iDefense Security Advisory 09.13.11
http://labs.idefense.com/intelligence/vulnerabilities/
Sep 13, 2011
I. BACKGROUND
Excel is the spreadsheet application included with Microsoft Corp.'s
Office productivity software suite. More information is available at the
following website:
iDefense Security Advisory 09.13.11
http://labs.idefense.com/intelligence/vulnerabilities/
Sep 13, 2011
I. BACKGROUND
Excel is the spreadsheet application included with Microsoft Corp.'s
Office productivity software suite. More information is available at the
following website:
iDefense Security Advisory 09.13.11
http://labs.idefense.com/intelligence/vulnerabilities/
Sep 13, 2011
I. BACKGROUND
Excel is the spreadsheet application included with Microsoft Corp.'s
Office productivity software suite. More information is available at the
following website:
iDefense Security Advisory 09.13.11
http://labs.idefense.com/intelligence/vulnerabilities/
Sep 13, 2011
I. BACKGROUND
Adobe Reader and Acrobat are portable document format (PDF) readers and
processors. For more information, please visit the following pages:
http://www.adobe.com/products/reader/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2309-1 secur...@debian.org
http://www.debian.org/security/ Raphael Geissert
September 13, 2011
Colasoft Capsa ,a commercial software,is a powerful network packet analyzer,and
you can get it from http://www.colasoft.com.cn (China)and
http://www.javvin.com(USA).
--
I. Summary
A flaw has been identified in Colasoft Capsa 7.2.1 concerning
Vulnerability ID: HTB23043
Reference:
https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_sit_support_incident_tracker.html
Product: SiT! Support Incident Tracker
Vendor: The Support Incident Tracker Project ( http://sitracker.org/ )
Vulnerable Version: 3.64 and probably prior
Tested
The so called vulnerability in ScadaPro does not apply when the Windows
firewall is enabled and under normal circumstances the TCP-IP port is not used
to communicate with the ScadaPro service.
In the next release of ScadaPro the TCP/IP port will not be available and
instead a secure web
VUPEN Security Research - Adobe Acrobat and Reader TIFF BitsPerSample Heap
Overflow Vulnerability
Website : http://www.vupen.com/english/research.php
Twitter : http://twitter.com/vupen
I. BACKGROUND
-
Adobe Acrobat and Reader are the global standards for electronic
VUPEN Security Research - Adobe Acrobat and Reader Picture Dimensions Heap
Overflow Vulnerability
Website : http://www.vupen.com/english/research.php
Twitter : http://twitter.com/vupen
I. BACKGROUND
-
Adobe Acrobat and Reader are the global standards for electronic
VUPEN Security Research - Adobe Acrobat and Reader IFF Processing Heap
Overflow Vulnerability
Website : http://www.vupen.com/english/research.php
Twitter : http://twitter.com/vupen
I. BACKGROUND
-
Adobe Acrobat and Reader are the global standards for electronic
document
VUPEN Security Research - Adobe Acrobat and Reader PCX Processing Heap
Overflow Vulnerability
Website : http://www.vupen.com/english/research.php
Twitter : http://twitter.com/vupen
I. BACKGROUND
-
Adobe Acrobat and Reader are the global standards for electronic
document
VUPEN Security Research - Adobe Acrobat and Reader BMP Dimensions Heap
Overflow Vulnerability
Website : http://www.vupen.com/english/research.php
Twitter : http://twitter.com/vupen
I. BACKGROUND
-
Adobe Acrobat and Reader are the global standards for electronic
document
VUPEN Security Research - Adobe Acrobat and Reader Picture Processing Stack
Overflow Vulnerability
Website : http://www.vupen.com/english/research.php
Twitter : http://twitter.com/vupen
I. BACKGROUND
-
Adobe Acrobat and Reader are the global standards for electronic
[ Apologies if you receive multiple copies of this announcement. Please
pass it on to your colleagues and students who might be interested in
participating. ]
Entretiens Jacques Cartier (EJC) Colloquium on IT Security,
Cyber Forensics and Combating Cybercrime 2011 and
e-Crimes Summit
15 matches
Mail list logo