-164

CVE Identifier: CVE-2014-4628

Severity Rating: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Affected products:

? EMC Isilon In

[ more ]  [ reply ]
[security bulletin] HPSBUX03162 SSRT101767 rev.3 - HP-UX Running OpenSSL, Remote Denial of Service (DoS), Unauthorized Access, Man-in-the-Middle (MitM) Attack 2014-12-11
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04492722

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04492722
Version: 3

HPSBUX03162 SS

[ more ]  [ reply ]
Docker 1.3.3 - Security Advisory [11 Dec 2014] 2014-12-12
Eric Windisch (eric windisch docker com)
Docker 1.3.3 has been released to address several vulnerabilities and is immediately available for all supported platforms: https://docs.docker.com/installation/

This release addresses vulnerabilities which could be exploited by a malicious Dockerfile, image, or registry to compromise a Docker hos

[ more ]  [ reply ]
[SECURITY] [DSA 3099-1] dbus security update 2014-12-11
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3099-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
December 11, 2014

[ more ]  [ reply ]
ResourceSpace Multiple Cross Site Scripting, and HTML and SQL Injection Vulnerabilities 2014-12-11
petri iivonen tmbc gov uk
Title: ResourceSpace Multiple Cross Site Scripting, and HTML and SQL Injection Vulnerabilities
Author: Petri Iivonen
Contact: petri.iivonen_at_tmbc_gov_uk
Discovered: 11 June 2014
Updated: 11 December 2014
Published: 11 December 2014
Vendor: Montala Limited
Vendor url: www.resourcespace.org
Software

[ more ]  [ reply ]
APPLE-SA-2014-12-11-1 Safari 8.0.2, Safari 7.1.2, and Safari 6.2.2 2014-12-11
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2014-12-11-1 Safari 8.0.2, Safari 7.1.2, and Safari 6.2.2

Safari 8.0.2, Safari 7.1.2, and Safari 6.2.2 are now available and
include the security content of Safari 8.0.1, Safari 7.1.1, and
Safari 6.2.1: https://support.apple.com/en-us/HT6596

[ more ]  [ reply ]
[SECURITY] [DSA 3098-1] graphviz security update 2014-12-11
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3098-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Salvatore Bonaccorso
December 11, 2014

[ more ]  [ reply ]
[SECURITY] [DSA 3097-1] unbound security update 2014-12-10
Yves-Alexis Perez (corsac debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3097-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Yves-Alexis Perez
December 10, 2014

[ more ]  [ reply ]
[slackware-security] openssh (SSA:2014-344-03) 2014-12-11
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] openssh (SSA:2014-344-03)

New openssh packages are available for Slackware 14.0, 14.1, and -current.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/openssh-6.7p1-i486-2_sla

[ more ]  [ reply ]
[slackware-security] wpa_supplicant (SSA:2014-344-07) 2014-12-11
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] wpa_supplicant (SSA:2014-344-07)

New wpa_supplicant packages are available for Slackware 13.37, 14.0, 14.1,
and -current to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+-------------------------

[ more ]  [ reply ]
[slackware-security] mozilla-firefox (SSA:2014-344-02) 2014-12-11
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mozilla-firefox (SSA:2014-344-02)

New mozilla-firefox packages are available for Slackware 14.1 to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/mozil

[ more ]  [ reply ]
[slackware-security] pidgin (SSA:2014-344-05) 2014-12-11
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] pidgin (SSA:2014-344-05)

New pidgin packages are available for Slackware 13.0, 13.1, 13.37, 14.0,
14.1, and -current.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/pidgin-

[ more ]  [ reply ]
[slackware-security] bind (SSA:2014-344-01) 2014-12-11
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] bind (SSA:2014-344-01)

New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patch

[ more ]  [ reply ]
[slackware-security] seamonkey (SSA:2014-344-06) 2014-12-11
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] seamonkey (SSA:2014-344-06)

New seamonkey packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packag

[ more ]  [ reply ]
[slackware-security] openvpn (SSA:2014-344-04) 2014-12-11
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] openvpn (SSA:2014-344-04)

New openvpn packages are available for Slackware 13.0, 13.1, 13.37, 14.0,
14.1, and -current to fix a security issue.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------

[ more ]  [ reply ]
[SECURITY] [DSA 3096-1] pdns-recursor security update 2014-12-11
Sebastien Delafond (seb debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3096-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Sebastien Delafond
December 11, 2014

[ more ]  [ reply ]
[SECURITY] [DSA 3095-1] xorg-server security update 2014-12-10
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3095-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
December 10, 2014

[ more ]  [ reply ]
AST-2014-019: Remote Crash Vulnerability in WebSocket Server 2014-12-10
Asterisk Security Team (security asterisk org)
Asterisk Project Security Advisory - AST-2014-019

Product Asterisk
Summary Remote Crash Vulnerability in WebSocket Server
Nature of Advisory Denial of Service

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-14:28.file 2014-12-10
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

========================================================================
=====
FreeBSD-SA-14:28.file Security Advisory
The FreeBSD Project

Topic:

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-14:29.bind 2014-12-10
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

========================================================================
=====
FreeBSD-SA-14:29.bind Security Advisory
The FreeBSD Project

Topic:

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-14:27.stdio 2014-12-10
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

========================================================================
=====
FreeBSD-SA-14:27.stdio Security Advisory
The FreeBSD Project

Topic:

[ more ]  [ reply ]
NEW VMSA-2014-0014 - AirWatch by VMware product update addresses information disclosure vulnerabilities 2014-12-10
VMware Security Response Center (security vmware com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------

VMware Security Advisory

Advisory ID: VMSA-2014-0014
Synopsis: AirWatch by VMware product update addresses information
disclosure vulnerabilit

[ more ]  [ reply ]
[CVE-2014-7301] SGI Tempo System Database Password Exposure 2014-12-10
john fitzpatrick mwrinfosecurity com
[SGI Tempo System Database Password Exposure]

Software: SGI Tempo (SGI ICE-X Supercomputers)
Affected Versions: Unknown
CVE Reference: CVE-2014-7301
Author: John Fitzpatrick, MWR Labs
Severity: Medium Risk
Vendor: Silicon Graphics International Corp (SGI)
Vendor Response: Uncooperative

[Descript

[ more ]  [ reply ]
[CVE-2014-7302] SGI SUID Root Privilege Escalation 2014-12-10
john fitzpatrick mwrinfosecurity com
[SGI SUID Root Privilege Escalation]

Software: SGI Tempo (SGI ICE-X Supercomputers)
Affected Versions: Unknown
CVE Reference: CVE-2014-7302
Author: Luke Jennings, John Fitzpatrick, MWR Labs
Severity: Medium Risk
Vendor: Silicon Graphics International Corp (SGI)
Vendor Response: Uncooperative

[De

[ more ]  [ reply ]
(Page 8 of 1580)  < Prev  3 4 5 6 7 8 9 10 11 12 13  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus