Title:
==
WiFly 1.0 Pro iOS - Multiple Web Vulnerabilities
Date:
=
2013-07-15
References:
===
http://www.vulnerability-lab.com/get_content.php?id=1011
VL-ID:
=
1011
Common Vulnerability Scoring System:
6.3
Introduction:
Title:
==
Flux Player v3.1.0 iOS - File Include Arbitrary File Upload Vulnerability
Date:
=
2013-07-16
References:
===
http://www.vulnerability-lab.com/get_content.php?id=1013
VL-ID:
=
1013
Common Vulnerability Scoring System:
7.5
Title:
==
Barracuda CudaTel 2.6.02.04 - Multiple Client Side Cross Site Vulnerabilities
(Bug Bounty #17)
Date:
=
2013-07-17
References:
===
http://vulnerability-lab.com/get_content.php?id=779
BARRACUDA NETWORK SECURITY ID: BNSEC-815
VL-ID:
=
779
Common Vulnerability
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03825537
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03825537
Version: 2
HPSBST02896
Hello All,
We discovered yet another indication that new Reflection API introduced
into Java SE 7 was not a subject to a thorough security review (if any).
A new vulnerability (Issue 69) that was submitted to Oracle today makes
it possible to implement a very classic attack against Java VM.
# Symantec Workspace Virtualization 6.4.1895.0 Local Kernel Mode Privilege
Escalation Exploit
# Date: 2013-7-17
# Author : MJ0011
# Version: Symantec Workspace Virtualization 6.4.1895.0
# Tested on: Windows XP SP3
DETAILS:
In fslx.sys 's hook function of NtQueryValueKey , it directly write
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03839862
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03839862
Version: 1
HPSBMU02900