Mooplayer 1.3.0 'm3u' SEH Buffer Overflow POC

2015-02-10 Thread saman . j . l33t
#!/usr/bin/env python ## # Exploit Title: MooPlayer 1.3.0 'm3u' SEH Buffer Overflow POC # Date Discovered: 09-02-2015 # Exploit Author: Samandeep Singh (@samanL33T ) # Vulnerable Software: Moo player 1.3.0 # Sof

Re: Suspicious URL:Re: [FD] Major Internet Explorer Vulnerability - NOT Patched

2015-02-10 Thread Christoph Gruber
I love "Suspicious URL". It reminds me the microsoft KB article speaking of "Malicious Hyperlink" "The most effective step that you can take to help protect yourself from malicious hyperlinks is not to click them." in http://support.microsoft.com/kb/833786/en-us -- Christoph Gruber Am 09.02.2

[ MDVSA-2015:039 ] glibc

2015-02-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:039 http://www.mandriva.com/en/support/security/ __

[RT-SA-2014-013] Cross-Site Scripting in IBM Endpoint Manager Relay Diagnostics Page

2015-02-10 Thread RedTeam Pentesting GmbH
Advisory: Cross-Site Scripting in IBM Endpoint Manager Relay Diagnostics Page During a penetration test, RedTeam Pentesting discovered that the IBM Endpoint Manager Relay Diagnostics page allows anybody to persistently store HTML and JavaScript code that is executed when the page is open

[security bulletin] HPSBGN03255 rev.1 - HP OpenCall Media Platform (OCMP) running SSLv3, Remote Denial of Service (DoS),Disclosure of Information

2015-02-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04566948 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04566948 Version: 1 HPSBGN03255

[security bulletin] HPSBMU03245 rev.1 - HP Insight Control server deployment Linux Preboot Execution Environment running Bash Shell, Multiple Vulnerabilities

2015-02-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04556845 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04556845 Version: 1 HPSBMU03245

[security bulletin] HPSBMU03246 rev.1 - HP Insight Control for Linux Central Management Server Pre-boot Execution Environment running Bash Shell, Multiple Vulnerabilities

2015-02-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04558068 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04558068 Version: 1 HPSBMU03246

Re: Suspicious URL:Re: [FD] Major Internet Explorer Vulnerability - NOT Patched

2015-02-10 Thread Joshua Rogers
On 10/02/15 19:06, Christoph Gruber wrote: > in http://support.microsoft.com/kb/833786/en-us Sorry, that link is suspicious. -- -- Joshua Rogers signature.asc Description: OpenPGP digital signature

[ MDVSA-2015:040 ] zarafa

2015-02-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:040 http://www.mandriva.com/en/support/security/ __

[ MDVSA-2015:041 ] cabextract

2015-02-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:041 http://www.mandriva.com/en/support/security/ __

[ MDVSA-2015:042 ] clamav

2015-02-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:042 http://www.mandriva.com/en/support/security/ __

[ MDVSA-2015:043 ] otrs

2015-02-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2015:043 http://www.mandriva.com/en/support/security/ __

[SECURITY] [DSA 3159-1] ruby1.8 security update

2015-02-10 Thread Alessandro Ghedini
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-3159-1 secur...@debian.org http://www.debian.org/security/Alessandro Ghedini February 10, 2015