-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04239375
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04239375
Version: 2
HPSBMU02997 r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04236102
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04236102
Version: 5
HPSBMU02995 r
Vulnerability title: Unrestricted file upload in Livetecs Timelive
CVE: CVE-2014-2042
Vendor: Livetecs
Product: Timelive
Affected version: 6.2.71
Fixed version: 6.5.1
Reported by: Richard Hatch
Details:
It was discovered that it was possible for low-level TimeLive
application users to upload
files
Document Title:
===
AirPhoto WebDisk v4.1.0 iOS - Code Execution Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1258
Release Date:
=
2014-04-22
Vulnerability Laboratory ID (VL-ID):
===
Vulnerability title: Arbitrary file read in dompdf
CVE: CVE-2014-2383
Vendor: dompdf
Product: dompdf
Affected version: v0.6.0
Fixed version: v0.6.1 (partial fix)
Reported by: Alejo Murillo Moyas
Details:
An arbitrary file read vulnerability is present on dompdf.php file that
allows remote or local
Vulnerability title: Unauthenticated access to sensitive information and
functionality in Livetecs Timelive
CVE: CVE-2014-1217
Vendor: Livetecs
Product: Timelive
Affected version: 6.2.71
Fixed version: 6.2.8
Reported by: Richard Hatch
Details:
It was possible to access a URL that allowed unauthent
SEC Consult Vulnerability Lab Security Advisory < 20140423-0 >
===
title: Path Traversal/Remote Code Execution
product: WD Arkeia Virtual Appliance (AVA)
vulnerable version: All Arkeia Network
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2808-2 secur...@debian.org
http://www.debian.org/security/ Raphael Geissert
April 22, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04260385
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04260385
Version: 1
HPSBMU03013 r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04261644
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04261644
Version: 1
HPSBST03015 r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2014-04-22-4 AirPort Base Station Firmware Update 7.7.3
AirPort Base Station Firmware Update 7.7.3 is now available and
addresses the following:
Available for:
AirPort Extreme and AirPort Time Capsule base stations with 802.11ac
Impact: An
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04260637
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04260637
Version: 1
HPSBST03000 r
12 matches
Mail list logo