BugTraq Mode:
(Page 107 of 1748)  < Prev  102 103 104 105 106 107 108 109 110 111 112  Next >
[SE-2014-02] Errata document for Issue 42 (CVE-2015-4871 affecting Java SE 7) 2015-11-30
Security Explorations (contact security-explorations com)

Hello All,

On Jun 30, 2015 Security Explorations reported a security vulnerability
(Issue 42 assigned CVE-2015-4871) to Oracle affecting Java SE 7 [1].

In our original report [2], we indicated that the vulnerability had its
origin in klassItable::initialize_itable_for_interface method's
implement

[ more ]  [ reply ]
LSE Leading Security Experts GmbH - LSE-2015-10-14 - HumHub SQL-Injection 2015-11-30
advisories (advisories lsexperts de)
=== LSE Leading Security Experts GmbH - Security Advisory 2015-10-14 ===

HumHub - SQL-Injection
------------------------------------------------------------------------

Tested Versions
===============
HumHub 0.11.2 and 0.20.0-beta.2

Issue Overview
==============
Vulnerability Type: 89 - Improper

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST (0-day) Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-30
Nicholas Lemonias. (lem nikolas googlemail com)
===============================================
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS / MALLOC CORRUPTION ::.

ADVANCED INFORMATION SECURITY CORPORATION

Keeping Things Simple!

======================================================

.88888888:.
88888888.88888.
.88888888888888

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-30
Nicholas Lemonias. (lem nikolas googlemail com)
===============================================
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS / MALLOC CORRUPTION ::.

ADVANCED INFORMATION SECURITY CORPORATION

Keeping Things Simple!

======================================================

.88888888:.
88888888.88888.
.88888888888888

[ more ]  [ reply ]
Belkin N150 Wireless Home Router Multiple Vulnerabilities 2015-11-30
Rahul Pratap Singh (techno rps gmail com)
##Full Disclosure:

#Exploit Title : Belkin N150 Wireless Home Router Multiple
Vulnerabilities
#Exploit Author : Rahul Pratap Singh
#Date : 30/Nov/2015
#Home Page Link : http://www.belkin.com
#Blog Url : 0x62626262.wordpress.com
#Linkedin : https://in.l

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-29
Nicholas Lemonias. (lem nikolas googlemail com)
========================================================

.::PROFTPD v1.3.5a Heap / Malloc Vulnerabilities ::.

ADVANCED INFORMATION SECURITY CORPORATION

Credit: Nicholas Lemonias

Date: 29/11/2015

=========================================================

a888b.
d

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-29
Nicholas Lemonias. (lem nikolas googlemail com)
===============================================
Date: 22/11/2015
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS ::.

ADVANCED INFORMATION SECURITY CORPORATION

Keepi

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation Audit Report. 2015-11-29
Nicholas Lemonias. (lem nikolas googlemail com)
===============================================
Date: 22/11/2015
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS ::.

ADVANCED INFORMATION SECURITY CORPORATION

Keepi

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-30
Nicholas Lemonias. (lem nikolas googlemail com)
===============================================
Date: 29/11/2015
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS ::.

ADVANCED INFORMATION SECURITY CORPORATION

Keep

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-30
Nicholas Lemonias. (lem nikolas googlemail com)
===============================================
Date: 29/11/2015
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS ::.

ADVANCED INFORMATION SECURITY CORPORATION

Keep

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-30
Nicholas Lemonias. (lem nikolas googlemail com)
===============================================
Date: 29/11/2015
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS ::.

ADVANCED INFORMATION SECURITY CORPORATION

Keep

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-30
lem nikolas gmail com
===============================================
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS / MALLOC CORRUPTION ::.

ADVANCED INFORMATION SECURITY CORPORATION

Keeping Things Simple!

==

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-30
Nicholas Lemonias. (lem nikolas googlemail com)
===============================================
Date: 29/11/2015
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS ::.

ADVANCED INFORMATION SECURITY CORPORATION

Keep

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-30
aiscorp gives greetz com
===============================================

Date: 29/11/2015

Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS ::.

ADVANCED INFORMATION SECURITY CORPORATION

[ more ]  [ reply ]
Proftpd 1.3.5a LATEST 0day Follow-up report (Part 2), Patch released!! 29/11/2015 --- Advanced Information Security Corporation 2015-11-30
Nicholas Lemonias. (lem nikolas googlemail com)
===============================================
Date: 29/11/2015
Credit: Nicholas Lemonias

.::PROFTPD v1.3.5a HEAP OVERFLOWS ::.

ADVANCED INFORMATION SECURITY CORPORATION

Kee

[ more ]  [ reply ]
[FD] Visual Paradigm Server v10.0 - Cross Site Scripting (XSS) 2015-11-27
Manuel Mancera (mmancera a2secure com)
================================================================
Visual Paradigm Server v10.0 - Cross Site Scripting (XSS)
================================================================

Information
--------------------
Name: Visual Paradigm Server v10.0 - Cross Site Scripting (XSS)
Affected Softw

[ more ]  [ reply ]
[SECURITY] [DSA 3407-1] dpkg security update 2015-11-26
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3407-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
November 26, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3405-1] smokeping security update 2015-11-25
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3405-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Florian Weimer
November 25, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3406-1] nspr security update 2015-11-25
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3406-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
November 25, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3404-1] python-django security update 2015-11-25
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3404-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
November 25, 2015

[ more ]  [ reply ]
CIS Manager Content Management System 2015Q4 - SQL Injection Vulnerability 2015-11-25
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
CIS Manager Content Management System 2015Q4 - SQL Injection Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1652

Release Date:
=============
2015-11-25

Vulnerability Laboratory ID (VL-ID):
============

[ more ]  [ reply ]
[security bulletin] HPSBGN03523 rev.1 - HP Loadrunner Virtual Table Server, Remote Code Execution 2015-11-25
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c04900820

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04900820
Version: 1

HPSBGN03523

[ more ]  [ reply ]
[security bulletin] HPSBGN03523 rev.1 - HP Loadrunner Virtual Table Server, Remote Code Execution 2015-11-25
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c04900820

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04900820
Version: 1

HPSBGN03523

[ more ]  [ reply ]
[slackware-security] pcre (SSA:2015-328-01) 2015-11-25
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] pcre (SSA:2015-328-01)

New pcre packages are available for Slackware 14.1 and -current to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/pcre-8.38-i486

[ more ]  [ reply ]
[SECURITY] [DSA 3403-1] libcommons-collections3-java security update 2015-11-24
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3403-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
November 24, 2015

[ more ]  [ reply ]
ESA-2015-164: EMC Isilon OneFS Privilege Escalation Vulnerability 2015-11-24
Security Alert (Security_Alert emc com)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2015-164: EMC Isilon OneFS Privilege Escalation Vulnerability

EMC Identifier: ESA-2015-164

CVE Identifier: CVE-2015-6848

Severity Rating: CVSS v2 Base Score: 8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C)

Affected products:

? EMC Isilon OneFS 7.

[ more ]  [ reply ]
[SECURITY] [DSA 3402-1] symfony security update 2015-11-24
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3402-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
November 24, 2015

[ more ]  [ reply ]
Steam Weak File Permissions Privilege Escalation 2015-11-23
ajs swordshield com
Steam Weak File Permissions Privilege Escalation

Vendor Website : http://store.steampowered.com/

INDEX
---------------------------------------

1. CVE
2. Background
3. Description
4. Impact
5. Affected Products
6. Solution
7. Credit
8. Disclosure Timeline

1.

[ more ]  [ reply ]
CVE-2015-5255: SSRF vulnerability in Apache Flex BlazeDS 4.7.1 2015-11-23
Christofer Dutz (cdutz apache org)
CVE-2015-5255: SSRF vulnerability in Apache Flex BlazeDS 4.7.1
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected: BlazeDS 4.7.0 and 4.7.1
Description: The code in BlazeDS to deserialize AMF XML datatypes allows
so-called SSRF Attacks
(Server Side Request Forgery) in which

[ more ]  [ reply ]
[ERPSCAN-15-018] SAP NetWeaver 7.4 - XXE 2015-11-23
ERPScan inc (erpscan online gmail com)
Application: SAP NetWeaver
Versions Affected: SAP NetWeaver 7.4, probably others
Vendor URL: http://SAP.com
Bugs: XML External Entity
Send: 16.04.2015
Reported: 16.04.2015
Vendor response: 16.04.2015
Date of Public Advisory: 11.08.2015
Reference: SAP Security

[ more ]  [ reply ]
(Page 107 of 1748)  < Prev  102 103 104 105 106 107 108 109 110 111 112  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus