BugTraq Mode:
(Page 125 of 1748)  < Prev  120 121 122 123 124 125 126 127 128 129 130  Next >
[slackware-security] mozilla-thunderbird (SSA:2015-226-02) 2015-08-14
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mozilla-thunderbird (SSA:2015-226-02)

New mozilla-thunderbird packages are available for Slackware 14.1 and -current
to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
p

[ more ]  [ reply ]
Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13
simon mungewell org
In reading the WPBT document from MS I think I see another problem; namely that the WPBT table can contain a 'command line' which is not signed (only checksum of table).

So on the assumption that you can insert the table into ACPI list that the BIOS present to OS (maybe with a flashed PCI perpheral

[ more ]  [ reply ]
Oracle CSO numbers, security hygiene and fixes at the same time 2015-08-17
Security Explorations (contact security-explorations com)

Hello All,

As a party who had numerous occasions to deal with Oracle in the past, I'd
like to write a few words of comment to the company's CSO's blog post [1].
These are grouped under separate sections below.

["we find 87% of security vulnerabilities ourselves"]
Oracle CSO's stated that the comp

[ more ]  [ reply ]
BFS-SA-2015-002: OpenSSH PAM Privilege Separation Vulnerabilities 2015-08-13
Blue Frost Security Research Lab (research bluefrostsecurity de)
Blue Frost Security GmbH
https://www.bluefrostsecurity.de/ research(at)bluefrostsecurity.de
BFS-SA-2015-002 13-August-2015
________________________________________________________________________
________

Affected Product: OpenSSH

[ more ]  [ reply ]
Nuance PowerPDF Advanced Metadata Information Disclosure Vulnerability (low|local) 2015-08-13
Christopher Hudel (christopher hudel com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Vendor:
=======
Nuance Communications

Product:
========
PowerPDF Advanced Version 1.0
PowerPDF Advanced Version 1.1

Advisory Information:
=====================
Local Information Leakage / Disclosure

Severity Level:
===============
Low

Vulnerabilit

[ more ]  [ reply ]
APPLE-SA-2015-08-13-4 OS X Server v4.1.5 2015-08-13
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-08-13-4 OS X Server v4.1.5

OS X Server v4.1.5 is now available and addresses the following:

BIND
Available for: OS X Yosemite v10.10.5 or later
Impact: A remote attacker may be able to cause a denial of service
Description: An asser

[ more ]  [ reply ]
APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006 2015-08-13
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update
2015-006

OS X Yosemite v10.10.5 and Security Update 2015-006 is now available
and addresses the following:

apache
Available for: OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10

[ more ]  [ reply ]
APPLE-SA-2015-08-13-3 iOS 8.4.1 2015-08-13
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-08-13-3 iOS 8.4.1

iOS 8.4.1 is now available and addresses the following:

AppleFileConduit
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A maliciously crafted afc command may allo

[ more ]  [ reply ]
APPLE-SA-2015-08-13-1 Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8 2015-08-13
Apple Product Security (product-security-noreply lists apple com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-08-13-1 Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8

Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8 is now available and
addresses the following:

Safari Application
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
and

[ more ]  [ reply ]
[security bulletin] HPSBGN03393 rev.1 - HP Operations Manager i, Remote Code Execution 2015-08-12
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04762687

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04762687
Version: 1

HPSBGN03393 r

[ more ]  [ reply ]
[security bulletin] HPSBGN03386 rev.1 - HP Central View Fraud Risk Management, Revenue Leakage Control, Dealer Performance Audit, Credit Risk Control, Roaming Fraud Control, Subscription Fraud Prevention, Remote Disclosure of Information, Local Disclosure 2015-08-12
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04751893

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04751893
Version: 1

HPSBGN03386 r

[ more ]  [ reply ]
Update: Backdoor and RCE found in 8 TOTOLINK router models 2015-08-13
Pierre Kim (pierre kim sec gmail com)
Hello,

This is an update to:
- Backdoor and RCE found in 8 TOTOLINK router models
(http://seclists.org/fulldisclosure/2015/Jul/80 )
- Backdoor credentials found in 4 TOTOLINK router models
(http://seclists.org/fulldisclosure/2015/Jul/79 )
- 4 TOTOLINK router models vulnerable to CSRF and XSS

[ more ]  [ reply ]
Cisco Unified Communications Manager Multiple Vulnerabilities (VP2015-001) 2015-08-13
Bernhard Mueller (bernhard vantagepoint sg)
Vantage Point Security Advisory 2015-001
========================================

Title: Cisco Unified Communications Manager Multiple Vulnerabilities
Vendor: Cisco
Vendor URL: http://www.cisco.com/
Versions affected: <9.2, <10.5.2, <11.0.1.
Severity: Low to medium
Vendor notified: Yes
Reported: O

[ more ]  [ reply ]
[SECURITY] [DSA 3335-1] request-tracker4 security update 2015-08-13
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3335-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
August 13, 2015

[ more ]  [ reply ]
phpipam-1.1.010 XSS Vulnerability 2015-08-12
apparitionsec gmail com
[+] Credits: John Page aka hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPIPAM0812.txt

Vendor:
================================
phpipam.net

Product:
======================================
phpipam-1.1.010

Vulnerability Type:
==

[ more ]  [ reply ]
PHPfileNavigator v2.3.3 CSRF Add Arbitrary Users 2015-08-12
apparitionsec gmail com
[+] Credits: John Page aka hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPFILENAVIGATOR0812a.txt

Vendor:
================================
pfn.sourceforge.net

Product:
===================================
PHPfileNavigator v2.3.3 (p

[ more ]  [ reply ]
phpipam-1.1.010 XSS Vulnerability 2015-08-12
apparitionsec gmail com
[+] Credits: John Page aka hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPIPAM0812.txt

Vendor:
================================
phpipam.net

Product:
======================================
phpipam-1.1.010

Vulnerability Type:
==

[ more ]  [ reply ]
BFS-SA-2015-001: Internet Explorer CTreeNode::GetCascadedLang Use-After-Free Vulnerability 2015-08-12
Blue Frost Security Research Lab (research bluefrostsecurity de)
Blue Frost Security GmbH
https://www.bluefrostsecurity.de/ research(at)bluefrostsecurity.de
BFS-SA-2015-001 12-August-2015
________________________________________________________________________
________

Vendor: Microso

[ more ]  [ reply ]
PHPfileNavigator 2.3.3 Persistent & Reflected XSS 2015-08-12
apparitionsec gmail com
[+] Credits: John Page aka hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPFILENAVIGATOR0812c.txt

Vendor:
================================
pfn.sourceforge.net

Product:
===================================
PHPfileNavigator v2.3.3 (p

[ more ]  [ reply ]
[SECURITY] [DSA 3332-1] wordpress security update 2015-08-11
Thijs Kinkhorst (thijs debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3332-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Thijs Kinkhorst
August 11, 2015

[ more ]  [ reply ]
[CVE-2015-4624] Predictable CSRF tokens in WiFi Pineapple firmware <= 2.3.0 2015-08-11
Ken (catatonicprime gmail com)
Overview
===============
WiFi Pineapples are a penetration testing tool used in offensive
wireless activities. These devices run on a modified OpenWRT (based on
netBSD) operating system. They include a web-based management
interface.

It has been discovered they have predictable anti-CSRF tokens bas

[ more ]  [ reply ]
[SECURITY] [DSA 3333-1] iceweasel security update 2015-08-12
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3333-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
August 12, 2015

[ more ]  [ reply ]
bizidea Design CMS 2015Q3 - SQL Injection Vulnerability 2015-08-12
Vulnerability Lab (research vulnerability-lab com)
Document Title:
===============
bizidea Design CMS 2015Q3 - SQL Injection Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1571

Release Date:
=============
2015-08-12

Vulnerability Laboratory ID (VL-ID):
===============================

[ more ]  [ reply ]
Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-12
Kevin Beaumont (kevin beaumont gmail com) (3 replies)
PRECURSOR

There will be debate about if this is a vulnerability. It affects a
majority of user PCs -- including all Enterprise editions of Windows,
there is no way to disable it, and allows direct code execution into
secure boot sequences. I believe it is worth discussing.

SCOPE

Microsoft docum

[ more ]  [ reply ]
Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-12
Stefan Kanthak (stefan kanthak nexgo de) (1 replies)
Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13
Kevin Beaumont (kevin beaumont gmail com)
Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13
Jerome Athias (athiasjerome gmail com) (1 replies)
Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13
Kevin Beaumont (kevin beaumont gmail com)
RE: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13
Limanovski, Dimitri (dimitri limanovski blackrock com) (1 replies)
Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13
Kevin Beaumont (kevin beaumont gmail com)
(Page 125 of 1748)  < Prev  120 121 122 123 124 125 126 127 128 129 130  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus