|
Colapse all |
Post message
APPLE-SA-2016-05-16-3 watchOS 2.2.1 2016-05-16 Apple Product Security (product-security-noreply lists apple com) APPLE-SA-2016-05-16-2 iOS 9.3.2 2016-05-16 Apple Product Security (product-security-noreply lists apple com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-05-16-2 iOS 9.3.2 iOS 9.3.2 is now available and addresses the following: Accessibility Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An application may be able to determine kerne [ more ] [ reply ] APPLE-SA-2016-05-16-1 tvOS 9.2.1 2016-05-16 Apple Product Security (product-security-noreply lists apple com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-05-16-1 tvOS 9.2.1 tvOS 9.2.1 is now available and addresses the following: CFNetwork Proxies Available for: Apple TV (4th generation) Impact: An attacker in a privileged network position may be able to leak sensitive user informatio [ more ] [ reply ] Security advisory for Bugzilla 5.0.3 and 4.4.12 2016-05-16 LpSolit gmail com Summary ======= Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issue has been discovered in Bugzilla: * A specially crafted bug summary could trigger XSS in dependency graphs. All affected installations are encouraged to upgrade as [ more ] [ reply ] [ERPSCAN-16-008] SAP NetWeaver AS JAVA - XSS vulnerability in ProxyServer servlet 2016-05-16 ERPScan inc (erpscan online gmail com) Application: SAP NetWeaver AS JAVA Versions Affected: SAP NetWeaver AS JAVA 7.4 Vendor URL: http://SAP.com Bugs: Cross Site Scripting (XSS) Sent: 10.08.2015 Reported: 10.08.2015 Vendor response: 11.08.2015 Date of Public Advisory: 09.02.2016 Reference: SAP Security Note 2220571 Author: Vah [ more ] [ reply ] [ERPSCAN-16-009] SAP xMII - directory traversal vulnerability 2016-05-16 ERPScan inc (erpscan online gmail com) Application: SAP xMII Versions Affected: SAP MII 15.0 Vendor URL: http://SAP.com Bugs: Directory traversal Sent: 29.07.2015 Reported: 29.07.2015 Vendor response: 30.07.2015 Date of Public Advisory: 09.02.2016 Reference: SAP Security Note 2230978 Author: Dmitry Chastuhin (ERPScan) Descr [ more ] [ reply ] [SECURITY] [DSA 3579-1] xerces-c security update 2016-05-16 Salvatore Bonaccorso (carnil debian org) dns_dhcp Web Interface SQL Injection 2016-05-14 hyp3rlinx lycos com [+] Credits: hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/DNS_DHCP-WEB-INTERFACE-SQL-IN JECTION.txt [+] ISR: apparitionsec Vendor: ==================== tmcdos / sourceforge Product: ====================== dns_dhcp Web Interface Down [ more ] [ reply ] eXtplorer v2.1.9 Archive Path Traversal 2016-05-14 hyp3rlinx lycos com [+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/EXTPLORER-ARCHIVE-PATH-TRAVER SAL.txt [+] ISR: apparitionsec Vendor: ============== extplorer.net Product: ================== eXtplorer v2.1.9 eXtplorer is a PH [ more ] [ reply ] [security bulletin] HPSBMU03590 rev.1 - HPE Systems Insight Manager (SIM) on Windows and Linux, Multiple Vulnerabilities 2016-05-13 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05131085 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05131085 Version: 1 HPSBMU03590 [ more ] [ reply ] May 2016 - HipChat Server - Critical Security Advisory 2016-05-13 David Black (dblack atlassian com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Note: the current version of this advisory can be found at https://confluence.atlassian.com/x/96hMMQ . CVE IDs: * CVE-2016-3714 - ImageMagick - Insufficient shell characters filtering leads to (potentially * remote) code execution * CVE-2016-3715 - [ more ] [ reply ] [security bulletin] HPSBMU03589 rev.1 - HPE Version Control Repository Manager (VCRM), Remote Denial of Service (DoS) 2016-05-12 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05131044 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05131044 Version: 1 HPSBMU03589 [ more ] [ reply ] [security bulletin] HPSBMU03591 rev.1 - HPE Server Migration Pack, Remote Denial of Service (DoS) 2016-05-12 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05130958 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05130958 Version: 1 HPSBMU03591 [ more ] [ reply ] [SECURITY] [DSA 3575-1] libxstream-java security update 2016-05-12 Moritz Muehlenhoff (jmm debian org) [security bulletin] HPSBGN03597 rev.1 - HPE Cloud Optimizer (Virtualization Performance Viewer) using glibc Remote Denial of Service (DoS) 2016-05-12 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05125672 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05125672 Version: 1 HPSBGN03597 r [ more ] [ reply ] [slackware-security] mozilla-thunderbird (SSA:2016-132-01) 2016-05-12 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] mozilla-thunderbird (SSA:2016-132-01) New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ p [ more ] [ reply ] [security bulletin] HPSBST03599 rev.1 - HPE 3PAR OS running OpenSSH, Remote Denial of Service (DoS), Access Restriction Bypass 2016-05-11 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05128992 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05128992 Version: 1 HPSBST03599 r [ more ] [ reply ] [security bulletin] HPSBST03598 rev.1 - HPE 3PAR OS using glibc, Remote Denial of Service (DoS), Arbitrary Code Execution 2016-05-11 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05128937 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05128937 Version: 1 HPSBST03598 r [ more ] [ reply ] [security bulletin] HPSBST03586 rev.1 - HPE 3PAR OS, Remote Unauthorized Modification 2016-05-11 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05128722 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05128722 Version: 1 HPSBST03586 r [ more ] [ reply ] [security bulletin] HPSBNS03581 rev.2 - HPE NonStop Servers running Samba (NS-Samba), Multiple Remote Vulnerabilities 2016-05-11 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05082964 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05082964 Version: 2 HPSBNS03581 r [ more ] [ reply ] [security bulletin] HPSBHF03592 rev.1 - HPE VAN SDN Controller OVA using OpenSSL, Multiple Remote Vulnerabilities 2016-05-11 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05126404 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05126404 Version: 1 HPSBHF03592 [ more ] [ reply ] [SECURITY] [DSA 3565-2] monotone ovito pdns qtcreator softhsm regression update 2016-05-11 Sebastien Delafond (seb debian org) BulletProof Security 53.3 - Security Advisory - Multiple XSS Vulnerabilities 2016-05-10 Onur Yilmaz (onur netsparker com) Information -------------------- Advisory by Netsparker Name: Multiple XSS Vulnerabilities in BulletProof Security Affected Software : BulletProof Security Affected Versions: v53.3 and possibly below Vendor Homepage : https://wordpress.org/plugins/bulletproof-security/ Vulnerability Type : Cross-sit [ more ] [ reply ] [slackware-security] imagemagick (SSA:2016-132-01) 2016-05-11 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] imagemagick (SSA:2016-132-01) New imagemagick packages are available for Slackware 14.0, 14.1, and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/pa [ more ] [ reply ] [security bulletin] HPSBUX03574 rev.1 - HPE HP-UX CIFS-Server (Samba), Remote Access Restriction Bypass, Authentication bypass, Denial of Service (DoS), Unauthorized Access to Files, Access Restriction Bypass, Unauthorized Information Disclosure 2016-05-10 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05115993 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05115993 Version: 1 HPSBUX03574 r [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA512
APPLE-SA-2016-05-16-3 watchOS 2.2.1
watchOS 2.2.1 is now available and addresses the following:
CommonCrypto
Available for: Apple Watch Sport, Apple Watch, Apple Watch Edition,
and Apple Watch Hermes
Impact: A malicious application may be able to
[ more ] [ reply ]