-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2014-09-17-2 Apple TV 7
Apple TV 7 is now available and addresses the following:
Apple TV
Available for: Apple TV 3rd generation and later
Impact: An attacker can obtain WiFi credentials
Description: An attacker could have impersonated a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2014-09-17-1 iOS 8
iOS 8 is now available and addresses the following:
802.1X
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker can obtain WiFi credentials
Description: An atta
Advisory ID: HTB23229
Product: MODX Revolution
Vendor: MODX
Vulnerable Version(s): 2.3.1-pl and probably prior
Tested Version: 2.3.1-pl
Advisory Publication: August 20, 2014 [without technical details]
Vendor Notification: August 20, 2014
Vendor Patch: September 11, 2014
Public Disclosure: Sept
Advisory ID: HTB23227
Product: webEdition
Vendor: webEdition e.V.
Vulnerable Version(s): 6.3.8.0 (SVN-Revision: 6985) and probably prior
Tested Version: 6.3.8.0 (SVN-Revision: 6985)
Advisory Publication: August 6, 2014 [without technical details]
Vendor Notification: August 6, 2014
Vendor Patc
MIUI Torch Open Vulnerability
I. Summary
com.android.systemui is the corresponding package of MiuiSystemUI.apk, a MIUI
system application that manages user
interface and other functions. When started by NFC tag, the torch in NFC mobile
phone will be open automatically.
-
MIUI Wifi Connection Message Vulnerability
I. Summary
Wifi Connection Message is written to a NFC tag, which can be touched by a NFC
mobile phone for connecting wireless AP
automatically. A logic flaw has been found in MIUI that is a Android ROM. The
flaw can be used to turn on wifi, with the
I. Summary
Bluetooth Pairing Packet is written to a NFC tag, which can be touched by a NFC
mobile phone for bluetooth pairing. A logic flaw has been found in some
versions of Andorid mobile phone. The flaw can cause NFC phones'bluetooth
turned on, regardless of whether the pairing succeeds or n
Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/
Delphi and C++ Builder VCL library Heap Buffer Overflow
1. *Advisory Information*
Title: Delphi and C++ Builder VCL library Heap Buffer Overflow
Advisory ID: CORE-2014-0006
Advisory URL:
http://www.coresecurity.com/advisories/de
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-3026-1 secur...@debian.org
http://www.debian.org/security/Florian Weimer
September 16, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3025-1 secur...@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
September 16, 2014
Document Title:
===
USB&WiFi Flash Drive 1.3 iOS - Code Execution Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1316
Release Date:
=
2014-09-15
Vulnerability Laboratory ID (VL-ID):
==
Information
Advisory by Netsparker.
Name: XSS Vulnerability in OsClass
Affected Software : OsClass
Affected Versions: 3.4.1 and possibly below
Vendor Homepage : http://osclass.org/
Vulnerability Type : Cross-site Scripting
Severity : Critical
CVE-ID: CVE-2014-6280
Netsparker Advisory R
Information
---
Advisory by Netsparker.
Name : LFI Vulnerability in OsClass
Affected Software : OsClass
Affected Versions: 3.4.1 and possibly below
Vendor Homepage : http://osclass.org/
Vulnerability Type : Local File Inclusion
Severity : Critical
CVE-ID: CVE-2014-6308
Netsparker Advisory R
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-14:19.tcpSecurity Advisory
The FreeBSD Project
Topic:
14 matches
Mail list logo