January 2013, we encountered the latest version of RealArcade
installer provided by GameHouse (a division of RealNetworks) on a
system during an audit. Considering its historical vulnerabilities and
recent reports about vulnerabilities in game clients/installers, we
decided to take a closer look
---
(PT-2013-41) Positive Technologies Security Advisory
Arbitrary Code Execution in Ajax File and Image Manager
---
---[ Vulnerable software ]
Ajax File and Image Manager
Version:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:238
http://www.mandriva.com/en/support/security/
This is a followup to http://seclists.org/fulldisclosure/2012/Mar/17
and http://seclists.org/fulldisclosure/2013/Aug/225:
On Sunday, March 04, 2012 9:06 PM I wrote:
Hi @ll,
the system image \Setup\WIM\setup.wim on the POSReady 2009 eval CD,
available from the Microsoft Download Center under
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:239
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03901176
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03901176
Version: 1
HPSBGN02923
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2761-1 secur...@debian.org
http://www.debian.org/security/ Raphael Geissert
September 19, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03918632
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03918632
Version: 1
HPSBGN02925
Title:
==
Paypal Inc Bug Bounty #99 - Filter Bypass Persistent Web Vulnerability
Date:
=
2013-09-20
References:
===
http://www.vulnerability-lab.com/get_content.php?id=984
PayPal Security UID: nj1071UU
VL-ID:
=
984
Common Vulnerability Scoring System: