BugTraq Mode:
(Page 10 of 525)  < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >
[slackware-security] Slackware 14.0 kernel (SSA:2017-184-01) 2017-07-03
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] Slackware 14.0 kernel (SSA:2017-184-01)

New kernel packages are available for Slackware 14.0 to fix security issues.

Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/linux-3.

[ more ]  [ reply ]
[SECURITY] [DSA 3901-1] libgcrypt20 security update 2017-07-02
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3901-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
July 02, 2017

[ more ]  [ reply ]
[CVE-2017-9313] Webmin 1.840 Multiple XSS Vulnerabilities 2017-07-02
andys3c gmail com
Vulnerability type: Reflected Cross Site Scripting
------------------------
Product: Webmin
------------------------
Affected version: Webmin 1.840 and possibly
earlier
------------------------
Patched version: Webmin 1.850
------------------------
Credit: Andy Tan
------------------------
CVE ID:

[ more ]  [ reply ]
InsomniaX loader allows loading of arbitrary Kernel Extensions 2017-07-02
Securify B.V. (lists securify nl)
------------------------------------------------------------------------

InsomniaX loader allows loading of arbitrary Kernel Extensions
------------------------------------------------------------------------

Yorick Koster, April 2017

----------------------------------------------------------------

[ more ]  [ reply ]
[slackware-security] glibc (SSA:2017-181-01) 2017-06-30
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] glibc (SSA:2017-181-01)

New glibc packages are available for Slackware 14.2 and -current to
fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/glibc-2.23-i

[ more ]  [ reply ]
[slackware-security] kernel (SSA:2017-181-02) 2017-06-30
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] kernel (SSA:2017-181-02)

New kernel packages are available for Slackware 14.2 and -current to
fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/linux-4.4.

[ more ]  [ reply ]
Microsoft Dynamic CRM 2016 - Cross-Site Scripting vulnerability 2017-06-30
gregory draperi (gregory draperi gmail com)
Hello Everyone,

Product: MS Dynamic CRM 2016
Vendor: Microsoft

Vulnerability type: Cross Site Scripting
Vulnerable version: MS Dynamic CRM 2016 SP1 and previous
Vulnerable component: SyncFilterPage.aspx
Report confidence: Confirmed
Solution status: Not fixed by Vendor, will not patch the vuln.
Fix

[ more ]  [ reply ]
SEC Consult SA-20170630-0 :: Multiple critical vulnerabilities in OSCI-Transport library 1.2 for German e-Government 2017-06-30
SEC Consult Vulnerability Lab (research sec-consult com)
We have published an accompanying blog post to this technical advisory with
further information:
German version with less technical details as an overview:
http://blog.sec-consult.com/2017/06/e-government-in-deutschland-schwachs
tellen.html

English version containing more detailed attack scenario de

[ more ]  [ reply ]
ESA-2017-062: VASA Provider Virtual Appliance Remote Code Execution Vulnerability 2017-06-28
EMC Product Security Response Center (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

ESA-2017-062: VASA Provider Virtual Appliance Remote Code Execution Vulnerability

EMC Identifier: ESA-2017-062

CVE Identifier: CVE-2017-4997

Severity Rating: CVSS v3 Base Score: 8.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L)

Affected products:

[ more ]  [ reply ]
[SECURITY] [DSA 3900-1] openvpn security update 2017-06-27
Sebastien Delafond (seb untangle com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3900-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Sebastien Delafond
June 27, 2017

[ more ]  [ reply ]
[SECURITY] [DSA 3886-2] linux regression update 2017-06-27
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3886-2 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 27, 2017

[ more ]  [ reply ]
[SECURITY] [DSA 3899-1] vlc security update 2017-06-27
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3899-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 27, 2017

[ more ]  [ reply ]
[slackware-security] kernel (SSA:2017-177-01) 2017-06-26
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] kernel (SSA:2017-177-01)

New kernel packages are available for Slackware 14.2 and -current to
fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/linux-4.4.

[ more ]  [ reply ]
[CVE-2017-8831] Double-Fetch Vulnerability in Linux-4.10.1/drivers/media/pci/saa7164/saa7164-bus.c 2017-06-26
wpengfeinudt gmail com
Hi all,

I found this double-fetch vulnerability when I was doing my research on double fetch issue analysis, and I?d like to make an announcement here.

This was found in Linux kernel file Linux-4.10.1/drivers/media/pci/saa7164/saa7164-bus.c. The kernel (driver) use memcpy_fromio() to fetch twice

[ more ]  [ reply ]
DefenseCode Security Advisory: IBM DB2 Command Line Processor Buffer Overflow 2017-06-26
DefenseCode (defensecode defensecode com)

DefenseCode Security Advisory
IBM DB2 Command Line Processor Buffer Overflow

Advisory ID: DC-2017-04-002
Advisory Title: IBM DB2 Command Line Processor Buffer Overflow
Advisory URL:
http://www.defensecode.com/advisories/IBM_DB2_Command_Line_Processor_Buf
fer_Overflow.pdf
Software: I

[ more ]  [ reply ]
Microsoft Skype v7.2, v7.35 & v7.36 - Stack Buffer Overflow Vulnerability 2017-06-26
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Microsoft Skype v7.2, v7.35 & v7.36 - Stack Buffer Overflow Vulnerability

References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2071

MSRC ID: 38778
TRK ID: 0461000724

Vulnerability Magazine: https://www.vulnerability-db.co

[ more ]  [ reply ]
[CVE-2017-8831] Double-Fetch Vulnerability in Linux-4.10.1/drivers/media/pci/saa7164/saa7164-bus.c 2017-06-24
wpengfeinudt gmail com
Hi all,

I found this double-fetch vulnerability when I was doing my research on double fetch issue analysis, and I?d like to make an announcement here.

This was found in Linux kernel file Linux-4.10.1/drivers/media/pci/saa7164/saa7164-bus.c. The kernel (driver) use memcpy_fromio() to fetch twice

[ more ]  [ reply ]
[CVE-2017-8813] Double-Fetch Vulnerability in Linux-4.10.1/drivers/media/pci/saa7164/saa7164-bus.c 2017-06-22
wpengfeinudt gmail com
Hi all,

I found this double-fetch vulnerability when I was doing my research on double fetch issue analysis, and I’?d like to make an announcement here.

This was found in Linux kernel file Linux-4.10.1/drivers/media/pci/saa7164/saa7164-bus.c. The kernel (driver) use memcpy_fromio() to fetch

[ more ]  [ reply ]
[SECURITY] [DSA 3893-1] jython security update 2017-06-22
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3893-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 22, 2017

[ more ]  [ reply ]
[slackware-security] openvpn (SSA:2017-172-01) 2017-06-21
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] openvpn (SSA:2017-172-01)

New openvpn packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+---------------------

[ more ]  [ reply ]
Sitecore 7.1-7.2 Cross Site Scripting Vulnerability 2017-06-21
hamedizadi gmail com
Sitecore 7.1-7.2 Cross Site Scripting Vulnerability

Information
--------------------
Author: Hamed Izadi
Email: ("hamedizadi", "@", "gmail", ".com");
Name: XSS Vulnerability in Sitecore
Affected Software : Sitecore.NET
Affected Versions: v7.2-7.1 and possibly below
Vendor Homepage : http://www.sit

[ more ]  [ reply ]
[SECURITY] [DSA 3890-1] spip security update 2017-06-21
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3890-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 21, 2017

[ more ]  [ reply ]
ESA-2017-053: EMC Isilon OneFS Privilege Escalation Vulnerability 2017-06-20
EMC Product Security Response Center (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

ESA-2017-053: EMC Isilon OneFS Privilege Escalation Vulnerability

EMC Identifier: ESA-2017-053

CVE Identifier: CVE-2017-4988

Severity Rating: CVSS v3 Base Score:

Base Score=> 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)

Affected pro

[ more ]  [ reply ]
ESA-2017-054: EMC Avamar Multiple Vulnerabilities 2017-06-20
EMC Product Security Response Center (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

ESA-2017-054: EMC Avamar Multiple Vulnerabilities

EMC Identifier: ESA-2017-054

CVE Identifiers:

CVE-2017-4989, CVE-2017-4990

Affected products:

? EMC Avamar Server Software 7.4.1-58, 7.4.0-242 (CVE-2017-4990)

? EMC Avamar Server Softwar

[ more ]  [ reply ]
CVE-2017-3167: Apache httpd 2.x ap_get_basic_auth_pw authentication bypass 2017-06-19
Jacob Champion (jchampion apache org)
CVE-2017-3167: ap_get_basic_auth_pw authentication bypass

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
httpd 2.2.0 to 2.2.32
httpd 2.4.0 to 2.4.25

Description:
Use of the ap_get_basic_auth_pw() by third-party modules outside of the
authentication phase may lead t

[ more ]  [ reply ]
CVE-2017-7659: mod_http2 null pointer dereference 2017-06-19
Jim Jagielski (jim apache org)
CVE-2017-7659: mod_http2 null pointer dereference

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
httpd 2.4.24 (unreleased)
httpd 2.4.25

Description:
A maliciously constructed HTTP/2 request could cause mod_http2 to
dereference a NULL pointer and crash the server p

[ more ]  [ reply ]
[SECURITY] [DSA 3886-1] linux security update 2017-06-19
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3886-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 19, 2017

[ more ]  [ reply ]
[SECURITY] [DSA 3887-1] glibc security update 2017-06-19
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3887-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
June 19, 2017

[ more ]  [ reply ]
[security bulletin] HPESBGN03758 rev.2 - HPE UCMDB, Remote Code Execution 2017-06-19
HPE Product Security Response Team (security-alert hpe com)
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn
03758en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03758en_us

Version: 2

[ more ]  [ reply ]
Ektron Version 9.10SP1(Build 9.1.0.184) Cross Site Scripting 2017-06-19
ghasseminia gmail com
# Vulnerability type: Cross Site Scripting
# Vendor: Ektron
# Product: Ektron Content Management System
# Affected version: 9.10SP1(Build 9.1.0.184)
# Patched version: 9.1.0.184SP3(9.1.0.184.3.127)
# Credit: Siyavash Ghasseminia
# CVE ID: CVE-2016-6201

# PROOF OF CONCEPT

Vulnerable URL:
/WorkAre

[ more ]  [ reply ]
Ektron Version 9.10SP1(Build 9.1.0.184) Cross Site Scripting 2017-06-19
ghasseminia gmail com
# Vulnerability type: Cross Site Scripting
# Vendor: Ektron
# Product: Ektron Content Management System
# Affected version: 9.10SP1(Build 9.1.0.184)
# Patched version: 9.1.0.184SP3(9.1.0.184.3.127)
# Credit: Siyavash Ghasseminia
# CVE ID: CVE-2016-6133

# PROOF OF CONCEPT

Vulnerable URL:
/WorkArea

[ more ]  [ reply ]
Ektron Version 9.10SP1(Build 9.1.0.184) Cross Site Scripting 2017-06-19
ghasseminia gmail com
# Vulnerability type: Cross Site Scripting
# Vendor: Ektron
# Product: Ektron Content Management System
# Affected version: 9.10SP1(Build 9.1.0.184)
# Patched version: 9.1.0.184SP3(9.1.0.184.3.127)
# Credit: Siyavash Ghasseminia, Edmund Goh
# CVE ID: CVE-2016-6133

# PROOF OF CONCEPT

Vulnerable U

[ more ]  [ reply ]
ESA-2017-041: EMC VNX1 and VNX2 Family Multiple Vulnerabilities in VNX Control Station 2017-06-16
EMC Product Security Response Center (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

ESA-2017-041: EMC VNX1 and VNX2 Family Multiple Vulnerabilities in VNX Control Station

EMC Identifier: ESA-2017-041

CVE Identifier: CVE-2017-4984, CVE-2017-4985, CVE-2017-4987

Severity Rating: CVSS v3 Base Score: See below for individual CV

[ more ]  [ reply ]
June 2017 - Bamboo - Critical Security Advisory 2017-06-16
Atlassian (security atlassian com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

This email refers to the advisory found at
https://confluence.atlassian.com/x/KgwUNg .

CVE ID:

* CVE-2017-8907.

Product: Bamboo.

Affected Bamboo product versions:

5.0.0 <= version < 5.15.7
6.0.0 <= version < 6.0.1

Fixed Bamboo product version

[ more ]  [ reply ]
[security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege 2017-06-15
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn
03761en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03761en_us

Version: 1

HP

[ more ]  [ reply ]
[SECURITY] [DSA 3882-1] request-tracker4 security update 2017-06-15
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3882-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 15, 2017

[ more ]  [ reply ]
CVE-2017-9613: Stored Cross-Site Scripting in SAP successfactors 2017-06-15
dunstan pinto gmail com
CVE-2017-9613: Stored Cross-Site Scripting in SAP successfactors

Severity: High

Vendor: SAP

Versions Affected: SAP successfactors - Release build b1702p5e.1190658

Description: Stored Cross-site scripting (XSS) vulnerability in SAP Successfactors allows remote authenticated users to inject arbitr

[ more ]  [ reply ]
[slackware-security] mozilla-firefox (SSA:2017-165-02) 2017-06-15
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mozilla-firefox (SSA:2017-165-02)

New mozilla-firefox packages are available for Slackware 14.2, and -current to
fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/

[ more ]  [ reply ]
[slackware-security] bind (SSA:2017-165-01) 2017-06-15
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] bind (SSA:2017-165-01)

New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------

[ more ]  [ reply ]
[SECURITY] [DSA 3881-1] firefox-esr security update 2017-06-14
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3881-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
June 14, 2017

[ more ]  [ reply ]
ESA-2017-043: EMC ESRS Virtual Edition Authentication Bypass Vulnerability 2017-06-14
EMC Product Security Response Center (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

ESA-2017-043: EMC ESRS Virtual Edition Authentication Bypass Vulnerability

EMC Identifier: ESA-2017-043

CVE Identifier: CVE-2017-4986

Severity Rating: CVSS v3 Base Score: See below for individual scores of each CVE

Affected products:

E

[ more ]  [ reply ]
ESA-2017-031: RSA BSAFE® Cert-C Improper Certificate Processing Vulnerability 2017-06-14
EMC Product Security Response Center (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

ESA-2017-031: RSA BSAFE® Cert-C Improper Certificate Processing Vulnerability

EMC Identifier: ESA-2017-031

CVE Identifier: CVE-2017-4981

Severity Rating: 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)

Affected Products:

RSA BS

[ more ]  [ reply ]
[SECURITY] [DSA 3880-1] libgcrypt20 security update 2017-06-14
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3880-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 14, 2017

[ more ]  [ reply ]
Secunia Research: libsndfile "aiff_read_chanmap()" Information Disclosure Vulnerability 2017-06-13
Secunia Research (remove-vuln secunia com)
======================================================================

Secunia Research 2017/06/09

libsndfile "aiff_read_chanmap()" Information Disclosure Vulnerability

==========================================================

[ more ]  [ reply ]
SEC Consult SA-20170613-0 :: Access Restriction Bypass in Atlassian Confluence 2017-06-13
SEC Consult Vulnerability Lab (research sec-consult com)
SEC Consult Vulnerability Lab Security Advisory < 20170613-0 >
=======================================================================
title: Access Restriction Bypass
product: Atlassian Confluence
vulnerable version: 4.3.0 - 6.1.1
fixed version: 6.2.1
CVE n

[ more ]  [ reply ]
Zenbership 1.0.8 CMS - Multiple SQL Injection Vulnerabilities 2017-06-12
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Zenbership 1.0.8 CMS - Multiple SQL Injection Vulnerabilities

References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2073

Release Date:
=============
2017-06-09

Vulnerability Laboratory ID (VL-ID):
========================

[ more ]  [ reply ]
Evolution Script CMS v5.3 - Cross Site Scripting Vulnerability 2017-06-12
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Evolution Script CMS v5.3 - Cross Site Scripting Vulnerability

References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2075

Release Date:
=============
2017-06-07

Vulnerability Laboratory ID (VL-ID):
=======================

[ more ]  [ reply ]
[SECURITY] [DSA 3877-1] tor security update 2017-06-10
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3877-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 10, 2017

[ more ]  [ reply ]
[security bulletin] HPESBHF03730 rev.2 - HPE Aruba ClearPass Policy Manager, Multiple Vulnerabilities 2017-06-09
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf
03730en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03730en_us

Version: 2

HP

[ more ]  [ reply ]
[SECURITY] [DSA 3876-1] otrs2 security update 2017-06-09
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3876-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
June 09, 2017

[ more ]  [ reply ]
[SECURITY] [DSA 3875-1] libmwaw security update 2017-06-09
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3875-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
June 09, 2017

[ more ]  [ reply ]
[security bulletin] HPESBUX03759 rev.1 - HP-UX CIFS Sever using Samba, Multiple Remote Vulnerabilities 2017-06-09
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux
03759en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbux03759en_us

Version: 1

HP

[ more ]  [ reply ]
[security bulletin] HPESBUX03747 rev.1 - HP-UX running BIND, Remote Denial of Service 2017-06-08
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbux
03747en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbux03747en_us

Version: 1

HP

[ more ]  [ reply ]
ESA-2017-064: RSA Identity Governance and Lifecycle Multiple Vulnerabilities 2017-06-08
EMC Product Security Response Center (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

EMC Identifier: EMC-2017-064

CVE Identifier: CVE-2017-5003, CVE-2017-5004

Severity Rating: CVSS v3 Base Score: Please view details below for individual CVE scores.

Affected Products:

?RSA Identity Governance and Lifecycle

[ more ]  [ reply ]
[SYSS-2017-018] OTRS - Access to Installation Dialog 2017-06-08
sebastian auwaerter syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2017-018
Product: OTRS
Manufacturer: OTRS
Affected Version(s): OTRS 5.0.x, OTRS 4.0.x, OTRS 3.3.x
Fixed Version(s): OTRS 5.0.20, OTRS 4.0.24, OTRS 3.3.17
Tested Version(s): 5.0.19
Vulnerability Type: Access to Installation Dialog
Ris

[ more ]  [ reply ]
[security bulletin] HPESBGN03758 rev.1 - HPE UCMDB, Remote Code Execution 2017-06-07
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn
03758en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03758en_us

Version: 1

HP

[ more ]  [ reply ]
CVE update - fixed in Apache Ranger 0.7.1 2017-06-07
Velmurugan Periasamy (vel apache org)
Hello:

Please find below details on CVEs fixed in Ranger 0.7.1 release. Release details can be found at https://cwiki.apache.org/confluence/display/RANGER/0.7.1+Release+-+Apach
e+Ranger

------------------------------------------------------------------------
----------------------------------------

[ more ]  [ reply ]
[security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS) 2017-06-07
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf
03757en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03757en_us

Version: 1

HP

[ more ]  [ reply ]
Xavier v2.4 PHP MP - SQL Injection Web Vulnerabilities 2017-06-07
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
Xavier v2.4 PHP MP - SQL Injection Web Vulnerabilities

References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2076

Release Date:
=============
2017-06-06

Vulnerability Laboratory ID (VL-ID):
===============================

[ more ]  [ reply ]
Sophos Cyberoam Cross-site scripting (XSS) vulnerability 2017-06-06
bhdresh gmail com
Title:
====

Sophos Cyberoam ? Cross-site scripting (XSS) vulnerability

Credit:
======

Name: Bhadresh Patel

Date:
====

25/05/2017 (dd/mm/yyyy)

Vendor:
======

More than 100 million users in 150 countries rely on Sophos to offer end-to-end protection against complex threats and data loss. Sopho

[ more ]  [ reply ]
[security bulletin] HPESBGN03752 rev.1 - HPE IceWall using OpenSSL, remote Denial of Service (DoS) 2017-06-05
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn
03752en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03752en_us

Version: 1

HP

[ more ]  [ reply ]
[security bulletin] HPESBHF03756 rev.1 - HPE Network Products including Comware 7, iMC, and VCX running OpenSSL, Remote Denial of Service (DoS), Disclosure of Sensitive Information 2017-06-05
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf
03756en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03756en_us

Version: 1

HP

[ more ]  [ reply ]
X41-2017-005 - Multiple Vulnerabilities in peplink balance routers 2017-06-05
X41 D-Sec GmbH Advisories (advisories x41-dsec de)

X41 D-Sec GmbH Security Advisory: X41-2017-005

Multiple Vulnerabilities in peplink balance routers
===================================================

Overview
--------
Confirmed Affected Versions: 7.0.0-build1904
Confirmed Patched Versions:
fw-b305hw2_380hw6_580hw2_710hw3_1350hw2_2500-7.0.1-buil

[ more ]  [ reply ]
[SECURITY] [DSA 3873-1] perl security update 2017-06-05
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3873-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
June 05, 2017

[ more ]  [ reply ]
[SECURITY] [DSA 3870-1] wordpress security update 2017-06-01
Sebastien Delafond (seb debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3870-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Sebastien Delafond
June 01, 2017

[ more ]  [ reply ]
[SECURITY] [DSA 3869-1] tnef security update 2017-06-01
Sebastien Delafond (seb debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3869-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Sebastien Delafond
June 01, 2017

[ more ]  [ reply ]
[CVE-2017-5688] Executable installers are vulnerable^WEVIL (case 52): Intel installation framework allows arbitrary code execution with escalation of privilege 2017-05-31
Stefan Kanthak (stefan kanthak nexgo de)
Hi @ll,

executable installers built with Intels Installation Framework,
for example "Intel SSD Toolbox - v3.4.3.exe", available from
<https://downloadcenter.intel.com/download/26574>, expose two
vulnerabilities, both resulting in arbitrary code execution
with escalation of privilege.

Vulnerability

[ more ]  [ reply ]
DefenseCode ThunderScan SAST Advisory: WordPress Simple Slideshow Manager Plugin Multiple Security Vulnerabilities 2017-05-30
DefenseCode (defensecode defensecode com)

DefenseCode ThunderScan SAST Advisory
WordPress Simple Slideshow Manager Plugin
Multiple Security Vulnerabilities

Advisory ID: DC-2017-02-016
Advisory Title: WordPress Simple Slideshow Manager Plugin Multiple
Vulnerabilities
Advisory URL: http://www.defensecode.c

[ more ]  [ reply ]
[SECURITY] [DSA 3867-1] sudo security update 2017-05-30
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3867-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
May 30, 2017

[ more ]  [ reply ]
[SECURITY] [DSA 3866-1] strongswan security update 2017-05-30
Yves-Alexis Perez (corsac debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3866-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Yves-Alexis Perez
May 30, 2017

[ more ]  [ reply ]
[SECURITY] [DSA 3865-1] mosquitto security update 2017-05-29
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3865-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
May 29, 2017

[ more ]  [ reply ]
Multiple Local Privilege Escalation Vulnerabilities in Acunetix Web Vulnerability Scanner 11 2017-05-28
Florian Bogner (florian bogner sh)
Multiple Local Privilege Escalation Vulnerabilities in Acunetix Web Vulnerability Scanner 11

Metadata
========================================================================
=======
Release Date: 28-May-2017
Author: Florian Bogner @ https://bogner.sh
Affected product: Acunetix Web Vulnerability Sca

[ more ]  [ reply ]
Wordpress Plugin Social-Stream - Exposure of Twitter API Secret Key and Token 2017-05-26
kyle Lovett (krlovett gmail com)
Wordpress Plugin Social-Stream - Exposure of Twitter API Secret Keys
CWE-522 :Insufficiently Protected Credentials

Products:
Wordpress Social Stream
Versions 1.6.0 and lower
https://codecanyon.net/item/wordpress-social-stream/2201708

Social Network Tabs
Versions 1.7.4 and lower
https://codecanyon.

[ more ]  [ reply ]
[security bulletin] HPESBHF03730 rev.1 - HPE Aruba ClearPass Policy Manager, Multiple Vulnerabilities 2017-05-26
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf
03730en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03730en_us

Version: 1

HP

[ more ]  [ reply ]
[security bulletin] HPESBHF03754 rev.1 - HPE ML10 Gen 9 Server using Intel Xeon E3-1200 v5 Processor, Remote Access Restriction Bypass 2017-05-26
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf
03754en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03754en_us

Version: 1

HP

[ more ]  [ reply ]
[security bulletin] HPESBHF03750 rev.1 - HPE Network Products including Comware 5, Comware 7 and VCX running NTP, Remote Denial of Service (DoS), Unauthorized Modification, Local Denial of Service (DoS) 2017-05-25
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf
03750en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03750en_us

