-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1956-1 secur...@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
December 16, 2009
rPath Security Advisory: 2009-0161-1
Published: 2009-12-16
Products:
rPath Appliance Platform Linux Service 1
rPath Appliance Platform Linux Service 2
rPath Linux 2
Rating: Critical
Exposure Level Classification:
Remote Root Non-deterministic Denial of Service
Updated Versions:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Multiple Cisco WebEx WRF Player Vulnerabilities
Advisory ID: cisco-sa-20091216-webex
http://www.cisco.com/warp/public/707/cisco-sa-20091216-webex.shtml
Revision 1.0
For Public Release 2009 December 16 1600 UTC (GMT
#
Application: QuickHeal antivirus 2010 Local Privilege Escalation
Platforms: Windows Vista SP2
Exploitation: Local Privilege Escalation
Date: 2009-12-16
Author: Francis Provencher
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1955-1 secur...@debian.org
http://www.debian.org/security/ Steffen Joeris
December 16, 2009
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01696729
Version: 4
HPSBMA02416 SSRT090008 rev.4 - HP OpenView Network Node Manager (OV NNM),
Remote Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be act
ShineShadow Security Report 16122009-15
TITLE
Kaspersky Lab Multiple Products Local Privilege Escalation Vulnerability
BACKGROUND
Due to its high level of professionalism and dedication, Kaspersky Lab has
become a market leader in the development of antivirus protection. The
companys
I actually DID try to access the .sdb in Ubuntu but that was before I
identified the file format of the db as myDB as noted. I do not know of a 'nix
based tool for access to the db. If you just want to verify, you can open the
.sdb with a text/hex editor and parse out a filename for yourself
[ SYNOPSIS ]=
VideoCache is a Squid URL rewriter plugin written in Python for
bandwidth optimization while browsing video sharing websites. Version
1.9.2 allows a user with the privileges of the Squid proxy server to
append semi-arbitrary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1954-1 secur...@debian.org
http://www.debian.org/security/ Steffen Joeris
December 16, 2009
File Access Vulnerability in Easy File Sharing Web Server
Discovered by:
Timothy "Thor" Mullen
Testing by Steve "Raging Haggis" Moffat, Hammer of God, Bermuda Labs
Product:Easy File Sharing Web Server, current versions, default
installation
Vendor: http://www.sharing-file.com/
Family Connections <= 2.1.3 Multiple Remote Vulnerabilities
Name Family Connections
Vendor http://www.familycms.com
Versions Affected <= 2.1.3
Author Salvatore Fresta aka Drosophila
Website http://www.salvatorefresta.net
Contact salvato
=
INTERNET SECURITY AUDITORS ALERT 2009-010
- Original release date: September 28th, 2009
- Last revised: December 15th, 2009
- Discovered by: Juan Galiana Lara
- CVE ID: CVE-2009-3703
- Severity: 8.5/10 (CVSS Base Score)
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1953-1 secur...@debian.org
http://www.debian.org/security/ Stefan Fritsch
December 15, 2009
14 matches
Mail list logo