BugTraq Mode:
(Page 116 of 1748)  < Prev  111 112 113 114 115 116 117 118 119 120 121  Next >
Correction: BMC-2015-0006: File inclusion vulnerability caused by misconfiguration of "BIRT Engine" servlet as used in BMC Remedy AR Reporting 2015-10-02
appsec (appsec bmc com)
Errata:
This is a correction of our previous disclosure email from September 23rd, 2015.
Our previous posting implied that the security vulnerability we discovered was in the "BIRT Engine" servlet itself.
This is NOT the case, but rather the vulnerability is in how the "BIRT Engine" was configured w

[ more ]  [ reply ]
A Reflected XSS in Easy2Map version 1.2.9 WordPress plugin 2015-10-04
ibemed gmail com
Vulnerability title: A Reflected XSS in Easy2Map version 1.2.9 WordPress plugin
CVE: CVE-2015-7668
Vendor: Steven Ellis
Product: Easy2Map
Affected version: 1.2.9
Fixed version: 1.3.0
Reported by: Ibéria Medeiros

Vulnerability Details:
=====================
It was discovered that no protection again

[ more ]  [ reply ]
Multiple Path/Directory Traversal and/or Local File Inclusion in Easy2Map version 1.2.9 WordPress plugin 2015-10-04
ibemed gmail com
Vulnerability title: Multiple Path/Directory Traversal and/or Local File Inclusion in Easy2Map version 1.2.9 WordPress plugin
CVE: CVE-2015-7669
Vendor: Steven Ellis
Product: Easy2Map
Affected version: 1.2.9
Fixed version: 1.3.0
Reported by: Ibéria Medeiros

Vulnerability Details:
==================

[ more ]  [ reply ]
LanSpy 2.0.0.155 Buffer Overflow 2015-10-05
apparitionsec gmail com
[+] Credits: hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-LANSPY-BUFFER-OVERFLOW-100
52015.txt

Vendor:
================================
www.lantricks.com

Product:
================================
LanSpy.exe

LanSpy is network secu

[ more ]  [ reply ]
[security bulletin] HPSBPV03516 rev.1 - HP VAN SDN Controller, Multiple Vulnerabilities 2015-10-01
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04819635

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04819635
Version: 1

HPSBPV03516

[ more ]  [ reply ]
[security bulletin] HPSBGN03424 rev.1 - HP Cloud Service Automation, Remote Authentication Bypass 2015-10-01
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04822825

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04822825
Version: 1

HPSBGN03424 r

[ more ]  [ reply ]
[SYSS-2015-001] Kaspersky Endpoint Security - Authentication Bypass 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-001
Product: Kaspersky Endpoint Security for Windows (KES)
Manufacturer: Kaspersky Lab ZAO
Affected Version(s): 8.1.0.1042, 10.2.1.23
Tested Version(s): 8.1.0.1042, 10.2.1.23
Vulnerability Type: Authentication Bypass Using an Al

[ more ]  [ reply ]
[SYSS-2015-003] Kaspersky Small Office Security - Authentication Bypass 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-003
Product: Kaspersky Small Office Security (KSOS)
Vendor: Kaspersky Lab ZAO
Affected Version(s): 13.0.4.233
Tested Version(s): 13.0.4.233
Vulnerability Type: Authentication Bypass Using an Alternate Path or

[ more ]  [ reply ]
[SYSS-2015-002] Kaspersky Endpoint Security - Use of One-Way Hash withouth a Salt 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-002
Product: Kaspersky Endpoint Security for Windows (KES)
Vendor: Kaspersky Lab ZAO
Affected Version(s): 8.1.0.1042, 10.2.1.23
Tested Version(s): 8.1.0.1042, 10.2.1.23
Vulnerability Type: Use of a One-Way Hash without a Salt (C

[ more ]  [ reply ]
[SYSS-2015-004] Kaspersky Small Office Security - Use of One-Way Hash withouth a Salt 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-004
Product: Kaspersky Small Office Security (KSOS)
Vendor: Kaspersky Lab ZAO
Affected Version(s): 13.0.4.233
Tested Version(s): 13.0.4.233
Vulnerability Type: Use of a One-Way Hash without a Salt (CWE-759)
Risk Level: Low
Solut

[ more ]  [ reply ]
[SYSS-2015-006] Kaspersky Total Security - Use of One-Way Hash withouth a Salt 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-006
Product: Kaspersky Total Security (KTS)
Vendor: Kaspersky Lab ZAO
Affected Version(s): 15.0.1.415
Tested Version(s): 15.0.1.415
Vulnerability Type: Use of a One-Way Hash without a Salt (CWE-759)
Risk Level: Low
Solution Stat

[ more ]  [ reply ]
[SYSS-2015-005] Kaspersky Total Security - Authentication Bypass 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-005
Product: Kaspersky Total Security (KTS)
Vendor: Kaspersky Lab ZAO
Affected Version(s): 15.0.1.415
Tested Version(s): 15.0.1.415
Vulnerability Type: Authentication Bypass Using an Alternate Path or
Channe

[ more ]  [ reply ]
[SYSS-2015-008] Kaspersky Internet Security - Use of One-Way Hash withouth a Salt 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-008
Product: Kaspersky Internet Security (KIS)
Vendor: Kaspersky Lab ZAO
Affected Version(s): 15.0.2.361
Tested Version(s): 15.0.2.361
Vulnerability Type: Use of a One-Way Hash without a Salt (CWE-759)
Risk Level: Low
Solution S

[ more ]  [ reply ]
[SYSS-2015-009] Kaspersky Anti-Virus - Authentication Bypass 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-009
Product: Kaspersky Anti-Virus (KAV)
Vendor: Kaspersky Lab ZAO
Affected Version(s): 15.0.1.415
Tested Version(s): 15.0.1.415
Vulnerability Type: Authentication Bypass Using an Alternate Path or
Channel (C

[ more ]  [ reply ]
[SYSS-2015-007] Kaspersky Internet Security - Authentication Bypass 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-007
Product: Kaspersky Internet Security (KIS)
Vendor: Kaspersky Lab ZAO
Affected Version(s): 15.0.2.361
Tested Version(s): 15.0.2.361
Vulnerability Type: Authentication Bypass Using an Alternate Path or
Ch

[ more ]  [ reply ]
[SYSS-2015-010] Kaspersky Anti-Virus - Use of One-Way Hash withouth a Salt 2015-10-01
matthias deeg syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2015-010
Product: Kaspersky Anti-Virus
Vendor: Kaspersky Lab ZAO
Affected Version(s): 15.0.1.415
Tested Version(s): 15.0.1.415
Vulnerability Type: Use of a One-Way Hash without a Salt (CWE-759)
Risk Level: Low
Solution Status: Fixed

[ more ]  [ reply ]
APPLE-SA-2015-09-30-3 OS X El Capitan 10.11 2015-09-30
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-09-30-3 OS X El Capitan 10.11

OS X El Capitan 10.11 is now available and addresses the following:

Address Book
Available for: Mac OS X v10.6.8 and later
Impact: A local attacker may be able to inject arbitrary code to
processes loadi

[ more ]  [ reply ]
APPLE-SA-2015-09-30-2 Safari 9 2015-09-30
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-09-30-2 Safari 9

Safari 9 is now available and addresses the following:

Safari
Available for: OS X Mavericks v10.9.5,
OS X Yosemite v10.10.5 and OS X El Capitan v10.11
Impact: Visiting a malicious website may lead to user interface
s

[ more ]  [ reply ]
[security bulletin] HPSBST03502 rev.1 - HP 3PAR Service Processor (SP) SPOCC, Remote Disclosure of Information 2015-09-30
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04822249

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04822249
Version: 1

HPSBST03502 r

[ more ]  [ reply ]
APPLE-SA-2015-09-30-01 iOS 9.0.2 2015-09-30
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-09-30-01 iOS 9.0.2

iOS 9.0.2 is now available and addresses the following:

Lock Screen
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A person with physical access to an iOS device

[ more ]  [ reply ]
Apache James Server 2.3.2 security vulnerability fixed 2015-09-30
Eric Charles (eric apache org)
Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: James Server 2.3.2

Description: Apache James Server 2.3.2 has security issue that can let a
user execute arbitrary system command for servers configured with file
based user repositories.

Mitigation: 2.3.2 users shou

[ more ]  [ reply ]
Re: WinRAR SFX v5.21 - Remote Code Execution Vulnerability 2015-09-30
dev rarlab com (1 replies)
I am WinRAR developer. We published the official comment on www.rarlab.com here:
http://rarlab.com/vuln_sfx_html.htm

This "vulnerability" is a non-issue. Why attempting to find some hackish esoteric way for a feature, which presents in SFX archives officially. Any SFX archive can run contained exec

[ more ]  [ reply ]
RE: WinRAR SFX v5.21 - Remote Code Execution Vulnerability 2015-09-30
Popovici, Alejo \(LATCO - Buenos Aires\) (apopovici DELOITTE com) (1 replies)
Re: WinRAR SFX v5.21 - Remote Code Execution Vulnerability 2015-09-30
Eugene Roshal (roshal rarlab com)
FreeBSD Security Advisory FreeBSD-SA-15:24.rpcbind 2015-09-29
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

========================================================================
=====
FreeBSD-SA-15:24.rpcbind Security Advisory
The FreeBSD Project

Topic:

[ more ]  [ reply ]
CVE-2015-7392 Heap overflow in Freeswitch json parser < 1.6.2 & < 1.4.23 2015-09-29
Marcello Duarte (marcello cybersightgroup com)
1. Advisory Information

Title: Heap overflow in freeswitch json parser < 1.6.2 & < 1.4.23
Submitter: Marcello Duarte (marcello (at) cybersightgroup (dot) com [email concealed])
Product: freeswitch
Product URL: http://freeswitch.org
Affected Versions: freeswitch < 1.6.2 & < 1.4.23
Fixed Versions: 1.6.2 , 1.4.23
Link to sourc

[ more ]  [ reply ]
ESA-2015-151: RSA® OneStep Path Traversal Vulnerability 2015-09-29
Security Alert (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2015-151: RSA® OneStep Path Traversal Vulnerability

EMC Identifier: ESA-2015-151

CVE Identifier: CVE-2015-4546

Severity Rating: CVSS v2 Base Score: 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)

Affected Products:

RSA OneStep 6.9 prior to Build 5

[ more ]  [ reply ]
ESA-2015-152: RSA Web Threat Detection Multiple Vulnerabilities 2015-09-29
Security Alert (Security_Alert emc com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2015-152: RSA Web Threat Detection Multiple Vulnerabilities

EMC Identifier: ESA-2015-152

CVE Identifier: CVE-2015-4547, CVE-2015-4548

Severity Rating: CVSS v2 Base Score: View details below for individual CVSS v2 scores

Affected P

[ more ]  [ reply ]
(Page 116 of 1748)  < Prev  111 112 113 114 115 116 117 118 119 120 121  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus