BugTraq Mode:
(Page 115 of 1748)  < Prev  110 111 112 113 114 115 116 117 118 119 120  Next >
RE: Authentication Bypass in Netgear Router Firmware N300_1.1.0.31_1.0.1.img and N300-1.1.0.28_1.0.1.img 2015-10-07
Alexandre Herzog (Alexandre Herzog csnc ch)
Hi Joe,

Thanks for your feedback. Daniel, who discovered the issue and liaised with Netgear to get the issue patched, is in CC of this email.

Would you mind to share some further details? This may help putting pressure on Netgear to release the patch they actually developed beginning of September

[ more ]  [ reply ]
Advanced Information Security Corporation, Security Advisory (MYSQL v5.6.24 Buffer Overflows) 2015-10-07
lem nikolas gmail com
===========================================================
Advanced Information Security Corporation
Security Advisory

===========================================================

a888b.

[ more ]  [ reply ]
[SECURITY] [DSA 3369-1] zendframework security update 2015-10-06
Alessandro Ghedini (ghedo debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3369-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Alessandro Ghedini
October 06, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3370-1] freetype security update 2015-10-06
Alessandro Ghedini (ghedo debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3370-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Alessandro Ghedini
October 06, 2015

[ more ]  [ reply ]
Advanced Information Security Corporation, Security Advisory (MYSQL v5.6.24 Buffer Overflows) 2015-10-07
Nicholas Lemonias. (lem nikolas googlemail com)
===========================================================
Advanced Information Security Corporation
Security Advisory

===========================================================

a888b.

[ more ]  [ reply ]
Zope Management Interface CSRF vulnerabilities 2015-10-07
apparitionsec gmail com
[+] Credits: hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-ZOPE-CSRF.txt

Vendor:
================================
www.zope.org
plone.org

Product:
================================
Zope Management Interface 4.3.7

Zope is a Python-ba

[ more ]  [ reply ]
[CVE-2015-7670] Multiple SQL Injection in Support Ticket System 1.2 WordPress plugin 2015-10-06
ibeptaz gmail com
Vulnerability title: SQL Injection in Support Ticket System 1.2 WordPress plugin
CVE: CVE-2015-7670
Vendor: Tim Dahlmanns
Product: Support Ticket System
Affected version: 1.2
Fixed version: 1.2.1
Reported by: Ibéria Medeiros

Vulnerability Details:
=====================
It was discovered that no pro

[ more ]  [ reply ]
TestLink Security Advisory - SQL Injection Vulnerability - CVE-2015-7390 2015-10-07
Onur Yilmaz (onur netsparker com)
Information
--------------------
Advisory by Netsparker.
Name: SQL Injection Vulnerability in TestLink 1.9.13
Affected Software : TestLink
Affected Versions: 1.9.1.3 and possibly below
Vendor Homepage : http://testlink.org/
Vulnerability Type : SQL Injection
Severity : Critical
Status : Fixed
CVE-ID

[ more ]  [ reply ]
TestLink Security Advisory - Multiple XSS Vulnerabilities - CVE-2015-7391 2015-10-07
Onur Yilmaz (onur netsparker com)
Information
--------------------
Advisory by Netsparker.
Name: Multiple XSS Vulnerabilities in TestLink 1.9.13
Affected Software : TestLink
Affected Versions: 1.9.1.3 and possibly below
Vendor Homepage : http://testlink.org/
Vulnerability Type : Cross-site Scripting
Severity : Important
Status : Fix

[ more ]  [ reply ]
Local RedHat Enterprise Linux DoS â?? RHEL 7.3 Kernel crashes on invalid USB device descriptors (usbvision driver) 2015-10-07
Ralf Spenneberg (info os-t de) (1 replies)
OpenSource Security Ralf Spenneberg
Am Bahnhof 3-5
48565 Steinfurt
info (at) os-s (dot) net [email concealed]

OS-S Security Advisory 2015-04
http://www.os-s.net/advisories/DOS-KernelCrashesOnInvalidUSBDeviceDescri
ptors-UsbvisionDriver.pdf

Date: October 7th, 2015
Last Updated: October 7th, 2015
Authors: Sergej Schumilo, Hendri

[ more ]  [ reply ]
Authentication Bypass in Netgear Router Firmware N300_1.1.0.31_1.0.1.img and N300-1.1.0.28_1.0.1.img 2015-10-06
Alexandre Herzog (Alexandre Herzog csnc ch)
#############################################################
#
# COMPASS SECURITY ADVISORY
# http://www.csnc.ch/en/downloads/advisories.html
#
#############################################################
#
# Product: Netgear Router Firmware N300_1.1.0.31_1.0.1.img
# and N300-1.1.0.28_1.0.1.img
#

[ more ]  [ reply ]
Advisory: web-based VM detection and coarse-grained fingerprinting 2015-10-05
Amit Klein (aksecurity gmail com)
Hi

In three browser families researched (Edge, Internet Explorer and
Firefox - all on Windows 7 or above), it is possible to extract the
frequency of the Windows performance counter, using standard HTML and
Javascript. With the Windows performance counter frequency, it is
possible to remotely detec

[ more ]  [ reply ]
LanWhoIs.exe 1.0.1.120 Stack Buffer Overflow 2015-10-06
apparitionsec gmail com
[+] Credits: hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-LANWHOIS-BUFFER-OVERFLOW-1
0062015.txt

Vendor:
================================
www.lantricks.com

Product:
================================
LanWhoIs.exe 1.0.1.120

LanWhoIs

[ more ]  [ reply ]
[security bulletin] HPSBUX03359 SSRT102094 rev.2 - HP-UX pppoec, local elevation of privilege 2015-10-05
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04718530

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04718530
Version: 2

HPSBUX03359 S

[ more ]  [ reply ]
[slackware-security] seamonkey (SSA:2015-274-03) 2015-10-01
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] seamonkey (SSA:2015-274-03)

New seamonkey packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packag

[ more ]  [ reply ]
[slackware-security] mozilla-thunderbird (SSA:2015-274-01) 2015-10-01
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mozilla-thunderbird (SSA:2015-274-01)

New mozilla-thunderbird packages are available for Slackware 14.1 and -current
to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
p

[ more ]  [ reply ]
[slackware-security] php (SSA:2015-274-02) 2015-10-01
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] php (SSA:2015-274-02)

New php packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/php-5.4.4

[ more ]  [ reply ]
[security bulletin] HPSBST03418 rev.2 - HP P6000 Command View Software, Remote Disclosure of Information 2015-10-02
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04779034

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04779034
Version: 2

HPSBST03418 r

[ more ]  [ reply ]
FTGate 2009 Build 6.4.00 CSRF Vulnerabilities 2015-10-02
apparitionsec gmail com
[+] Credits: hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-FTGATE-2009-CSRF.txt

Vendor:
================================
www.ftgate.com

Product:
========================================
FTGate 2009 SR3 May 13 2010 Build 6.4.00

Vu

[ more ]  [ reply ]
CVE-2015-6237 - Tripwire IP360 VnE Remote Administrative API Authentication Bypass/Privilege Acquisition Vulnerability 2015-10-02
Specto (specto custodela com)
Document Title
================
Tripwire IP360 VnE Remote Administrative API Authentication
Bypass/Privilege Acquisition Vulnerability

Affected Products
===================
Vendor: Tripwire
Software/Appliance: IP360 VnE Vulnerability Manager
Affected (verified) versions: v7.2.2 -> v7.2.5

CVE
===

[ more ]  [ reply ]
[SYSS-2015-039] CSRF in OpenText Secure MFT 2015-10-02
adrian vollmer syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-039
Product: Secure MFT
Vendor: http://www.opentext.com
Affected Version(s): 2013 R3, 2014 R1/R2, 2015 R1
Tested Version(s): 2014 R2 SP4
Vulnerability Type: Cross-Site Request Forgery (CWE-352)
Risk Level: Medium
Solution Status

[ more ]  [ reply ]
[ZDI-15-396] ManageEngine ServiceDesk Plus remote code execution 2015-10-02
Pedro Ribeiro (pedrib gmail com)
Hi,

Yet another RCE bug in ManageEngine ServiceDesk.
This was disclosed by ZDI under ID ZDI-15-396 on August 20th, and fixed
in version 9103 [1].

Details below, full advisory can be obtained from my repo at [E2].
A Metasploit module that exploits this vulnerability has been submitted
upstream in [

[ more ]  [ reply ]
Qualys Security Advisory - OpenSMTPD Audit Report 2015-10-02
Qualys Security Advisory (qsa qualys com)
(Sorry for the "CVE-2015-ABCD" place-holders in the report, but
OpenSMTPD's developers were ready with the patches before MITRE was
ready with the CVE-IDs.)

Qualys Security Advisory

OpenSMTPD Audit Report

========================================================================

Contents
========

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-15:24.rpcbind [REVISED] 2015-10-02
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

========================================================================
=====
FreeBSD-SA-15:24.rpcbind Security Advisory
The FreeBSD Project

Topic:

[ more ]  [ reply ]
ZTE GPON F427 and possibly F460/F600 - authorization bypass and cleartext password storage 2015-10-02
jerzy patraszewski gmail com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: ZTE GPON F427 and possibly F460/F600 - authorization bypass and cleartext password storage
Author: Jerzy Patraszewski
Date: 10 July 2015

Affected software :
===================
ZTE GPON: F427
Version: V3.0
Firmware Image: F460_IMS_V2.30.10P

[ more ]  [ reply ]
Reflected Cross-Site Scripting (XSS) in SourceBans 2015-10-03
High-Tech Bridge Security Research (advisory htbridge ch)
Advisory ID: HTB23273
Product: SourceBans
Vendor: Sourcebans team
Vulnerable Version(s): 1.4.11 and probably prior
Tested Version: 1.4.11
Advisory Publication: October 2, 2015 [without technical details]
Vendor Notification: October 2, 2015
Public Disclosure: October 23, 2015
Vulnerability Type:

[ more ]  [ reply ]
Multiple Reflected XSS in Payment Form for PayPal Pro version 1.0.1 WordPress plugin 2015-10-04
ibemed gmail com
Vulnerability title: Multiple Reflected XSS in Payment Form for PayPal Pro version 1.0.1 WordPress plugin
CVE: CVE-2015-7666
Vendor: WordPress DWBooster
Product: Payment Form for PayPal Pro
Affected version: 1.0.1
Fixed version: 1.0.2
Reported by: Ibéria Medeiros

Vulnerability Details:
============

[ more ]  [ reply ]
Multiple Reflected XSS in ResAds version 1.0.1 WordPress plugin 2015-10-04
ibemed gmail com
Vulnerability title: Multiple Reflected XSS in ResAds version 1.0.1 WordPress plugin
CVE: CVE-2015-7667
Vendor: WordPress web-mv
Product: ResAds
Affected version: 1.0.1
Fixed version: 1.0.2
Reported by: Ibéria Medeiros

Vulnerability Details:
=====================
It was discovered that no protectio

[ more ]  [ reply ]
Correction: BMC-2015-0005: File inclusion vulnerability caused by misconfiguration of "BIRT Viewer" servlet as used in BMC Remedy AR Reporting 2015-10-02
appsec (appsec bmc com)
Errata:
This is a correction of our previous disclosure email from September 23rd, 2015.
Our previous posting implied that the security vulnerability we discovered was in the "BIRT Viewer" servlet itself.
This is NOT the case, but rather the vulnerability is in how the "BIRT Viewer" was configured w

[ more ]  [ reply ]
(Page 115 of 1748)  < Prev  110 111 112 113 114 115 116 117 118 119 120  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus