BugTraq Mode:
(Page 13 of 1686)  < Prev  8 9 10 11 12 13 14 15 16 17 18  Next >
[ERPSCAN-16-008] SAP NetWeaver AS JAVA - XSS vulnerability in ProxyServer servlet 2016-05-16
ERPScan inc (erpscan online gmail com)
Application: SAP NetWeaver AS JAVA

Versions Affected: SAP NetWeaver AS JAVA 7.4

Vendor URL: http://SAP.com

Bugs: Cross Site Scripting (XSS)

Sent: 10.08.2015

Reported: 10.08.2015

Vendor response: 11.08.2015

Date of Public Advisory: 09.02.2016

Reference: SAP Security Note 2220571

Author: Vah

[ more ]  [ reply ]
[ERPSCAN-16-009] SAP xMII - directory traversal vulnerability 2016-05-16
ERPScan inc (erpscan online gmail com)
Application: SAP xMII

Versions Affected: SAP MII 15.0

Vendor URL: http://SAP.com

Bugs: Directory traversal

Sent: 29.07.2015

Reported: 29.07.2015

Vendor response: 30.07.2015

Date of Public Advisory: 09.02.2016

Reference: SAP Security Note 2230978

Author: Dmitry Chastuhin (ERPScan)

Descr

[ more ]  [ reply ]
[SECURITY] [DSA 3579-1] xerces-c security update 2016-05-16
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3579-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
May 16, 2016

[ more ]  [ reply ]
[SECURITY] [DSA 3578-1] libidn security update 2016-05-14
Alessandro Ghedini (ghedo debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3578-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Alessandro Ghedini
May 14, 2016

[ more ]  [ reply ]
[SECURITY] [DSA 3577-1] jansson security update 2016-05-14
Alessandro Ghedini (ghedo debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3577-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Alessandro Ghedini
May 14, 2016

[ more ]  [ reply ]
dns_dhcp Web Interface SQL Injection 2016-05-14
hyp3rlinx lycos com
[+] Credits: hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/DNS_DHCP-WEB-INTERFACE-SQL-IN
JECTION.txt

[+] ISR: apparitionsec

Vendor:
====================
tmcdos / sourceforge

Product:
======================
dns_dhcp Web Interface

Down

[ more ]  [ reply ]
eXtplorer v2.1.9 Archive Path Traversal 2016-05-14
hyp3rlinx lycos com
[+] Credits: John Page aka hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/EXTPLORER-ARCHIVE-PATH-TRAVER
SAL.txt

[+] ISR: apparitionsec

Vendor:
==============
extplorer.net

Product:
==================
eXtplorer v2.1.9

eXtplorer is a PH

[ more ]  [ reply ]
[SECURITY] [DSA 3576-1] icedove security update 2016-05-13
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3576-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
May 13, 2016

[ more ]  [ reply ]
[security bulletin] HPSBMU03590 rev.1 - HPE Systems Insight Manager (SIM) on Windows and Linux, Multiple Vulnerabilities 2016-05-13
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05131085

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05131085
Version: 1

HPSBMU03590

[ more ]  [ reply ]
May 2016 - HipChat Server - Critical Security Advisory 2016-05-13
David Black (dblack atlassian com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Note: the current version of this advisory can be found at
https://confluence.atlassian.com/x/96hMMQ .

CVE IDs:
* CVE-2016-3714 - ImageMagick - Insufficient shell characters
filtering leads to (potentially * remote) code execution
* CVE-2016-3715 -

[ more ]  [ reply ]
[security bulletin] HPSBMU03589 rev.1 - HPE Version Control Repository Manager (VCRM), Remote Denial of Service (DoS) 2016-05-12
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05131044

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05131044
Version: 1

HPSBMU03589

[ more ]  [ reply ]
[security bulletin] HPSBMU03591 rev.1 - HPE Server Migration Pack, Remote Denial of Service (DoS) 2016-05-12
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05130958

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05130958
Version: 1

HPSBMU03591

[ more ]  [ reply ]
[SECURITY] [DSA 3575-1] libxstream-java security update 2016-05-12
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3575-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
May 12, 2016

[ more ]  [ reply ]
[security bulletin] HPSBGN03597 rev.1 - HPE Cloud Optimizer (Virtualization Performance Viewer) using glibc Remote Denial of Service (DoS) 2016-05-12
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05125672

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05125672
Version: 1

HPSBGN03597 r

[ more ]  [ reply ]
[slackware-security] mozilla-thunderbird (SSA:2016-132-01) 2016-05-12
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mozilla-thunderbird (SSA:2016-132-01)

