-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1693-2 secur...@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
January 21, 2009
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1709-1 secur...@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
January 21, 2009
==
Call for Papers:
16th ACM Conference on Computer and Communications Security (CCS) 2009
Nov 9 - 13, 2009: Hyatt Regency Chicago, IL, USA
http://sigsac.org/ccs/CCS2009
===
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-004
AXIS 70U Network Document Server - Privilege Escalation and XSS
http://dsecrg.com/pages/vul/show.php?id=60
Application:AXIS 70U Network Document Server (Web Interface)
Versions Affected: 3.0
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco Security Manager Vulnerability
Advisory ID: cisco-sa-20090121-csm
http://www.cisco.com/warp/public/707/cisco-sa-20090121-csm.shtml
Revision 1.0
For Public Release 2009 January 21 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco Unified Communications Manager CAPF
Denial of Service Vulnerability
Advisory ID: cisco-sa-20090121-cucmcapf
Revision 1.0
For Public Release 2009 January 21 1600 UTC (GMT
Joomla component beamospetition 1.0.12 Sql Injection / Xss
Author : vds_s
Dork : "Powered by beamospetition 1.0.12"
Dl : http://joomlacode.org/gf/project/beamospetition/
Xss :
http://[site]/?option=com_beamospetition&func=sign&pet='>alert('Xss')
Sql Injection :
http://[site]/?option=com_beam
Eduardo Vela wrote:
> Probably one of this are the vulnerabilty descriptions of the bugs:
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5460
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4017
Looks to be an exact match with
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-20
Digital Security opens a site of its research center DSec Research Group
Digital Security opens a site of its research center DSec Research
Group [DSecRG], the main mission of which is to conduct researches of different
application and system vulnerabilities.
The result of this work is then used
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200901-14
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
Dear all,
for your information.
Please excuse possible cross postings.
CALL FOR PAPERS
IMF 2009
5th International Conference
on IT
11 matches
Mail list logo