BugTraq Mode:
(Page 9 of 1609)  < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >
[SECURITY] [DSA 3227-1] movabletype-opensource security update 2015-04-15
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3227-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Salvatore Bonaccorso
April 15, 2015

[ more ]  [ reply ]
Cisco Security Advisory: Cisco Secure Desktop Cache Cleaner Command Execution Vulnerability 2015-04-15
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco Secure Desktop Cache Cleaner Command Execution Vulnerability

Advisory ID: cisco-sa-20150415-csd

Revision 1.0

For Public Release 2015 April 15 16:00 UTC (GMT)

+-------------------------------------------------------

[ more ]  [ reply ]
Cisco Security Advisory: Cisco IOS XR Software BVI Routed Packet Denial of Service Vulnerability 2015-04-15
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS XR Software BVI Routed Packet Denial of Service Vulnerability

Advisory ID: cisco-sa-20150415-iosxr

Revision 1.0

For Public Release 2015 April 15 16:00 UTC (GMT)

Summary
=======

A vulnerability in the packet-processing code of Cisco IOS X

[ more ]  [ reply ]
[SECURITY] [DSA 3226-1] inspircd security update 2015-04-15
Sebastien Delafond (seb debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3226-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Sebastien Delafond
April 15, 2015

[ more ]  [ reply ]
ESA-2015-069: EMC NetWorker Buffer Overflow Vulnerability 2015-04-15
Security Alert (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2015-069: EMC NetWorker Buffer Overflow Vulnerability

EMC Identifier: ESA-2015-069

CVE Identifier: CVE-2015-0530

Severity Rating: CVSS v2 Base Score: 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C)

Affected products:

? All versions of NetWorker

[ more ]  [ reply ]
[SECURITY] [DSA 3225-1] gst-plugins-bad0.10 security update 2015-04-15
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3225-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
April 15, 2015

[ more ]  [ reply ]
[IMF2015] Call for Participation 2015-04-15
Oliver Goebel (goebel cert uni-stuttgart de)
Dear all,

please find included the call for participation for this year's IMF.

Please excuse possible cross postings.

========================================================================

CALL FOR PARTICIPATION

IMF 2015
9

[ more ]  [ reply ]
Security Advisory - Apache HTTP Server 2.2.29 / 2.4.12 NULL Pointer dereference in protocol.c 2015-04-15
Nicholas Lemonias. (lem nikolas googlemail com)
-=[Advanced Information Security Corporation]=-

Advisory for Apache Http Server 2.2.29 / 2.4.12 NULL Pointer Dereference

Author: Nicholas Lemonias
Advisory Date: 14/4/2015
Email: lem.nikolas (at) gmail (dot) com

Introduction
==========
During a source-code audit of the Apache HTTPD 2.2.2

[ more ]  [ reply ]
Secunia Research: Microsoft Windows GDI "MRSETDIBITSTODEVICE ::bPlay()" EMF Parsing Memory Corruption Vulnerability 2015-04-15
Secunia Research (remove-vuln secunia com)
======================================================================

Secunia Research 15/04/2015

Microsoft Windows GDI "MRSETDIBITSTODEVICE ::bPlay()" EMF Parsing

Memory Corruption Vulnerability

=====================================

[ more ]  [ reply ]
Wordpress WP Statistics persistent cross site scripting 2015-04-15
kingkaustubh me com
===========================================================
Stored XSS Vulnerability in WP Statistics Wordpress Plugin
===========================================================

. contents:: Table Of Content

Overview
========

* Title :Stored XSS Vulnerability in WP Statistics Wordpress Plugin

[ more ]  [ reply ]
several issues in SQLite (+ catching up on several other bugs) 2015-04-14
Michal Zalewski (lcamtuf coredump cx)
SQLite is probably the most popular embedded database in use today; it
is also known for being very well-tested and robust.

Because of its versatility, SQLite sometimes finds use as the
mechanism behind SQL-style query APIs that are exposed between
privileged execution contexts and less-trusted cod

[ more ]  [ reply ]
whitepaper: Identifier based XSSI attacks 2015-04-14
Takeshi Terada (mbsdtest01 gmail com)
Hello list members,

We released a new technical whitepaper titled:
"Identifier based XSSI attacks"

CVE numbers:
CVE-2014-6345, CVE-2014-7939

URL:
http://www.mbsd.jp/Whitepaper/xssi.pdf

Introduction:
-------------------------------
Cross Site Script Inclusion (XSSI) is an attack technique (or a
v

[ more ]  [ reply ]
[SYSS-2015-015] Panda Gold Protection 2015 - Authentication Bypass 2015-04-14
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-015
Product: Panda Gold Protection 2015
Vendor: Panda Security
Affected Version(s): 15.1.0
Tested Version(s): 15.1.0
Vulnerability Type: Authentication Bypass Using an Alternate Path or
Channel (CWE-288)
Ris

[ more ]  [ reply ]
[SYSS-2015-014] Panda Global Protection 2015 - Authentication Bypass 2015-04-14
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-014
Product: Panda Global Protection 2015
Vendor: Panda Security
Affected Version(s): 15.1.0
Tested Version(s): 15.1.0
Vulnerability Type: Authentication Bypass Using an Alternate Path or
Channel (CWE-288)
R

[ more ]  [ reply ]
[SYSS-2015-013] Panda Antivirus Pro 2015 - Authentication Bypass 2015-04-14
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-013
Product: Panda Antivirus Pro 2015
Vendor: Panda Security
Affected Version(s): 15.1.0
Tested Version(s): 15.1.0
Vulnerability Type: Authentication Bypass Using an Alternate Path or
Channel (CWE-288)
Risk

[ more ]  [ reply ]
[SYSS-2015-012] Panda Internet Security 2015 - Authentication Bypass 2015-04-14
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-012
Product: Panda Internet Security 2015
Vendor: Panda Security
Affected Version(s): 15.0.1
Tested Version(s): 15.0.1
Vulnerability Type: Authentication Bypass Using an Alternate Path or
Channel (CWE-288)
R

[ more ]  [ reply ]
Security Advisory - Apache HTTP Server 2.2.29 / 2.4.12 NULL Pointer dereference in protocol.c 2015-04-14
lem nikolas gmail com
-=[Advanced Information Security Corporation]=-

Advisory for Apache Http Server 2.2.29 / 2.4.12 NULL Pointer Dereference

Author: Nicholas Lemonias
Advisory Date: 14/4/2015
Email: lem.nikolas (at) gmail (dot) com

Introduction
==========
During a source-code audit of the Apache HTTPD 2.2.29

[ more ]  [ reply ]
Security Advisory - Apache HTTP Server 2.2.29 / 2.4.12 NULL Pointer dereference in protocol.c 2015-04-14
Nicholas Lemonias. (lem nikolas googlemail com)
-=[Advanced Information Security Corporation]=-

Advisory for Apache Http Server 2.2.29 / 2.4.12 NULL Pointer Dereference

Author: Nicholas Lemonias
Advisory Date: 14/4/2015
Email: lem.nikolas (at) gmail (dot) com

Introduction
==========
During a source-code audit of the Apache HTTPD 2.2.29

[ more ]  [ reply ]
[CVE-2015-2810] Integer Overflow leading to heap corruption when assigning a long paragraph size value to a HanWord document 2015-04-13
Daniel Regalado (daniel regalado FireEye com)
Product: Hancom Office Hwp 2014
Vendor: Hancom - www.hancom.com
Versions Affected (32 bits only):

HanWord Viewer 2007 (Korean)
HanWord Viewer 2010 ­ 8.5.6.1158 (English)
HwpViewer 2014 VP- 9.1.0.2186 (English)
Hwp 2014 VP - 9.0.0.1405 (English/Korean)
Version Not vulnerable:
Hwp 2014 VP - 9.1.0.234

[ more ]  [ reply ]
[security bulletin] HPSBOV03318 rev.1 - HP SSL for OpenVMS, Remote Denial of Service (DoS) and other Vulnerabilities 2015-04-13
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04635715

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04635715
Version: 1

HPSBOV03318 re

[ more ]  [ reply ]
[security bulletin] HPSBHF03310 rev.2 - HP Thin Clients running Windows Embedded Standard 7 (WES7) or Windows Embedded Standard 2009 (WES09) with HP Easy Deploy, Remote Elevation of Privilege, Execution of Code 2015-04-13
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04629160

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04629160
Version: 2

HPSBHF03310 re

[ more ]  [ reply ]
Apache HTTPD 2.4.12, 2.2.29 Security Audit - Advanced Information Security Corp 2015-04-13
lem nikolas gmail com
-=[Advanced Information Security Corp]=-

Author: Nicholas Lemonias
Advisory Date: 13/4/2015
Email: lem.nikolas (at) gmail (dot) com

Introduction
==========
During a source-code audit of the Apache HTTPD 2.2.29 release
implementation for linux; conducted internally by the Advanced
Information Secur

[ more ]  [ reply ]
Apache HTTPD 2.4.12/ 2.2.29 Security Audit Notes - Advanced Information Security Corp 2015-04-13
Nicholas Lemonias. (lem nikolas googlemail com)
-=[Advanced Information Security Corp]=-

Author: Nicholas Lemonias
Advisory Date: 13/4/2015
Email: lem.nikolas (at) gmail (dot) com

Introduction
==========
During a source-code audit of the Apache HTTPD 2.2.29 release
implementation for linux; conducted internally by the Advanced
Information Secur

[ more ]  [ reply ]
[SECURITY] [DSA 3224-1] libx11 security update 2015-04-12
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3224-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
April 12, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3223-1] ntp security update 2015-04-12
Alessandro Ghedini (ghedo debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3223-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Alessandro Ghedini
April 12, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3222-1] chrony security update 2015-04-12
Alessandro Ghedini (ghedo debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3222-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Alessandro Ghedini
April 12, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3221-1] das-watchdog security update 2015-04-12
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3221-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Salvatore Bonaccorso
April 12, 2015

[ more ]  [ reply ]
Safari iOS/OS X/Windows cookie access vulnerability 2015-04-12
Jouko Pynnonen (jouko iki fi)
OVERVIEW
==========

The 4/8/2015 security updates from Apple included a patch for a Safari
cross-domain vulnerability. An attacker could create web content
which, when viewed by a target user, bypasses some of the normal
cross-domain restrictions to access or modify HTTP cookies belonging
to any we

[ more ]  [ reply ]
[SECURITY] [DSA 3220-1] libtasn1-3 security update 2015-04-11
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3220-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Salvatore Bonaccorso
April 11, 2015

[ more ]  [ reply ]
Hijacking any Weebly Website [Insecure Direct Object Reference Vulnerability] 2015-04-11
huehuehuehue10 gmail com
Title: Hijack any website from weebly.com by just adding an administrator to their website. [Insecure Direct Object Reference Vulnerability]

=====

Weebly is a web-hosting service that allows the user to ?drag-and-drop? while using their website builder. As of August 2012, Weebly hosts over 20 mill

[ more ]  [ reply ]
(Page 9 of 1609)  < Prev  4 5 6 7 8 9 10 11 12 13 14  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus