iScan Online Mobile 2.0.1 iOS - Command Inject Vulnerability

2014-06-03 Thread Vulnerability Lab
Document Title: === iScan Online Mobile 2.0.1 iOS - Command Inject Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1271 Release Date: = 2014-06-02 Vulnerability Laboratory ID (VL-ID): =

Bluetooth Photo-File Share v2.1 iOS - Multiple Web Vulnerabilities

2014-06-03 Thread Vulnerability Lab
Document Title: === Bluetooth Photo-File Share v2.1 iOS - Multiple Web Vulnerabilities References (Source): http://www.vulnerability-lab.com/get_content.php?id=1270 Release Date: = 2014-05-30 Vulnerability Laboratory ID (VL-ID): ===

TigerCom My Assistant v1.1 iOS - File Include Vulnerability

2014-06-03 Thread Vulnerability Lab
Document Title: === TigerCom My Assistant v1.1 iOS - File Include Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1268 Release Date: = 2014-05-23 Vulnerability Laboratory ID (VL-ID): ==

Privacy Pro v1.2 HZ iOS - File Include Web Vulnerability

2014-06-03 Thread Vulnerability Lab
Document Title: === Privacy Pro v1.2 HZ iOS - File Include Web Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1267 Release Date: = 2014-05-23 Vulnerability Laboratory ID (VL-ID): =

AllReader v1.0 iOS - Multiple Web Vulnerabilities

2014-06-03 Thread Vulnerability Lab
Document Title: === AllReader v1.0 iOS - Multiple Web Vulnerabilities References (Source): http://www.vulnerability-lab.com/get_content.php?id=1269 Release Date: = 2014-05-26 Vulnerability Laboratory ID (VL-ID):

Files Desk Pro v1.4 iOS - File Include Web Vulnerability

2014-06-03 Thread Vulnerability Lab
Document Title: === Files Desk Pro v1.4 iOS - File Include Web Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1266 Release Date: = 2014-05-16 Vulnerability Laboratory ID (VL-ID): =

NG WifiTransfer Pro 1.1 - File Include Vulnerability

2014-06-03 Thread Vulnerability Lab
Document Title: === NG WifiTransfer Pro 1.1 - File Include Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1260 Release Date: = 2014-04-28 Vulnerability Laboratory ID (VL-ID): =

LSE Leading Security Experts GmbH - LSE-2014-05-22 - F*EX - Multiple Issues

2014-06-03 Thread advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 === LSE Leading Security Experts GmbH - Security Advisory 2014-05-22 === F*EX (Frams' Fast File EXchange) - Multiple Issues - - - Affected Versions = F*EX (Frams' Fas

CVE-2013-6825 DCMTK Root Privilege escalation

2014-06-03 Thread Hector Marco
CVE-2013-6825 DCMTK Root Privilege escalation About DCMTK: DCMTK is a collection of libraries and applications implementing large parts the DICOM standard. It includes software for examining, constructing and converting DICOM image files, handling offline media, sending and receiving images over

CVE-2014-1226 s3dvt Root shell (still)

2014-06-03 Thread Hector Marco
CVE-2014-1226 s3dvt Root shell (still) About s3dvt: s3dvt is part of the 3d network display server which can be used as 3d desktop environment. Vulnerability: The s3dvt developers forgot to review all the code. There is still a vulnerable function as in the previous CVE-2013-6825. At the da

FCKedtior 2.6.10 Reflected Cross-Site Scripting (XSS)

2014-06-03 Thread Robin Bailey
Class Cross-Site Scripting Remote Yes Published 2nd June 2014 Credit Robin Bailey of Dionach (vu...@dionach.com) Vulnerable FCKeditor <= 2.6.10 FCKeditor is prone to a reflected cross-site scripting (XSS) vulnerability due to inadequately sanitised user input. An at

VUPEN Security Research - Adobe Acrobat & Reader XI-X "AcroBroker" Sandbox Bypass (Pwn2Own)

2014-06-03 Thread VUPEN Security Research
VUPEN Security Research - Adobe Acrobat & Reader XI-X "AcroBroker" Sandbox Bypass (Pwn2Own) Website : http://www.vupen.com Twitter : http://twitter.com/vupen I. BACKGROUND - Adobe Acrobat and Reader are the global standards for electronic document sharing. They are used to

[FD] CVE-2013-6876 s3dvt Root shell

2014-06-03 Thread Hector Marco
CVE-2013-6876 s3dvt Root shell About s3dvt: s3dvt is part of the 3d network display server which can be used as 3d desktop environment. Vulnerability: A vulnerability in s3dvt for versions prior to 0.2.2 allows to obtain a root shell. Details, patches, discussion and strategy to exploit at:

ESA-2014-032: RSA® Adaptive Authentication (Hosted) DOM Cross-Site Scripting Vulnerability

2014-06-03 Thread Security Alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ESA-2014-032: RSA® Adaptive Authentication (Hosted) DOM Cross-Site Scripting Vulnerability EMC Identifier: ESA-2014-032 CVE Identifier: CVE-2014-2502 Severity Rating: CVSS Score – 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) Affected Products: RSA Adaptive

CVE-2014-2843 - "Reflected Cross-Site Scripting (XSS)" (CWE-79) vulnerability in "infoware MapSuite"

2014-06-03 Thread Christian Schneider
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2014-2843 === "Reflected Cross-Site Scripting (XSS)" (CWE-79) vulnerability in "infoware MapSuite" Vendor === infoware GmbH Product === MapSuite Affected versions === This vul

CVE-2014-2233 - "Server-Side Request Forgery" (CWE-918) vulnerability in "infoware MapSuite"

2014-06-03 Thread Christian Schneider
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2014-2233 === "Server-Side Request Forgery" (CWE-918) vulnerability in "infoware MapSuite" Vendor === infoware GmbH Product === MapSuite Affected versions === This vulnerabilit

CVE-2014-2232 - "Absolute Path Traversal" (CWE-36) vulnerability in "infoware MapSuite"

2014-06-03 Thread Christian Schneider
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2014-2232 === "Absolute Path Traversal" (CWE-36) vulnerability in "infoware MapSuite" Vendor === infoware GmbH Product === MapSuite Affected versions === This vulnerability aff

[slackware-security] mariadb (SSA:2014-152-01)

2014-06-03 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] mariadb (SSA:2014-152-01) New mariadb packages are available for Slackware 14.1 and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--+ patches/packages/mariadb

Re: OpenCart 1.5.6.4 Directory Traversal Vulnerability

2014-06-03 Thread Henri Salo
On Thu, May 29, 2014 at 01:40:54PM +, iedb.t...@gmail.com wrote: > http://iedb.ir/up/imagef-140139785162051-jpg.html > # Archive Exploit = http://www.iedb.ir/exploits-1731.html I was unable to reproduce this issue in OpenCart version 1.5.6.4. From the picture this seems to be path disclosure

[SECURITY] [DSA 2942-1] typo3-src security update

2014-06-03 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2942-1 secur...@debian.org http://www.debian.org/security/Moritz Muehlenhoff Jun 01, 2014

[SECURITY] [DSA 2944-1] gnutls26 security update

2014-06-03 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2944-1 secur...@debian.org http://www.debian.org/security/Moritz Muehlenhoff June 01, 2014

Yarubo #1: Arbitrary SQL Execution in Participants Database for Wordpress

2014-06-03 Thread Yarubo Internet Security Scan
Yarubo #1: Arbitrary SQL Execution in Participants Database for Wordpress = Program: Participants Database <= 1.5.4.8 Severity: Unauthenticated attacker can fully compromise the Wordpress installation Permalink: http://www.yarubo.com/advisori

[SECURITY] [DSA 2941-1] lxml security update

2014-06-03 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2941-1 secur...@debian.org http://www.debian.org/security/Moritz Muehlenhoff Jun 01, 2014

[SECURITY] [DSA 2943-1] php5 security update

2014-06-03 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2943-1 secur...@debian.org http://www.debian.org/security/Moritz Muehlenhoff June 01, 2014

[SECURITY] [DSA 2939-1] chromium-browser security update

2014-06-03 Thread Michael Gilbert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-2939-1 secur...@debian.org http://www.debian.org/security/ Michael Gilbert May 31, 2014