New mozilla-thunderbird packages are available for Slackware 14.1 and -current
to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
p

[ more ]  [ reply ]
[security bulletin] HPSBST03599 rev.1 - HPE 3PAR OS running OpenSSH, Remote Denial of Service (DoS), Access Restriction Bypass 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05128992

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05128992
Version: 1

HPSBST03599 r

[ more ]  [ reply ]
[security bulletin] HPSBST03598 rev.1 - HPE 3PAR OS using glibc, Remote Denial of Service (DoS), Arbitrary Code Execution 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05128937

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05128937
Version: 1

HPSBST03598 r

[ more ]  [ reply ]
[security bulletin] HPSBST03586 rev.1 - HPE 3PAR OS, Remote Unauthorized Modification 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05128722

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05128722
Version: 1

HPSBST03586 r

[ more ]  [ reply ]
[security bulletin] HPSBNS03581 rev.2 - HPE NonStop Servers running Samba (NS-Samba), Multiple Remote Vulnerabilities 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05082964

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05082964
Version: 2

HPSBNS03581 r

[ more ]  [ reply ]
[security bulletin] HPSBHF03592 rev.1 - HPE VAN SDN Controller OVA using OpenSSL, Multiple Remote Vulnerabilities 2016-05-11
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05126404

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05126404
Version: 1

HPSBHF03592

[ more ]  [ reply ]
[SECURITY] [DSA 3565-2] monotone ovito pdns qtcreator softhsm regression update 2016-05-11
Sebastien Delafond (seb debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3565-2 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Sebastien Delafond
May 11, 2016

[ more ]  [ reply ]
BulletProof Security 53.3 - Security Advisory - Multiple XSS Vulnerabilities 2016-05-10
Onur Yilmaz (onur netsparker com)
Information
--------------------
Advisory by Netsparker
Name: Multiple XSS Vulnerabilities in BulletProof Security
Affected Software : BulletProof Security
Affected Versions: v53.3 and possibly below
Vendor Homepage : https://wordpress.org/plugins/bulletproof-security/
Vulnerability Type : Cross-sit

[ more ]  [ reply ]
[slackware-security] imagemagick (SSA:2016-132-01) 2016-05-11
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] imagemagick (SSA:2016-132-01)

New imagemagick packages are available for Slackware 14.0, 14.1, and -current
to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/pa

[ more ]  [ reply ]
[security bulletin] HPSBUX03574 rev.1 - HPE HP-UX CIFS-Server (Samba), Remote Access Restriction Bypass, Authentication bypass, Denial of Service (DoS), Unauthorized Access to Files, Access Restriction Bypass, Unauthorized Information Disclosure 2016-05-10
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05115993

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05115993
Version: 1

HPSBUX03574 r

[ more ]  [ reply ]
[security bulletin] HPSBUX03596 rev.1 - HPE HP-UX running CIFS Server (Samba), Remote Access Restriction Bypass, Unauthorized Access 2016-05-10
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05121842

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05121842
Version: 1

HPSBUX03596 r

[ more ]  [ reply ]
[SECURITY] [DSA 3574-1] libarchive security update 2016-05-10
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3574-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
May 10, 2016

[ more ]  [ reply ]
Intuit QuickBooks 2007 - 2016 Arbitrary Code Execution 2016-05-10
support thegrideon com
+ Credits: Maxim Tomashevich from Thegrideon Software
+ Website: https://www.thegrideon.com/
+ Details: https://www.thegrideon.com/qb-internals-sql.html

Vendor:
---------------------
www.intuit.com
www.intuit.ca
www.intuit.co.uk

Product:
---------------------
QuickBooks Desktop
versions: 2007 - 2

[ more ]  [ reply ]
Trend Micro Direct Pass - Filter Bypass & Cross Site Scripting Vulnerability 2016-05-10
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Trend Micro Direct Pass - Filter Bypass & Cross Site Scripting Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1716

Trend Micro Security ID: 1-1-1039900197

Release Date:
=============
2016-05-01

Vulner

[ more ]  [ reply ]
Stanford University - Multiple SQL Injection Vulnerabilities 2016-05-10
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Stanford University - Multiple SQL Injection Vulnerabilities

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1829

Release Date:
=============
2016-05-09

Vulnerability Laboratory ID (VL-ID):
==========================

[ more ]  [ reply ]
(Page 13 of 1686)  < Prev  8 9 10 11 12 13 14 15 16 17 18  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus