BugTraq Mode:
(Page 11 of 1563)  < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >
[ MDVSA-2014:167 ] file 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:167
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:166 ] serf 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:166
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:165 ] krb5 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:165
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:163 ] python-imaging 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:163
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:164 ] phpmyadmin 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:164
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:162 ] catfish 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:162
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:161 ] subversion 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:161
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:160 ] gpgme 2014-09-02
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:160
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-02
John Leo (johnleo checkssh com)
Good to hear from you!

"marginally better"
We never said this is perfect. checkssh.com stops LOCAL bad boys. That's all.

"both myself and that site are BOTH falling victim"
Ah, here is the source code...
https://checkssh.com/result/indexdotphp.txt
It's extremely short and easy to read. You can set

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-01
john (mail johnbond org)
On 01/09/14 10:43, Stephanie Daugherty wrote:
> Sure it shows me the fingerprint, but it doesn't tell me for sure if that's
> the RIGHT fingerprint or the fingerprint of an imposter,
>
> It's entirely possible that both myself and that site are BOTH falling
> victim to a MITM attack.(routing attack

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-01
Jeroen van der Ham (jeroen dckd nl) (1 replies)
Hi,

On 1 Sep 2014, at 10:43, Stephanie Daugherty <sdaugherty (at) gmail (dot) com [email concealed]> wrote:

> Sure it shows me the fingerprint, but it doesn't tell me for sure if that's
> the RIGHT fingerprint or the fingerprint of an imposter,
>
> It's entirely possible that both myself and that site are BOTH falling
> vict

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-02
John Leo (johnleo checkssh com)
[SECURITY] [DSA 3015-1] lua5.1 security update 2014-09-01
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3015-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
September 01, 2014

[ more ]  [ reply ]
[SECURITY] [DSA 3016-1] lua5.2 security update 2014-09-01
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3016-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
September 01, 2014

[ more ]  [ reply ]
WWW File Share Pro v7.0 - Denial of Service Vulnerability 2014-09-01
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
WWW File Share Pro v7.0 - Denial of Service Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1310

Video: http://www.vulnerability-lab.com/get_content.php?id=1309

http://cwe.mitre.org/data/definitions/121.h

[ more ]  [ reply ]
Avira License Application - Cross Site Request Forgery Vulnerability 2014-09-01
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Avira License Application - Cross Site Request Forgery Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1302

Video: http://www.vulnerability-lab.com/get_content.php?id=1301

Release Date:
=============
201

[ more ]  [ reply ]
SSH host key fingerprint - through HTTPS 2014-09-01
John Leo (johnleo checkssh com) (3 replies)
This tool displays SSH host key fingerprint - through HTTPS.

SSH is about security; host key matters a lot here; and you can know for sure by using this tool. It means you know precisely how to answer this question:
The authenticity of host 'blah.blah.blah (10.10.10.10)' can't be established.
RSA k

[ more ]  [ reply ]
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-01
maxigas (maxigas anargeek net) (1 replies)
Re: [FD] SSH host key fingerprint - through HTTPS 2014-09-02
John Leo (johnleo checkssh com)
Re: SSH host key fingerprint - through HTTPS 2014-09-01
Chris Nehren cnehren+bugtraq (at) pobox (dot) com [email concealed] (cnehren+bugtraq pobox com) (1 replies)
Re: SSH host key fingerprint - through HTTPS 2014-09-02
Lukasz Biegaj (l biegaj netshock pl) (1 replies)
Re: SSH host key fingerprint - through HTTPS 2014-09-02
Jamie Riden (jamie riden gmail com)
Re: SSH host key fingerprint - through HTTPS 2014-09-01
Micha Borrmann (micha borrmann syss de) (1 replies)
Re: SSH host key fingerprint - through HTTPS 2014-09-02
John Leo (johnleo checkssh com)
[SECURITY] [DSA 2987-2] openjdk-7 regression update 2014-08-31
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2987-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
August 31, 2014

[ more ]  [ reply ]
CFP Deadline Approaching - Third International Conference on Informatics & Applications | Malaysia 2014-09-01
liezelle sdiwc info
All registered papers will be included in SDIWC Digital Library, and in
the proceedings of the conference.

The Third International Conference on Informatics & Applications
(ICIA2014)
October 8-10, 2014 - Kuala Terengganu, Malaysia | icia2014 (at) sdiwc (dot) net [email concealed]
http://sdiwc.net/conferences/2014/icia2014/

[ more ]  [ reply ]
WordPress Slideshow Gallery 1.4.6 Shell Upload Vulnerability (CVE-2014-5460) 2014-08-30
jesus ramirez pichardo gmail com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> I found a serious security vulnerability in the Slideshow Gallery
> plugin. This bug allows an attacker to upload any php file remotely to
> the vulnerable website (administrator by default).
>
> I have tested and verified that having the current vers

[ more ]  [ reply ]
WordPress Slideshow Gallery 1.4.6 Shell Upload Vulnerability (CVE-2014-5460) 2014-08-30
jesus ramirez pichardo gmail com
WordPress Slideshow Gallery plugin version 1.4.6 suffers from a remote shell upload vulnerability.

Vendor Homepage: http://tribulant.com/
Software: Slideshow Gallery
Version: 1.4.6
Software Link: http://downloads.wordpress.org/plugin/slideshow-gallery.1.4.6.zip
Tested on: Windows 7 OS, Wordpress 3.

[ more ]  [ reply ]
Re: Pro Chat Rooms v8.2.0 - Multiple Vulnerabilities 2014-08-29
sales prochatrooms com
Date: 12 Aug 2014

A software update for the Text Chat Room & Audio/Video Chat Room (v8.2.0) is now available to download in the Pro Chat Rooms customer area that addresses this security issue.

We would like to express our thanks to Mike Manzotti @ Dionach Ltd who assisted us with this update.

[ more ]  [ reply ]
Sierra Library Services Platform Multiple Vulnerability Disclosure 2014-08-28
Romano, Christian (cromano caanes com)
Product: Sierra Library Services Platform
Vendor: Innovative Interfaces Inc
Vulnerable Version: 1.2_3
Tested Version: 1.2_3
Vendor Notification: June 19, 2014
Public Disclosure: August 26, 2014
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: CVE-2014-5136
Risk Level: Medium
CVSSv2 B

[ more ]  [ reply ]
(Page 11 of 1563)  < Prev  6 7 8 9 10 11 12 13 14 15 16  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus