[security bulletin] HPSBGN03329 rev.1 - HP SDN VAN Controller, Remote Denial of Service (DoS), Distributed Denial of Service (DDoS)

2015-05-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04657823 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04657823 Version: 1 HPSBGN03329 r

[oCERT-2015-006] dcraw input sanitization errors

2015-05-11 Thread Andrea Barisani
#2015-006 dcraw input sanitization errors Description: The dcraw photo decoder is an open source project for raw image parsing. The dcraw tool, as well as several other projects re-using its code, suffers from an integer overflow condition which lead to a buffer overflow. The vulnerability conc

[SECURITY] [DSA 3256-1] libtasn1-6 security update

2015-05-11 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3256-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso May 10, 2015

[SECURITY] [DSA 3255-1] zeromq3 security update

2015-05-11 Thread Alessandro Ghedini
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3255-1 secur...@debian.org http://www.debian.org/security/Alessandro Ghedini May 10, 2015

[SECURITY] [DSA 3254-1] suricata security update

2015-05-11 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3254-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso May 09, 2015

Sqlbuddy Path Traversal Vulnerability

2015-05-11 Thread hyp3rlinx
Exploit Author: John Page (hyp3rlinx) Website: hyp3rlinx.altervista.org/ Vendor Homepage: www.sqlbuddy.com Version: 1.3.3 SQL Buddy is an open source web based MySQL administration application. Advisory Information: == sqlbuddy suffers from directory traversal whereby a user ca

Sqlbuddy Directory Traversal Read Arbitrary Files Vulnerability

2015-05-11 Thread apparitionsec
Sqlbuddy Directory Traversal Read Arbitrary Files Vulnerability. Vendor: http://www.sqlbuddy.com Release Date: = 05-08-2015 Source: http://hyp3rlinx.altervista.org/advisories/AS-SQLBUDDY0508.txt Product: === sqlbuddy

[security bulletin] HPSBGN03328 rev.1 - Network Virtualization for HP LoadRunner and Performance Center, Remote Information Disclosure

2015-05-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04657310 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04657310 Version: 1 HPSBGN03328 r