|
Colapse all |
Post message
CVE-2015-1251: Chrome blink SpeechÂRecognitionÂController use-after-free details 2016-11-23 Berend-Jan Wever (berendj nwever nl) [SYSS-2016-106] EASY HOME Alarmanlagen-Set - Missing Protection against Replay Attacks 2016-11-23 matthias deeg syss de -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Advisory ID: SYSS-2016-106 Product: EASY HOME Alarmanlagen-Set Manufacturer: monolith GmbH Affected Version(s): Model No. MAS-S01-09 Tested Version(s): Model No. MAS-S01-09 Vulnerability Type: Missing Protection against Replay Attacks Risk Level: Medi [ more ] [ reply ] [SYSS-2016-072] Olympia Protect 9061 - Missing Protection against Replay Attacks 2016-11-23 matthias deeg syss de -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Advisory ID: SYSS-2016-072 Product: Protect 9061 Manufacturer: Olympia Affected Version(s): Article No. 5943 rev.03 Tested Version(s): Article No. 5943 rev.03 Vulnerability Type: Missing Protection against Replay Attacks Risk Level: Medium Solution St [ more ] [ reply ] [CORE-2016-0007] - TP-LINK TDDP Multiple Vulnerabilities 2016-11-22 CORE Advisories Team (advisories coresecurity com) 1. Advisory Information Title: TP-LINK TDDP Multiple Vulnerabilities Advisory ID: CORE-2016-0007 Advisory URL: http://www.coresecurity.com/advisories/tp-link-tddp-multiple-vulnerabili ties Date published: 2016-11-21 Date of last update: 2016-11-18 Vendors contacted: TP-Link Release mode: User releas [ more ] [ reply ] CVE-2015-0050: Microsoft Internet Explorer 8 MSHTML SRunPointer::SpanQualifier/RunType OOB read details 2016-11-22 Berend-Jan Wever (berendj nwever nl) Throughout November, I plan to release details on vulnerabilities I found in web-browsers which I've not released before. This is the sixteenth entry in that series. Unfortunately I won't be able to publish everything within one month at the current rate, so I may continue to publish these through D [ more ] [ reply ] Web vulnerabilities in Siemens S7-300/S7-400/CP343-1/CP443-1 2016-11-21 Andrea Barisani (andrea inversepath com) The following vulnerabilities have been reported to Siemens CERT and are now covered by by Siemens Security Advisory SSA-603476, published today (2016-11-21) and available at the following URL: http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-6034 76.pdf -- CVE-016-8672 -------- [ more ] [ reply ] [ERPSCAN-16-034] SAP NetWeaver AS JAVA - XXE vulnerability in BC-BMT-BPM-DSK component 2016-11-21 ERPScan inc (erpscan online gmail com) Application: SAP NetWeaver AS JAVA Versions Affected: SAP NetWeaver AS JAVA 7.4 Vendor URL: http://SAP.com Bug: XXE Sent: 09.03.2016 Reported: 10.03.2016 Vendor response: 10.03.2016 Date of Public Advisory: 09.08.2016 Reference: SAP Security Note 2296909 Author: Vahagn Vardanyan (ERPScan) [ more ] [ reply ] Nginx (Debian-based distros) - Root Privilege Escalation (CVE-2016-1247) 2016-11-21 Dawid Golunski (dawid legalhackers com) Vulnerability: Nginx (Debian-based distros) - Root Privilege Escalation (CVE-2016-1247) Discovered by: Dawid Golunski (@dawid_golunski) https://legalhackers.com Nginx web server packaging on Debian-based distributions such as Debian or Ubuntu was found to create log directories with insecure permi [ more ] [ reply ] [RCESEC-2016-009] AppFusions Doxygen for Atlassian Confluence v1.3.2 renderContent() Persistent Cross-Site Scripting 2016-11-20 Julien Ahrens (info rcesecurity com) [RCESEC-2016-008] AppFusions Doxygen for Atlassian Confluence v1.3.2 renderContent() Full Path Information Disclosure 2016-11-20 Julien Ahrens (info rcesecurity com) [RCESEC-2016-007] AppFusions Doxygen for Atlassian Confluence v1.3.0 getTemporaryDirectory() tempId Path Traversal/Remote Code Execution 2016-11-20 Julien Ahrens (julien ahrens rcesecurity com) Multiple issues in OpManager 12100 & 12200 2016-11-20 Michael Heydon (michael mheydon net) Title: Multiple issues in OpManager Author: Michael Heydon Product: OpManager Tested Versions: 12100 & 12200 Vendor: Zoho ManageEngine Vendor Notified: 2016-08-14 Disclosure Date: 2016-11-20 Product Description: ==================== OpManager is a web-based network monitoring system. It is used p [ more ] [ reply ] [security bulletin] HPSBHF03675 rev.1 - HPE Integrated Lights-Out 3 and 4 (iLO 3, iLO 4), Cross-Site Scripting (XSS) 2016-11-20 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c053370 25 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05337025 Version: 1 HPSBHF03675 rev.1 [ more ] [ reply ] Putty Cleartext Password Storage 2016-11-20 apparitionsec gmail com/hyp3rlinx [+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/PUTTY.EXE-INSECURE-PASSWORD-S TORAGE.txt [+] ISR: ApparitionSec Vendor: ========================== www.chiark.greenend.org.uk Product: =========== Putty.exe v0. [ more ] [ reply ] [RCESEC-2016-007] AppFusions Doxygen for Atlassian Confluence v1.3.0 getTemporaryDirectory() tempId Path Traversal/Remote Code Execution 2016-11-20 Julien Ahrens (info rcesecurity com) Stored Cross-Site Scripting in WP Canvas - Shortcodes WordPress Plugin 2016-11-19 Summer of Pwnage (lists securify nl) ------------------------------------------------------------------------ Stored Cross-Site Scripting in WP Canvas - Shortcodes WordPress Plugin ------------------------------------------------------------------------ Yorick Koster, July 2016 --------------------------------------------------------- [ more ] [ reply ] Cross-Site Scripting in Check Email WordPress Plugin 2016-11-19 Summer of Pwnage (lists securify nl) ------------------------------------------------------------------------ Cross-Site Scripting in Check Email WordPress Plugin ------------------------------------------------------------------------ Antonis Manaras, July 2016 ------------------------------------------------------------------------ [ more ] [ reply ] Cross-Site Scripting in Huge IT Portfolio Gallery WordPress Plugin 2016-11-19 Summer of Pwnage (lists securify nl) ------------------------------------------------------------------------ Cross-Site Scripting in Huge IT Portfolio Gallery WordPress Plugin ------------------------------------------------------------------------ Antonis Manaras, July 2016 ----------------------------------------------------------- [ more ] [ reply ] [slackware-security] mozilla-firefox (SSA:2016-323-01) 2016-11-18 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] mozilla-firefox (SSA:2016-323-01) New mozilla-firefox packages are available for Slackware 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ pa [ more ] [ reply ] CVE-2016-3247 Microsoft Edge CTextExtractor::GetBlockText OOB read details 2016-11-18 Berend-Jan Wever (berendj nwever nl) Throughout November, I plan to release details on vulnerabilities I found in web-browsers which I've not released before. This is the fourteenth entry in that series. Unfortunately I won't be able to publish everything within one month at the current rate, so I may continue to publish these through [ more ] [ reply ] Reason Core Security v1.2.0.1 - Unqoted Path Privilege Escalation Vulnerability 2016-11-18 Vulnerability Lab (research vulnerability-lab com) Document Title: =============== Reason Core Security v1.2.0.1 - Unqoted Path Privilege Escalation Vulnerability References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=2003 Release Date: ============= 2016-11-14 Vulnerability Laboratory ID (VL-ID): ====== [ more ] [ reply ] [ERPSCAN-16-031] SAP NetWeaver AS ABAP â?? directory traversal using READ DATASET 2016-11-18 ERPScan inc (erpscan online gmail com) Application: SAP NetWeaver AS ABAP Versions Affected: SAP NetWeaver AS ABAP 7.4 Vendor URL: http://SAP.com Bugs: Directory traversal Sent: 22.04.2016 Reported: 23.04.2016 Vendor response: 23.04.2016 Date of Public Advisory: 09.08.2016 Reference: SAP Security Note 2312966 Author: Daria Pro [ more ] [ reply ] [ERPSCAN-16-032] SAP Telnet Console â?? Directory traversal vulnerability 2016-11-18 ERPScan inc (erpscan online gmail com) Application: SAP NetWeaver AS JAVA Versions Affected: SAP NetWeaver AS JAVA 7.1 to 7.5 Vendor URL: http://SAP.com Bugs: Directory traversal Sent: 04.12.2015 Reported: 05.12.2015 Vendor response: 05.12.2015 Date of Public Advisory: 09.08.2016 Reference: SAP Security Note 2280371 Author: [ more ] [ reply ] Executable installers are vulnerable^WEVIL (case 41): EmsiSoft's Emergency Kit allows elevation of privilege for everybody 2016-11-17 Stefan Kanthak (stefan kanthak nexgo de) Hi @ll, in response to <http://seclists.org/fulldisclosure/2016/Jan/24> EmsiSoft fixed some of the DLL hijacking vulnerabilities in some of their executable installers and unpackers. EmsisoftEmergencyKit.exe still has beginner's errors which allow escalation of privilege for EVERY local user: 0. [ more ] [ reply ] [security bulletin] HPSBGN03676 rev.1 - HPE Helion OpenStack Glance Image Service, Remote Denial of Service (DoS) 2016-11-16 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c053333 84 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05333384 Version: 1 HPSBGN03676 rev.1 [ more ] [ reply ] CVE-2015-2482 MSIE 8 jscript RegExpBase::FBadHeader use-after-free details 2016-11-16 Berend-Jan Wever (berendj nwever nl) Throughout November, I plan to release details on vulnerabilities I found in web-browsers which I've not released before. This is the twelfth entry in that series. Unfortunately I won't be able to publish everything within one month at the current rate, so I may continue to publish these through Dec [ more ] [ reply ] [security bulletin] HPSBST03671 rev.1 - HPE StoreEver MSL6480 Tape Library, Remote Unauthorized Disclosure of Information 2016-11-15 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c053332 97 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05333297 Version: 1 HPSBST03671 rev.1 [ more ] [ reply ] |
|
Privacy Statement |
found in web-browsers which I've not released before. This is the
seventeenth entry in that series. Unfortunately I won't be able to
publish everything within one month at the current rate, so I may
continue to publish these through
[ more ] [ reply ]