BugTraq Mode:
(Page 14 of 1552)  < Prev  9 10 11 12 13 14 15 16 17 18 19  Next >
[ MDVSA-2014:109 ] gnutls 2014-06-09
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:109
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:107 ] libtasn1 2014-06-09
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:107
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2014:106 ] openssl 2014-06-09
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:106
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
[SECURITY] [DSA 2954-1] dovecot security update 2014-06-09
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2954-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Salvatore Bonaccorso
June 09, 2014

[ more ]  [ reply ]
[ MDVSA-2014:105 ] openssl 2014-06-09
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:105
http://www.mandriva.com/en/support/security/
___________________________________________________________

[ more ]  [ reply ]
DNN (DotNetNuke®) dnnUI_NewsArticlesSlider Module Arbitrary File Download Vulnerability 2014-06-09
cseye_ut yahoo com
#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
# Title : DNN (DotNetNuke®) dnnUI_NewsArticlesSlider Module Arbitrary File Download Vulnerability
# Author : alieye
# vendor : http://www.dnnui.com/ , http://store.dnnsoftware.com/
# Contact : cseye_ut (at) yahoo (dot) com [email concealed]
# Risk : High
# Class: Remote

[ more ]  [ reply ]
DNN (DotNetNuke®) responsivesidebar Module Arbitrary File Download Vulnerability 2014-06-09
cseye_ut yahoo com
#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
# Title : DNN (DotNetNuke®) responsivesidebar Module Arbitrary File Download Vulnerability
# Author : alieye
# vendor : http://www.mediaant.com/ , http://store.dnnsoftware.com/
# Contact : cseye_ut (at) yahoo (dot) com [email concealed]
# Risk : High
# Class: Remote
# G

[ more ]  [ reply ]
DNN (DotNetNuke®) eventscalendar Module Arbitrary File Download Vulnerability 2014-06-09
cseye_ut yahoo com
#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
# Title : DNN (DotNetNuke®) eventscalendar Module Arbitrary File Download Vulnerability
# Author : alieye
# vendor : http://www.invenmanager.com/ , http://store.dnnsoftware.com/
# Contact : cseye_ut (at) yahoo (dot) com [email concealed]
# Risk : High
# Class: Remote
#

[ more ]  [ reply ]
DNN (DotNetNuke®) EasyDnnGallery Module Arbitrary File Download Vulnerability 2014-06-09
cseye_ut yahoo com
#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
# Title : DNN (DotNetNuke®) EasyDnnGallery Module Arbitrary File Download Vulnerability
# Author : alieye
# vendor : http://www.easydnnsolutions.com/ , http://store.dnnsoftware.com/
# Contact : cseye_ut (at) yahoo (dot) com [email concealed]
# Risk : High
# Class: Remot

[ more ]  [ reply ]
DNN (DotNetNuke®) CodeEditor Module Arbitrary File Download Vulnerability 2014-06-09
cseye_ut yahoo com
#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
# Title : DNN (DotNetNuke®) CodeEditor Module Arbitrary File Download Vulnerability
# Author : alieye
# vendor : http://www.mediaant.com/ , http://store.dnnsoftware.com/
# Contact : cseye_ut (at) yahoo (dot) com [email concealed]
# Risk : High
# Class: Remote
# Google D

[ more ]  [ reply ]
DNN (DotNetNuke®) ASPSlideshow Module Arbitrary File Download Vulnerability 2014-06-09
cseye_ut yahoo com
#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
# Title : DNN (DotNetNuke®) ASPSlideshow Module Arbitrary File Download Vulnerability
# Author : alieye
# vendor : http://www.mediaant.com/ , http://store.dnnsoftware.com/
# Contact : cseye_ut (at) yahoo (dot) com [email concealed]
# Risk : High
# Class: Remote
# Google

[ more ]  [ reply ]
[security bulletin] HPSBMU03024 rev.3 - HP Insight Control Server Deployment on Linux and Windows running OpenSSL with System Management Homepage and Systems Insight Manager, Remote Disclosure of Information 2014-06-09
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04267749

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04267749
Version: 3

HPSBMU03024 re

[ more ]  [ reply ]
[slackware-security] mozilla-firefox (SSA:2014-157-01) 2014-06-07
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mozilla-firefox (SSA:2014-157-01)

New mozilla-firefox packages are available for Slackware 14.1 to fix
security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/mozil

[ more ]  [ reply ]
[SECURITY] [DSA 2953-1] dpkg security update 2014-06-08
Raphael Geissert (geissert debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2953-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Raphael Geissert
June 08, 2014

[ more ]  [ reply ]
CVE-2014-3740 - SpiceWorks Cross-site scripting 2014-06-07
Dolev Farhi (dolev openflare org)
Exploit Title: Multiple Stored XSS vulnerabilities in SpiceWorks
Ticketing system
CVE: CVE-2014-3740
Vendor: SpiceWorks
Product: SpiceWorks IT ticketing system
Affected versions: any version below 7.2.00195
Fixed version: 7.2.00195

1. About the application:
=======================
SpiceWorks is

[ more ]  [ reply ]
NeginGroup CMS Multiple Vulnerability 2014-06-07
iedb team gmail com
Sql Injection And Xss Vulnerability In NeginGroup Cms

#################################
#
# @@@ @@@@@@@@@@@ @@@@@ @@@@@@@@@@ @@@ @@@@@@@
# @@@ @@@@@@@@@@@ @@@ @@ @@@ @@ @@@ @@@@@@@@
# @@@ @@@ @@@ @@ @@@

[ more ]  [ reply ]
[Onapsis Security Advisories] Multiple Hard-coded Usernames in SAP Components 2014-06-06
Onapsis Research Labs (research onapsis com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Onapsis Security Advisories:Multiple Hard-coded Usernames (CWE-798) have
been found and patched in a variety of SAP components.
Summaries of the advisories with links to full versions follow:

1. ONAPSIS-2014-011-SAP Project System Structures and Projec

[ more ]  [ reply ]
[Onapsis Security Advisory 2014-020] SAP SLD Information Tampering 2014-06-06
Onapsis Research Labs (research onapsis com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Onapsis Security Advisory 2014-020: SAP SLD Information Tampering

1. Impact on Business
=====================
By exploiting this vulnerability, a
remote unauthenticated attacker might be able to
modify technical information about the SAP systems poten

[ more ]  [ reply ]
[slackware-security] openssl (SSA:2014-156-03) 2014-06-06
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] openssl (SSA:2014-156-03)

New openssl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+

[ more ]  [ reply ]
[slackware-security] sendmail (SSA:2014-156-04) 2014-06-06
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] sendmail (SSA:2014-156-04)

New sendmail packages are available for Slackware 13.0, 13.1, 13.37, 14.0,
14.1, and -current to fix a security issue.

Here are the details from the Slackware 14.1 ChangeLog:
+------------------------

[ more ]  [ reply ]
SEC Consult SA-20140606-0 :: Multiple critical vulnerabilities in WebTitan 2014-06-06
SEC Consult Vulnerability Lab (research sec-consult com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SEC Consult Vulnerability Lab Security Advisory < 20140606-0 >
=======================================================================
title: Multiple critical vulnerabilities
product: WebTitan
vulnerable version: 4.01 (Build

[ more ]  [ reply ]
[slackware-security] gnutls (SSA:2014-156-01) 2014-06-06
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] gnutls (SSA:2014-156-01)

New gnutls packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
p

[ more ]  [ reply ]
[slackware-security] libtasn1 (SSA:2014-156-02) 2014-06-06
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] libtasn1 (SSA:2014-156-02)

New libtasn1 packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages

[ more ]  [ reply ]
[SECURITY] [DSA 2952-1] kfreebsd-9 security update 2014-06-06
Nico Golde (nion debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2952-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Nico Golde
June 05, 2014

[ more ]  [ reply ]
Cisco Security Advisory: Multiple Vulnerabilities in OpenSSL Affecting Cisco Products 2014-06-05
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Multiple Vulnerabilities in OpenSSL Affecting Cisco Products

Advisory ID: cisco-sa-20140605-openssl

Revision 1.0

For Public Release 2014 June 5 22:00 UTC (GMT)

Summary
=======

Multiple Cisco products incorporate a version of the OpenSSL package af

[ more ]  [ reply ]
[SECURITY] [DSA 2951-1] mupdf security update 2014-06-05
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2951-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
June 05, 2014

[ more ]  [ reply ]
[security bulletin] HPSBMU03029 rev.2 - HP Insight Control Server Migration running OpenSSL, Remote Disclosure of Information 2014-06-05
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04268240

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04268240
Version: 2

HPSBMU03029 re

[ more ]  [ reply ]
Details for CVE-2014-0220 2014-06-05
tucu cloudera com
------------------------------------------------------------------------
------------------
Technical Service Bulletin 2014-28 (TSB)

Title: Security Vulnerability: Sensitive Configuration Values Exposed in
Cloudera Manager
Certain configuration values that are stored in Cloudera Manager are
consider

[ more ]  [ reply ]
(Page 14 of 1552)  < Prev  9 10 11 12 13 14 15 16 17 18 19  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus