-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04512907
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04512907
Version: 1
HPSBMU03217 r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04530690
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04530690
Version: 1
HPSBOV03226 r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04530570
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04530570
Version: 1
HPSBOV03225 r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04518605
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04518605
Version: 1
HPSBMU03221 r
Document Title:
===
Konakart v7.3.0.1 CMS - CS Cross Site Web Vulnerability
References (Source):
http://vulnerability-lab.com/get_content.php?id=1362
Release Date:
=
2014-12-04
Vulnerability Laboratory ID (VL-ID):
==
Document Title:
===
Fuzzylime v3.03b CMS - CS Cross Scripting Vulnerability
References (Source):
http://vulnerability-lab.com/get_content.php?id=1357
Release Date:
=
2014-12-02
Vulnerability Laboratory ID (VL-ID):
==
Document Title:
===
iWifi for Chat v1.1 iOS - Denial of Service Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1375
Release Date:
=
2014-12-16
Vulnerability Laboratory ID (VL-ID):
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-3104-1 secur...@debian.org
http://www.debian.org/security/Florian Weimer
December 16, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-3105-1 secur...@debian.org
http://www.debian.org/security/Florian Weimer
December 16, 2014
# Title: W3TotalFail: W3 Total Cache v 0.9.4 CSRF Vulnerability that Leads to
Full Deface
# Author: Mazin Ahmed
##
# Date of Discovering: October 6th, 2014
# Date of Reporting to the Vendor: October 7th, 2014
# Date of Releasing a Patch: December 9th, 2014
##
# Vulnerability Type: Cross-Site
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Onapsis Security Advisory ONAPSIS-2014-034: SAP Business Objects Search
Token Privilege Escalation via CORBA
1. Impact on Business
=
By exploiting this vulnerability a remote and potentially
unauthenticated attacker would be abl
"Ettercap 8.0 - 8.1" multiple vulnerabilities
Description
Twelve vulnerabilities exist on ettercap-ng which allow remote denial of
service and possible remote code execution. Specifically, the following
vulnerabilities were identified:
Hello All,
We would like to provide a status update to the initial
announcement [1] made a week ago regarding our SE-2014-02
security research project targeting Google App Engine
for Java.
Information regarding vulnerabilities and associated PoC
codes (Issues 1-22 / unconfirmed Issues 23-35) wa
13 matches
Mail list logo