BugTraq Mode:
(Page 414 of 1747)  < Prev  409 410 411 412 413 414 415 416 417 418 419  Next >
[security bulletin] HPSBMU02690 SSRT100569 rev.1 - HP Business Availability Center (BAC) Running on Solaris and Windows, Remote Denial of Service (DoS) 2011-07-08
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02906075
Version: 1

HPSBMU02690 SSRT100569 rev.1 - HP Business Availability Center (BAC) Running on Solaris and Windows, Remote Denial of Service (DoS)

NOTICE: The information in this Security B

[ more ]  [ reply ]
[SECURITY] [DSA 2275-1] openoffice.org security update 2011-07-07
Nico Golde (nico ngolde de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2275-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Nico Golde
July 7, 2011

[ more ]  [ reply ]
ZDI-11-233: Symantec Web Gateway forget.php SQL Injection Vulnerability 2011-07-07
ZDI Disclosures (zdi-disclosures tippingpoint com)
ZDI-11-233: Symantec Web Gateway forget.php SQL Injection Vulnerability

http://www.zerodayinitiative.com/advisories/ZDI-11-233

July 7, 2011

-- CVE ID:
CVE-2011-0549

-- CVSS:
7.5, (AV:N/AC:L/Au:N/C:P/I:P/A:P)

-- Affected Vendors:
Symantec

-- Affected Products:
Symantec Web Gateway

-- TippingPo

[ more ]  [ reply ]
[SECURITY] [DSA 2274-1] wireshark security update 2011-07-07
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2274-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
July 07, 2011

[ more ]  [ reply ]
phpMyAdmin 3.x Multiple Remote Code Executions 2011-07-07
Mango (h xxor se)
########################################################################
###############

phpMyAdmin 3.x Multiple Remote Code Executions

###################################[ Advisory from
]###################################

¨#########¨¨########¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨

[ more ]  [ reply ]
bcksrvr format string in Sybase Adaptive Server 15.5 2011-06-30
Luigi Auriemma (aluigi autistici org)
#######################################################################

Luigi Auriemma

Application: Sybase Adaptive Server
http://www.sybase.com/products/databasemanagement/adaptiveserverenterpri
se
Versions: <= 15.5
Platforms: Solaris, Windows, Li

[ more ]  [ reply ]
Re: Re: Multiple Cross-Site Scripting vulnerabilities in WebCalendar 2011-07-07
sschurtz t-online de
No response from vendor so far!

And no I didn't request a CVE-identifier, so I'd really appreciate your help :)

Best regards,
Stefan

[ more ]  [ reply ]
Security Advisory: CVE-2011-2516 2011-07-07
Cantor, Scott E. (cantor 2 osu edu)
Please be advised that a security issue affecting the Apache XML Security
Library for C++ has been identified and an updated version released to
address the issue. The full text of the advisory is below, and a signed
version can be found at:

http://santuario.apache.org/secadv/CVE-2011-2516.txt

--

[ more ]  [ reply ]
[security bulletin] HPSBMA02674 SSRT100487 rev.2 - HP Service Manager and HP Service Center, Unauthorized Remote Access, Unsecured Local Access, Remote Disclosure of Privileged Information, HTTP Session Credential Re-use, Cross Site Scripting (XSS) and Re 2011-07-06
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02863015
Version: 2

HPSBMA02674 SSRT100487 rev.2 - HP Service Manager and HP Service Center, Unauthorized Remote Access, Unsecured Local Access, Remote Disclosure of Privileged Information, HTTP

[ more ]  [ reply ]
Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request 2011-07-06
Michal Zalewski (lcamtuf coredump cx)
[ But for what it's worth, I am willing to bet that the script was
added without analyzing these subtle considerations, and that makes it
somewhat scary on its own accord. ]

/mz

[ more ]  [ reply ]
Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request 2011-07-06
Michal Zalewski (lcamtuf coredump cx)
> Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The
> script is run when the package installed, and anytime su executes the
> script.
>
> reseed(8) performs a unsecured HTTP request to random.org for its
> bits, despite random.org offering HTTPS services.

This resulted in a coupl

[ more ]  [ reply ]
[SECURITY] [DSA 2273-1] icedove security update 2011-07-06
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2273-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
July 06, 2011

[ more ]  [ reply ]
Aruba Advisory AID-070611 Cross Site Scripting vulnerability in ArubaOS and AirWave Administration Web Interfaces 2011-07-06
RGill (rgill arubanetworks com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ADVISORY NUMBER AID-070611

Advisory # 1:

TITLE

Cross Site Scripting vulnerability in ArubaOS and AirWave
Administration Web Interfaces.

SUMMARY

A persistent Cross Site Scripting vulnerability (XSS) was discovered
where an attacker
could plant an

[ more ]  [ reply ]
Security Advisory: CVE-2011-2465 ISC BIND 9 Remote Crash with Certain RPZ Configurations 2011-07-05
Barry Greene (bgreene isc org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

ISC BIND 9 Remote Crash with Certain RPZ Configurations

Two defects were discovered in ISC's BIND 9 code. These defects only affect
BIND 9 servers which have recursion enabled and which use a specific
feature of the software known as Response Policy

[ more ]  [ reply ]
Security Advisory: CVE-2011-2464 - ISC BIND 9 Remote packet Denial of Service against Authoritative and Recursive Servers 2011-07-05
Barry Greene (bgreene isc org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

ISC BIND 9 Remote packet Denial of Service against Authoritative and
Recursive Servers

A specially constructed packet will cause BIND 9 ("named") to exit,
affecting DNS service.

CVE: CVE-2011-2464

Document Version: 2.0

Posting date: 05 Jul 2011

[ more ]  [ reply ]
Cisco Security Advisory: Cisco Content Services Gateway Denial of Service Vulnerability 2011-07-06
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Cisco Content Services Gateway Denial of
Service Vulnerability

Advisory ID: cisco-sa-20110706-csg

Revision 1.0

For Public Release 2011 July 06 1600 UTC (GMT)

+---------------------------------------------------------------

[ more ]  [ reply ]
Re: SEC Consult SA-20110701-0 :: Multiple SQL injection vulnerabilities in WordPress 2011-07-06
Henri Salo (henri nerv fi)
On Fri, Jul 01, 2011 at 11:23:40AM +0200, SEC Consult Vulnerability Lab wrote:
> SEC Consult Vulnerability Lab Security Advisory < 20110701-0 >
> =======================================================================
> title: Multiple SQL Injection Vulnerabilities
> produc

[ more ]  [ reply ]
Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request 2011-07-06
Jamie Strandboge (jamie canonical com)
On Wed, 2011-07-06 at 00:04 -0400, Jeffrey Walton wrote:
> Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The
> script is run when the package installed, and anytime su executes the
> script.
>
> reseed(8) performs a unsecured HTTP request to random.org for its
> bits, despite ran

[ more ]  [ reply ]
Re: Multiple Cross-Site Scripting vulnerabilities in WebCalendar 2011-07-06
Henri Salo (henri nerv fi)
On Mon, Jul 04, 2011 at 06:46:09AM +0000, sschurtz (at) t-online (dot) de [email concealed] wrote:
> Advisory: Multiple Cross-Site Scripting vulnerabilities in WebCalendar
> Advisory ID: SSCHADV2011-008
> Author: Stefan Schurtz
> Affected Software: Version 1.2.3 and probably prior versions
> Vendor

[ more ]  [ reply ]
Re: in_midi multiple vulnerabilities in Winamp 5.61 2011-07-06
Henri Salo (henri nerv fi)
On Wed, Jun 29, 2011 at 08:02:45PM +0100, Luigi Auriemma wrote:
> #######################################################################
>
> Luigi Auriemma
>
> Application: Winamp
> http://www.winamp.com
> Versions: <= 5.61
> Platforms: Windows
>

[ more ]  [ reply ]
aTube Catcher ActiveX Control Insecure Method 2011-07-06
advisory htbridge ch
Vulnerability ID: HTB23013
Reference: http://www.htbridge.ch/advisory/atube_catcher_activex_control_savedecryp
ted_insecure_method.html
Product: aTube Catcher
Vendor: Diego Uscanga ( http://atube-catcher.dsnetwb.com )
Vulnerable Version: 2.3.570 and probably prior
Tested on: 2.3.570
Vendor Notificat

[ more ]  [ reply ]
IDrive Online Backup ActiveX control Insecure Method 2011-07-06
advisory htbridge ch
Vulnerability ID: HTB23025
Reference: http://www.htbridge.ch/advisory/idrive_online_backup_activex_control_ins
ecure_method.html
Product: IDrive Online Backup
Vendor: Pro Softnet Corporation ( http://www.idrive.com )
Vulnerable Version: 3.4.0 and probably prior
Tested on: 3.4.0
Vendor Notification:

[ more ]  [ reply ]
Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request 2011-07-06
coderman (coderman gmail com)
On Tue, Jul 5, 2011 at 9:04 PM, Jeffrey Walton <noloader (at) gmail (dot) com [email concealed]> wrote:
> Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The
> script is run when the package installed, and anytime su executes the
> script.

... someone thought this was a good idea.
[an entropy pool remotely bi

[ more ]  [ reply ]
Ubuntu: reseed(8), random.org, and HTTP request 2011-07-06
Jeffrey Walton (noloader gmail com)
Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The
script is run when the package installed, and anytime su executes the
script.

reseed(8) performs a unsecured HTTP request to random.org for its
bits, despite random.org offering HTTPS services.

The Ubuntu Security Team took no in

[ more ]  [ reply ]
[security bulletin] HPSBUX02688 SSRT100513 rev.1 - HP-UX Dynamic Loader, Local Privilege Escalation, Denial of Service (DoS) 2011-07-05
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02904002
Version: 1

HPSBUX02688 SSRT100513 rev.1 - HP-UX Dynamic Loader, Local Privilege Escalation, Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upo

[ more ]  [ reply ]
Fwd: RFC 6274 on Security Assessment of the Internet Protocol Version 4 2011-07-05
Fernando Gont (fernando gont com ar)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Folks,

The IETF has just published RFC 6274, entitled "Security Assessment of
the Internet Protocol Version 4". It contains a large amount of
information on how to improve the security of IPv4 implementations and
IPv4 deployments.

This document is the

[ more ]  [ reply ]
[SECURITY] [DSA 2272-1] bind9 security update 2011-07-05
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2272-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
July 05, 2011

[ more ]  [ reply ]
MITKRB5-SA-2011-005 FTP daemon fails to set effective group ID [CVE-2011-1526] 2011-07-05
Tom Yu (tlyu MIT EDU)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

MITKRB5-SA-2011-005

MIT krb5 Security Advisory 2011-005
Original release: 2011-07-05

Topic: FTP daemon fails to set effective group ID

CVE-2011-1526

CVSSv2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:H/RL:O/RC:C

CVSSv2 Base Score: 6.5

Access Vector:

[ more ]  [ reply ]
Arbitrary files deletion in HP OpenView Communication Broker 2011-06-30
Luigi Auriemma (aluigi autistici org)
#######################################################################

Luigi Auriemma

Application: HP OpenView Communication Broker
http://www8.hp.com/us/en/software/enterprise-software.html
Versions: ovbbccb.exe <= 11.0.43.0
Platforms: Windows,

[ more ]  [ reply ]
NGS00060 Technical Advisory: Blue Coat BCAAA Remote Code Execution Vulnerability 2011-07-05
Research@NGSSecure (research ngssecure com)
=======
Summary
=======
Name: Blue Coat BCAAA Remote Code Execution Vulnerability
Release Date: 5 July 2011
Reference: NGS00060
Discoverer: Paul Harrington <paul.harrington (at) ngssecure (dot) com [email concealed]>
Vendor: Blue Coat Systems Inc
Vendor Reference: 2-358686722
Systems Affected: All versions of BCAAA associated

[ more ]  [ reply ]
(Page 414 of 1747)  < Prev  409 410 411 412 413 414 415 416 417 418 419  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus