WiFly 1.0 Pro iOS - Multiple Web Vulnerabilities

2013-07-18 Thread Vulnerability Lab
Title: == WiFly 1.0 Pro iOS - Multiple Web Vulnerabilities Date: = 2013-07-15 References: === http://www.vulnerability-lab.com/get_content.php?id=1011 VL-ID: = 1011 Common Vulnerability Scoring System: 6.3 Introduction:

Flux Player v3.1.0 iOS - File Include Arbitrary File Upload Vulnerability

2013-07-18 Thread Vulnerability Lab
Title: == Flux Player v3.1.0 iOS - File Include Arbitrary File Upload Vulnerability Date: = 2013-07-16 References: === http://www.vulnerability-lab.com/get_content.php?id=1013 VL-ID: = 1013 Common Vulnerability Scoring System: 7.5

Barracuda CudaTel 2.6.02.04 - Multiple Client Side Cross Site Vulnerabilities (Bug Bounty #17)

2013-07-18 Thread Vulnerability Lab
Title: == Barracuda CudaTel 2.6.02.04 - Multiple Client Side Cross Site Vulnerabilities (Bug Bounty #17) Date: = 2013-07-17 References: === http://vulnerability-lab.com/get_content.php?id=779 BARRACUDA NETWORK SECURITY ID: BNSEC-815 VL-ID: = 779 Common Vulnerability

[security bulletin] HPSBST02896 rev.2 - HP StoreVirtual Storage, Remote Unauthorized Access

2013-07-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03825537 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03825537 Version: 2 HPSBST02896

[SE-2012-01] New Reflection API affected by a known 10+ years old attack

2013-07-18 Thread Security Explorations
Hello All, We discovered yet another indication that new Reflection API introduced into Java SE 7 was not a subject to a thorough security review (if any). A new vulnerability (Issue 69) that was submitted to Oracle today makes it possible to implement a very classic attack against Java VM.

Symantec Workspace Virtualization 6.4.1895.0 Local Kernel Mode Privilege Escalation Exploit

2013-07-18 Thread th_decoder
# Symantec Workspace Virtualization 6.4.1895.0 Local Kernel Mode Privilege Escalation Exploit # Date: 2013-7-17 # Author : MJ0011 # Version: Symantec Workspace Virtualization 6.4.1895.0 # Tested on: Windows XP SP3 DETAILS: In fslx.sys 's hook function of NtQueryValueKey , it directly write

[security bulletin] HPSBMU02900 rev.1 - HP System Management Homepage (SMH) running on Linux and Windows, Multiple Remote and Local Vulnerabilities

2013-07-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03839862 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03839862 Version: 1 HPSBMU02900