Document Title:
===
iScan Online Mobile 2.0.1 iOS - Command Inject Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1271
Release Date:
=
2014-06-02
Vulnerability Laboratory ID (VL-ID):
=
Document Title:
===
Bluetooth Photo-File Share v2.1 iOS - Multiple Web Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1270
Release Date:
=
2014-05-30
Vulnerability Laboratory ID (VL-ID):
===
Document Title:
===
TigerCom My Assistant v1.1 iOS - File Include Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1268
Release Date:
=
2014-05-23
Vulnerability Laboratory ID (VL-ID):
==
Document Title:
===
Privacy Pro v1.2 HZ iOS - File Include Web Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1267
Release Date:
=
2014-05-23
Vulnerability Laboratory ID (VL-ID):
=
Document Title:
===
AllReader v1.0 iOS - Multiple Web Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1269
Release Date:
=
2014-05-26
Vulnerability Laboratory ID (VL-ID):
Document Title:
===
Files Desk Pro v1.4 iOS - File Include Web Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1266
Release Date:
=
2014-05-16
Vulnerability Laboratory ID (VL-ID):
=
Document Title:
===
NG WifiTransfer Pro 1.1 - File Include Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1260
Release Date:
=
2014-04-28
Vulnerability Laboratory ID (VL-ID):
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=== LSE Leading Security Experts GmbH - Security Advisory 2014-05-22 ===
F*EX (Frams' Fast File EXchange) - Multiple Issues
- - -
Affected Versions
=
F*EX (Frams' Fas
CVE-2013-6825 DCMTK Root Privilege escalation
About DCMTK:
DCMTK is a collection of libraries and applications implementing large parts
the DICOM standard. It includes software for examining, constructing and
converting DICOM image files, handling offline media, sending and receiving
images over
CVE-2014-1226 s3dvt Root shell (still)
About s3dvt:
s3dvt is part of the 3d network display server which can be used as
3d desktop environment.
Vulnerability:
The s3dvt developers forgot to review all the code. There is still a
vulnerable function as in the previous CVE-2013-6825. At the da
Class Cross-Site Scripting
Remote Yes
Published 2nd June 2014
Credit Robin Bailey of Dionach (vu...@dionach.com)
Vulnerable FCKeditor <= 2.6.10
FCKeditor is prone to a reflected cross-site scripting (XSS) vulnerability due
to inadequately sanitised user input. An at
VUPEN Security Research - Adobe Acrobat & Reader XI-X "AcroBroker"
Sandbox Bypass (Pwn2Own)
Website : http://www.vupen.com
Twitter : http://twitter.com/vupen
I. BACKGROUND
-
Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to
CVE-2013-6876 s3dvt Root shell
About s3dvt:
s3dvt is part of the 3d network display server which can be used as
3d desktop environment.
Vulnerability:
A vulnerability in s3dvt for versions prior to 0.2.2 allows to obtain
a root shell.
Details, patches, discussion and strategy to exploit at:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
ESA-2014-032: RSA® Adaptive Authentication (Hosted) DOM Cross-Site Scripting
Vulnerability
EMC Identifier: ESA-2014-032
CVE Identifier: CVE-2014-2502
Severity Rating: CVSS Score 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Affected Products:
RSA Adaptive
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
CVE-2014-2843
===
"Reflected Cross-Site Scripting (XSS)" (CWE-79) vulnerability in "infoware
MapSuite"
Vendor
===
infoware GmbH
Product
===
MapSuite
Affected versions
===
This vul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
CVE-2014-2233
===
"Server-Side Request Forgery" (CWE-918) vulnerability in "infoware MapSuite"
Vendor
===
infoware GmbH
Product
===
MapSuite
Affected versions
===
This vulnerabilit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
CVE-2014-2232
===
"Absolute Path Traversal" (CWE-36) vulnerability in "infoware MapSuite"
Vendor
===
infoware GmbH
Product
===
MapSuite
Affected versions
===
This vulnerability aff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mariadb (SSA:2014-152-01)
New mariadb packages are available for Slackware 14.1 and -current to
fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--+
patches/packages/mariadb
On Thu, May 29, 2014 at 01:40:54PM +, iedb.t...@gmail.com wrote:
> http://iedb.ir/up/imagef-140139785162051-jpg.html
> # Archive Exploit = http://www.iedb.ir/exploits-1731.html
I was unable to reproduce this issue in OpenCart version 1.5.6.4. From the
picture this seems to be path disclosure
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2942-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
Jun 01, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2944-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
June 01, 2014
Yarubo #1: Arbitrary SQL Execution in Participants Database for Wordpress
=
Program: Participants Database <= 1.5.4.8
Severity: Unauthenticated attacker can fully compromise the Wordpress
installation
Permalink: http://www.yarubo.com/advisori
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2941-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
Jun 01, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2943-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
June 01, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2939-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
May 31, 2014
25 matches
Mail list logo