-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1735-1 secur...@debian.org
http://www.debian.org/security/ Florian Weimer
March 10, 2009
=
INTERNET SECURITY AUDITORS ALERT 2009-004
- Original release date: December 3rd, 2008
- Last revised: March 10th, 2009
- Discovered by: Juan Galiana Lara
- Severity: 6.3/10 (CVSS scored)
=
I. VULNERABILITY
-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2009:071
http://www.mandriva.com/security/
ECHO_ADV_104$2009
-
[ECHO_ADV_104$2009] WeBid <= 0.7.3 RC9 Multiple Remote File Inclution
Vulnerabilities
-
Author
Asterisk Project Security Advisory - AST-2009-002
++
| Product | Asterisk |
|-+--|
===
Ubuntu Security Notice USN-732-1 March 10, 2009
dash vulnerability
CVE-2009-0854
===
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS
Ubuntu 8.10
===
Ubuntu Security Notice USN-731-1 March 10, 2009
apache2 vulnerabilities
CVE-2007-6203, CVE-2007-6420, CVE-2008-1678, CVE-2008-2168,
CVE-2008-2364, CVE-2008-2939
===
A sec
Remote: Yes
Local: No
Credit: Michael Cyr
Vulnerable: R3282-1.33c LOADER32 1.15, NASU2FW41 Loader 1.17
Not Vulnerable:
Discussion:
Addonics NAS Adapter Post-Auth DoS
Addonics NAS Adapter is prone to several post authentication buffer overflows.
Each of these buffer overflows
Abstract
"Transparent proxies allow organizations to influence and monitor the traffic
from its users without their knowledge
or participation. Transparent proxies act as intermediaries between a user and
end destination, and aren't generally
apparent to users sitting behind them. Enterprises,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2009:070
http://www.mandriva.com/security/
Title
Multiple Vulnerabilities in iAntiVirus
Program
PC Tools iAntiVirus for Mac OS X
http://www.iantivirus.com/
Tested version
1.35, Engine Version 1.0.0.10
tested on german Mac OS X 10.5 with following preferences:
- Scan inside archives ON
- Scan mode NORMAL
- Heuristics NORMAL
Description
1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200903-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
= IUT-CERT =
Title: Aryanic HighPortal, HighCMS Multiple Vulnerabilities
Vendor: www.aryanic.com
Vulnerable Version: 10 and priors
Type: Input.Validation.Vulnerability (URI Injection, Frame Injection, XSS)
Fix: N/A
== nsec.ir
SEC Consult Security Advisory < 20090305-0 >
title: NextApp Echo XML Injection Vulnerability
program: NextApp Echo
vulnerable version: Echo2 < 2.1.1
homepage: http://echo.n
SEC-CONSULT Security Advisory < 20090305-1 >
=
title: IBM Director CIM Server Remote Denial of Service Vulnerability
program: IBM Director for Windows
vulnerable version: <= 5.20.3 Service Update 2
h
SEC-CONSULT Security Advisory < 20090305-2 >
=
title: IBM Director CIM Server Local Privilege Escalation
Vulnerability
program: IBM Director for Windows
vulnerable version: <= 5.20.3 Service Update 2
hom
CFP due March 15, 2009
Conference on Cyber Warfare in Tallinn, Estonia: June 17-19, 2009
Host: Cooperative Cyber Defence Centre of Excellence (www.ccdcoe.org)
CCD CoE is soliciting research papers within the emerging field of
cyber warfare, including but not limited to:
Concepts and Doctrine
Te
Hello Paul,
On Monday 09 March 2009, Paul Wouters wrote:
> On Mon, 9 Mar 2009, Robert Buchholz wrote:
> > Subject: [ GLSA 200903-18 ] Openswan: Insecure temporary file
> > creation
>
> Once again, thanks to everyone for not contacting the Openswan
> Project in this matter just like they did not do
18 matches
Mail list logo