|
Colapse all |
Post message
[security bulletin] HPSBHF03408 rev.1 - HP PCs with HP lt4112 LTE/HSPA+ Gobi 4G Module, Remote Execution of Arbitrary Code 2015-08-26 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04773272 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04773272 Version: 1 HPSBHF03408 r [ more ] [ reply ] [security bulletin] HPSBGN03411 rev.1 - HP Operations Agent Virtual Appliance, Remote Unauthorized Disclosure of Information 2015-08-26 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04774058 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04774058 Version: 1 HPSBGN03411 r [ more ] [ reply ] CVE-2015-6535: Stored XSS in YouTube Embed (WordPress plugin) allows admins to compromise super admins 2015-08-26 grajalerts noreply gmail com Details ================ Software: YouTube Embed Version: 3.3.2 Homepage: https://wordpress.org/plugins/youtube-embed/ CVE ID: CVE-2015-6535 (Pending) CWE ID: CWE-79 CVSS: 5.5 (Medium; AV:N/AC:L/Au:S/C:P/I:P/A:N) Description ================ A stored XSS vulnerability in YouTube Embed 3.3.2 (and p [ more ] [ reply ] [security bulletin] HPSBGN03405 rev.1 - HP Integration Adaptor, Remote Unauthorized Modification, Disclosure of Information 2015-08-26 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04773004 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04773004 Version: 1 HPSBGN03405 r [ more ] [ reply ] [security bulletin] HPSBGN03399 rev.1 - HP BSM Connector (BSMC), Remote Unauthorized Modification, Disclosure of Information 2015-08-26 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04767175 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04767175 Version: 1 HPSBGN03399 r [ more ] [ reply ] [security bulletin] HPSBGN03415 rev.1 - HP Operations Agent Virtual Appliance, Remote Disclosure of Information 2015-08-26 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04777255 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04777255 Version: 1 HPSBGN03415 r [ more ] [ reply ] [security bulletin] HPSBGN03414 rev.1 - HP Operations Agent, Remote Disclosure of Information 2015-08-26 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04777195 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04777195 Version: 1 HPSBGN03414 r [ more ] [ reply ] FreeBSD Security Advisory FreeBSD-SA-15:21.amd64 2015-08-25 FreeBSD Security Advisories (security-advisories freebsd org) FreeBSD Security Advisory FreeBSD-SA-15:22.openssh 2015-08-25 FreeBSD Security Advisories (security-advisories freebsd org) [security bulletin] HPSBMU03397 rev.1 - HP Version Control Agent (VCA) on Windows and Linux, Multiple Vulnerabilities 2015-08-24 security-alert hp com (1 replies) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04765169 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04765169 Version: 1 HPSBMU03397 [ more ] [ reply ] RE: [security bulletin] HPSBMU03397 rev.1 - HP Version Control Agent (VCA) on Windows and Linux, Multiple Vulnerabilities 2015-08-25 M.H.P. van Diem (M H P vDiem uvt nl) [security bulletin] HPSBMU03413 rev.1 - HP Virtual Connect Enterprise Manager SDK, Multiple Vulnerabilities 2015-08-24 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04774021 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04774021 Version: 1 HPSBMU03413 [ more ] [ reply ] [security bulletin] HPSBMU03396 rev.1 - HP Version Control Repository Manager (VCRM) on Windows and Linux, Multiple Vulnerabilities 2015-08-24 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04765115 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04765115 Version: 1 HPSBMU03396 [ more ] [ reply ] [security bulletin] HPSBMU03409 rev.1 - HP Matrix Operating Environment, Multiple Vulnerabilities 2015-08-24 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04774019 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04774019 Version: 1 HPSBMU03409 [ more ] [ reply ] [security bulletin] HPSBGN03404 rev.1 - HP Service Health Reporter, Remote Unauthorized Modification 2015-08-24 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04772946 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04772946 Version: 1 HPSBGN03404 r [ more ] [ reply ] [security bulletin] HPSBMU03345 rev.1 - HP Network Node Manager i (NNMi) and Smart Plugins (iSPIs) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information, Unauthorized Modification 2015-08-24 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04773241 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04773241 Version: 1 HPSBMU03345 r [ more ] [ reply ] [SYSS-2015-026] Denial of Service (CWE-730) and Overly Restrictive Account Lockout Mechanism (CWE-645) in Page2Flip Premium App 2.5 2015-08-24 erlijn vangenuchten syss de [SYSS-2015-027] Cross-Site Scripting (CWE-79) in Page2Flip Premium App 2.5 2015-08-24 erlijn vangenuchten syss de [SYSS-2015-028] Cross-Site Scripting (CWE-79) in Page2Flip Premium App 2.5 2015-08-24 erlijn vangenuchten syss de [SYSS-2015-029] Insecure Direct Object Reference (CWE-932) in Page2Flip Premium App 2.5 2015-08-24 erlijn vangenuchten syss de [SYSS-2015-032] Broken Authentication and Session Management (CWE-930) in Page2Flip Premium App 2.5 2015-08-24 erlijn vangenuchten syss de [SYSS-2015-030] Improper Handling of Insufficient Privileges (CWE-274) in Page2Flip Premium App 2.5 2015-08-24 erlijn vangenuchten syss de SYSS-2015-033: Missing Function Level Access Control (CWE-935) in Page2Flip Premium App 2.5 2015-08-24 erlijn vangenuchten syss de Cross site request forgery vulnerability in Linksys WAG120N 2015-08-23 DonVallejo . (j v vallejo gmail com) Hello all, i want to share a problem that i found with Linksys router WAG120N. It could be possible to modify router's configuration when a user visit a webpage with an specific <form> (it is a similar problem that i sent some days ago with Comtrend routers: http://www.securityfocus.com/archive/1/5 [ more ] [ reply ] [SYSS-2015-025] Netop Remote Control - Insufficiently Protected Credentials 2015-08-24 matthias deeg syss de Logstash vulnerability CVE-2015-5619 2015-08-21 Suyog Rao (suyog elastic co) Summary: Logstash 1.5.3 and prior versions are vulnerable to a SSL/TLS security issue which allows an attacker to successfully implement a man in the middle attack. This vulnerability is not present in the initial installation of Logstash. This insecurity is exposed when users configure Lumberjack o [ more ] [ reply ] [security bulletin] HPSBGN03395 rev.1 - HP KeyView running on HP-UX, Linux, Solaris, Windows, FreeBSD, and AIX, Remote Code Execution 2015-08-21 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04771027 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04771027 Version: 1 HPSBGN03395 r [ more ] [ reply ] |
|
Privacy Statement |
The Windows Script Host executables suffer from a vulnerability due to a missing embedded manifest. Using another exploit, the combination of "wusa.exe" and "makecab.exe" files can be copied to the Windows folder. Copies of a manifest and the script
[ more ] [ reply ]