[security bulletin] HPSBST03106 rev.1 - HP P2000 G3 MSA Array System running OpenSSL, Remote Unauthorized Access or Disclosure of Information

2014-09-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04438404 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04438404 Version: 1 HPSBST03106

IBM WebSphere Application Server (WAS) Integrated Solutions Console Login Page username Parameter Reflected XSS Security Vulnerability

2014-09-09 Thread main
INFO: Class: Input Validation Error CVE: Remote: Yes Local: No Published: Aug 27 2014 12:00AM Updated:Aug 27 2014 12:00AM Credit: G. S. McNamara, CGI Federal Emerging Technologies Security Practice (ETSP) Vulnerable: IBM WebSphere Application Server (WAS) Integrated Solutions

Cisco Security Advisory: Cisco Unified Computing System E-Series Blade Servers Cisco Integrated Management Controller SSH Denial of Service Vulnerability

2014-09-09 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Unified Computing System E-Series Blade Servers Cisco Integrated Management Controller SSH Denial of Service Vulnerability Advisory ID: cisco-sa-20140908-ucse Revision 1.0 For Public Release 2014 September 8 16:00 UTC (GMT)

FreeBSD Security Advisory FreeBSD-SA-14:18.openssl

2014-09-09 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 = FreeBSD-SA-14:18.opensslSecurity Advisory The FreeBSD Project Topic:

[SECURITY] [DSA 3021-1] file security update

2014-09-09 Thread Luciano Bello
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian Security Advisory DSA-3021-1 secur...@debian.org http://www.debian.org/security/ Luciano Bello September 09, 2014