Version: 1

HP

[ more ]  [ reply ]
[SECURITY] [DSA 3863-1] imagemagick security update 2017-05-25
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3863-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
May 25, 2017

[ more ]  [ reply ]
[security bulletin] HPESBHF03746 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution 2017-05-25
HPE Product Security Response Team (security-alert hpe com)
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf
03746en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03746en_us

Version: 1

[ more ]  [ reply ]
WebKitGTK+ Security Advisory WSA-2017-0004 2017-05-25
Carlos Alberto Lopez Perez (clopez igalia com)
------------------------------------------------------------------------

WebKitGTK+ Security Advisory WSA-2017-0004
------------------------------------------------------------------------

Date reported : May 25, 2017
Advisory ID : WSA-2017-0004
Advisory UR

[ more ]  [ reply ]
[slackware-security] samba (SSA:2017-144-01) 2017-05-24
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] samba (SSA:2017-144-01)

New samba packages are available for Slackware 13.1, 13.37, 14.0, 14.1, 14.2,
and -current to fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
pa

[ more ]  [ reply ]
[security bulletin] HPESBHF03751 rev.1 - HPE Aruba AirWave Glass, Remote Code Execution 2017-05-24
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf
03751en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03751en_us

Version: 1

HP

[ more ]  [ reply ]
DefenseCode ThunderScan SAST Advisory: WordPress AffiliateWP Plugin Security Vulnerability 2017-05-24
DefenseCode (defensecode defensecode com)

DefenseCode ThunderScan SAST Advisory
WordPress AffiliateWP Plugin
Security Vulnerability

Advisory ID: DC-2017-05-05
Advisory Title: WordPress AffiliateWP Plugin Security Vulnerability
Advisory URL: http://www.defensecode.com/advisories.php

[ more ]  [ reply ]
DefenseCode ThunderScan SAST Advisory: WordPress Huge-IT Video Gallery Plugin Security Vulnerability 2017-05-24
DefenseCode (defensecode defensecode com)

DefenseCode ThunderScan SAST Advisory
WordPress Huge-IT Video Gallery Plugin
Security Vulnerability

Advisory ID: DC-2017-01-009
Advisory Title: WordPress Huge-IT Video Gallery plugin SQL injection
vulnerability
Advisory URL: http://www.defensecode

[ more ]  [ reply ]
DefenseCode ThunderScan SAST Advisory: WordPress All In One Schema.org Rich Snippets Plugin Security Vulnerability 2017-05-24
DefenseCode (defensecode defensecode com)

DefenseCode ThunderScan SAST Advisory
WordPress All In One Schema.org Rich Snippets Plugin
Security Vulnerability

Advisory ID: DC-2017-01-002
Advisory Title: WordPress All In One Schema.org Rich Snippets Plugin
Security Vulnerability
Advis

[ more ]  [ reply ]
[SECURITY] [DSA 3861-1] libtasn1-6 security update 2017-05-24
Sebastien Delafond (seb debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3861-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Sebastien Delafond
May 24, 2017

[ more ]  [ reply ]
Secunia Research: Microsoft Windows Heap-based Buffer Overflow Vulnerabilities 2017-05-23
Secunia Research (remove-vuln secunia com)
======================================================================

Secunia Research 2016/05/22

Microsoft Windows Heap-based Buffer Overflow Vulnerabilities

======================================================================

Table of Contents

Affected Soft

[ more ]  [ reply ]
HPESBHF03744 rev.1 - HPE Intelligent Management Center (iMC) PLAT running OpenSSL, Remote Denial of Service (DoS) 2017-05-22
HPE Product Security Response Team (security-alert hpe com)
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf
03744en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03744en_us

Version: 1

[ more ]  [ reply ]
CVE-2017-9024 Secure Auditor - v3.0 Directory Traversal 2017-05-22
apparitionsec gmail com (hyp3rlinx)
[+] Credits: John Page aka HYP3RLINX
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/SECURE-AUDITOR-v3.0-DIRECTORY
-TRAVERSAL.txt
[+] ISR: ApparitionSec

Vendor:
====================
www.secure-bytes.com

Product:
=====================
S

[ more ]  [ reply ]
CVE-2017-9046 Pegasus "winpm-32.exe" v4.72 Mailto: Link Remote Code Execution 2017-05-22
apparitionsec gmail com (hyp3rlinx)
[+] Credits: John Page AKA hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/PEGASUS-MAILTO-LINK-REMOTE-CO
DE-EXECUTION.txt
[+] ISR: APPARITIONSEC

Vendor:
=============
www.pmail.com

Product:
===========================
Pegasus

[ more ]  [ reply ]
CVE-2017-9046 Mantis Bug Tracker 1.3.10 / v2.3.0 CSRF Permalink Injection 2017-05-22
apparitionsec gmail com (hyp3rlinx)
[+] Credits: John Page a.k.a hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMA
LINK-INJECTION.txt
[+] ISR: ApparitionSec

Vendor:
================
www.mantisbt.org

Product:
=========
Mantis Bug Trac

[ more ]  [ reply ]
May 2017 - SourceTree - Critical Security Advisory 2017-05-22
Atlassian (security atlassian com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

This email refers to the advisory found at
https://confluence.atlassian.com/x/jW2xNQ .

CVE ID:

* CVE-2017-8768.

Product: SourceTree.

Affected SourceTree product versions:

* SourceTree for Mac 1.4.0 <= version < 2.5.1
* SourceTree for Windows 0.8

[ more ]  [ reply ]
CVE-2017-9024 Secure Auditor - v3.0 Directory Traversal 2017-05-20
apparitionsec gmail com (hyp3rlinx)
[+] Credits: John Page aka HYP3RLINX
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/SECURE-AUDITOR-v3.0-DIRECTORY
-TRAVERSAL.txt
[+] ISR: ApparitionSec

Vendor:
====================
www.secure-bytes.com

Product:
=====================
S

[ more ]  [ reply ]
[SECURITY] [DSA 3858-1] openjdk-7 security update 2017-05-19
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3858-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
May 19, 2017

[ more ]  [ reply ]
[SECURITY] CVE-2017-5657: Apache Archiva CSRF vulnerability for REST endpoints 2017-05-19
Martin (martin_s apache org)
CVE-2017-5657: Apache Archiva CSRF vulnerabilities for various REST endpoints

Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Archiva 2.0.0 - 2.2.1
The unsupported versions 1.x are also affected.

Several REST service endpoints of Apache Archiva are not pro

[ more ]  [ reply ]
[SECURITY] [DSA 3853-1] bitlbee security update 2017-05-15
Sebastien Delafond (seb untangle com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3853-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Sebastien Delafond
May 15, 2017

[ more ]  [ reply ]
Secunia Research: LibRaw "parse_tiff_ifd()" Memory Corruption Vulnerability 2017-05-15
Secunia Research (remove-vuln secunia com)
======================================================================

Secunia Research 2017/05/11

LibRaw "parse_tiff_ifd()" Memory Corruption Vulnerability

======================================================================

Table of Contents

Affected Software

[ more ]  [ reply ]
PingID (MFA) - Reflected Cross-Site Scripting 2017-05-17
Advisories (advisories compass-security com)
#############################################################
#
# COMPASS SECURITY ADVISORY
# https://www.compass-security.com/research/advisories/
#
#############################################################
#
# Product: PingID (MFA) [1]
# Vendor: Ping Identity Corporation
# CSNC ID: CSNC-20

[ more ]  [ reply ]
[slackware-security] kdelibs (SSA:2017-136-02) 2017-05-16
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] kdelibs (SSA:2017-136-02)

New kdelibs packages are available for Slackware 13.37, 14.0, 14.1, 14.2,
and -current to fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patc

[ more ]  [ reply ]
[security bulletin] HPESBGN03748 rev.1 - HPE Cloud Optimizer, Remote Disclosure of Information 2017-05-18
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn
03748en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbgn03748en_us

Version: 1

HP

[ more ]  [ reply ]
[SECURITY] [DSA 3856-1] deluge security update 2017-05-18
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3856-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
May 18, 2017

[ more ]  [ reply ]
(Page 10 of 525)  < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus