[ MDVSA-2015:036 ] python-django

2015-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:036 http://www.mandriva.com/en/support/security/

[SECURITY] [DSA 2978-2] libxml2 security update

2015-02-09 Thread Alessandro Ghedini
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian Security Advisory DSA-2978-2 secur...@debian.org http://www.debian.org/security/Alessandro Ghedini February 06, 2015

[security bulletin] HPSBUX03235 SSRT101750 rev.2 - HP-UX Running BIND, Remote Denial of Service (DoS)

2015-02-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04550240 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04550240 Version: 2 HPSBUX03235

[ MDVSA-2015:037 ] vorbis-tools

2015-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:037 http://www.mandriva.com/en/support/security/

[ MDVSA-2015:031 ] busybox

2015-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:031 http://www.mandriva.com/en/support/security/

[SECURITY] [DSA 3154-1] ntp security update

2015-02-09 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3154-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso February 05, 2015

Re: [FD] Major Internet Explorer Vulnerability - NOT Patched

2015-02-09 Thread David Leo
'could you share the contents of 1.php?' Sure: ?php sleep(2); header(Location: http://www.dailymail.co.uk/robots.txt;); ? I'm assuming it is a delayed re-direct to the target's domain? Exactly. :-) the cloudflare scripts It's been tested without them. Kind Regards, On 2015/2/6 2:31, Barkley,

LG On Screen Phone authentication bypass (CVE-2014-8757)

2015-02-09 Thread Imre Rad
LG On Screen Phone authentication bypass vulnerability -- SEARCH-LAB Ltd. discovered a serious security vulnerability in the On Screen Phone protocol used by LG Smart Phones. A malicious attacker is able to bypass the authentication phase of the

[ MDVSA-2015:034 ] jasper

2015-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:034 http://www.mandriva.com/en/support/security/

[ MDVSA-2015:033 ] java-1.7.0-openjdk

2015-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:033 http://www.mandriva.com/en/support/security/

[ MDVSA-2015:035 ] libvirt

2015-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:035 http://www.mandriva.com/en/support/security/

[security bulletin] HPSBUX03166 SSRT101489 rev.2 - HP-UX running PAM libpam_updbe, Remote Authentication Bypass

2015-02-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04511778 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04511778 Version: 2 HPSBUX03166

[SECURITY] [DSA 3155-1] postgresql-9.1 security update

2015-02-09 Thread Luciano Bello
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian Security Advisory DSA-3155-1 secur...@debian.org http://www.debian.org/security/ Luciano Bello February 06, 2015

[security bulletin] HPSBGN03253 rev.1 - HP Business Process Insight (BPI) running SSLv3, Remote Disclosure of Information

2015-02-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04565855 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04565855 Version: 1 HPSBGN03253

BMC Footprints Service Core 11.5 - Multiple Cross Site Scripting Vulnerabilities (XSS)

2015-02-09 Thread ayman . abdelaziz
About the Product: BMC FootPrints Service Core is an IT service and asset management platform used by many organizations to help the IT departments deliver more value to businesses. Advisory Details: During a Penetration testing, Help AG auditor (Ayman Abdelaziz) discovered the following: 1)

[security bulletin] HPSBMU03224 rev.1 - HP LoadRunner and Performance Center, Load Generator Virtual Machine Images, running Windows, Remote Elevation of Privilege

2015-02-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04526330 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04526330 Version: 1 HPSBMU03224

[SECURITY] CVE-2014-0227 Apache Tomcat Request Smuggling

2015-02-09 Thread Mark Thomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2014-0227 Request Smuggling Severity: Important Vendor: The Apache Software Foundation Versions Affected: - - Apache Tomcat 8.0.0-RC1 to 8.0.8 - - Apache Tomcat 7.0.0 to 7.0.54 - - Apache Tomcat 6.0.0 to 6.0.41 Description: It was possible to

[SECURITY] [DSA 3157-1] ruby1.9.1 security update

2015-02-09 Thread Alessandro Ghedini
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-3157-1 secur...@debian.org http://www.debian.org/security/Alessandro Ghedini February 09, 2015

[security bulletin] HPSBGN03252 rev.1 - HP AppPulse Active running SSLv3, Remote Disclosure of Information

2015-02-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04565853 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04565853 Version: 1 HPSBGN03252

[SECURITY] [DSA 3156-1] liblivemedia security update

2015-02-09 Thread Alessandro Ghedini
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian Security Advisory DSA-3156-1 secur...@debian.org http://www.debian.org/security/Alessandro Ghedini February 07, 2015

[security bulletin] HPSBGN03254 rev.1 - HP Service Health Analyzer running SSLv3, Remote Disclosure of Information

2015-02-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04565856 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04565856 Version: 1 HPSBGN03254

[security bulletin] HPSBMU03216 rev.2 - HP Service Manager running SSLv3, Multiple Remote Vulnerabilities

2015-02-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04512909 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04512909 Version: 2 HPSBMU03216

[SECURITY] [DSA 3154-2] ntp security update

2015-02-09 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3154-2 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso February 07, 2015

Radexscript CMS 2.2.0 - SQL Injection vulnerability

2015-02-09 Thread ITAS Team
#Vulnerability title: Radexscript CMS 2.2.0 - SQL Injection vulnerability #Vendor: http://redaxscript.com/ #Product: Radexscript CMS #Software link: http://redaxscript.com/download/releases #Affected version: Redaxscript 2.2.0 #Fixed version: Redaxscript 2.3.0 #CVE ID: CVE-2015-1518 #Author: Pham

Cookie hijacking: Internet Explorer UXSS (CVE-2015-0072)

2015-02-09 Thread bhdresh
Cookie hijacking: Internet Explorer UXSS (CVE-2015-0072) Host below files on webserver (attacker.com) and share the exploit link with victims, exploit.php --- exploit link (Share with victim) redirect.php --- Script to redirect on target page (target page should not contain X-Frame-Options or

Suspicious URL:Re: [FD] Major Internet Explorer Vulnerability - NOT Patched

2015-02-09 Thread Shawn Hsiao
Not sure what you think about this one.It appears to be a bug with IE. --- // Shawn On Feb 5, 2015, at 12:06 AM, David Leo david@deusen.co.uk wrote: is this entirely an IE flaw Yes. is it tied to the use of Cloudflare No. I tried to reproduce... was unsuccessful Likely,

Re: [FD] Major Internet Explorer Vulnerability - NOT Patched

2015-02-09 Thread David Leo
is this entirely an IE flaw Yes. is it tied to the use of Cloudflare No. I tried to reproduce... was unsuccessful Likely, this detail is missing: ?php sleep(2); header(Location: http://www.dailymail.co.uk/robots.txt;); ? Please tell us whether you reproduce(with the PHP code). am I correct...

Very Important Info About Major Internet Explorer Vulnerability - NOT Patched

2015-02-09 Thread David Leo
1. Spartan - vulnerable (Windows 10) http://www.deusen.co.uk/items/insider3show.3362009741042107/SpartanWin10_screenshot.png Thanks to Zaakiy Siddiqui! 2. ?php sleep(2); header(Location: http://www.dailymail.co.uk/robots.txt;); ? Many asked for it. 3. It's Universal XSS, as we tested: Not only

RE: [FD] Major Internet Explorer Vulnerability - NOT Patched

2015-02-09 Thread Dimitris Strevinas
Ben, we have reproduced the vulnerability in many occasion. First of all, at least to steal the session it is no matter if X-Frame-Option is set to deny/same-origin. Secondly, we were able to easily bypass the alert popup. It is not needed if you implement the waiting logic with a synchronous AJAX

CVE-2015-1172 Wordpress-theme remote arbitrary code

2015-02-09 Thread borg
Product: holding_pattern Vendor: Liftux Vulnerable Version(s): 0.6 and prior Tested Version: 0.6 Advisory Publication: January 18, 2015 Vendor Notification: January 14, 2015 Public Disclosure: January 18, 2015 Vulnerability Type: Exec Code Authentication: Not required to exploit CVE Reference:

[ MDVSA-2015:030 ] bugzilla

2015-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:030 http://www.mandriva.com/en/support/security/

[ MDVSA-2015:029 ] binutils

2015-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:029 http://www.mandriva.com/en/support/security/

[oCERT-2015-002] e2fsprogs input sanitization errors

2015-02-09 Thread Andrea Barisani
#2015-002 e2fsprogs input sanitization errors Description: The e2fsprogs package is a set of open source utilities for ext2, ext3 and ext4 filesytems. The libext2fs library, part of e2fsprogs and utilized by its utilities, is affected by a boundary check error on block group descriptor

ESA-2015-012: EMC Captiva Capture Sensitive Information Disclosure Vulnerability

2015-02-09 Thread Security Alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ESA-2015-012: EMC Captiva Capture Sensitive Information Disclosure Vulnerability EMC Identifier: EMC-2015-012 CVE Identifier: CVE-2015-0519 Severity Rating: CVSS v2 Base Score: 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C) Affected products: • EMC

[ MDVSA-2015:032 ] php

2015-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:032 http://www.mandriva.com/en/support/security/

[SECURITY] [DSA 3158-1] unrtf security update

2015-02-09 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3158-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso February 09, 2015

[security bulletin] HPSBGN03251 rev.1 - HP Storage Essentials running SSLv3, Remote Disclosure of Information

2015-02-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04562179 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04562179 Version: 1 HPSBGN03251