-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-15:20.expat Security Advisory
The FreeBSD Project
Topic:
Title
===
Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, Vulnerable to
Local Privilege Escalation
Summary
===
Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, is vulnerable
to local privilege escalation via Command Injection. C
[+] Credits: John Page aka hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-DDI-0818.txt
Vendor:
www.trendmicro.com
Product:
===
Trend Micro Deep Discovery 3.7
[+] Credits: John Page aka hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-DDI-081815b.txt
Vendor:
www.trendmicro.com
Product:
==
Advisory ID: SYSS-2015-041
Product: Secure MFT
Vendor: OpenText
Affected Version(s): 2013 R1, 2014 R1, 2014 R2
Tested Version(s): 2014 R2 SP4
Vulnerability Type: Cross-Site Scripting (CWE-79)
Risk Level: Medium
Solution Status: Fixed
Vendor Notification: 2015-08-05
Solution Date: 2015-08-14
Public
Good brunettes will obtain loads of favorable assessment from their customers.
There are several online assessment websites the place you may try to discover
a overview of the brunette escort that you've got chosen. Since there are a
number of brunette escorts in Istanbul, it should be a cakew
I think the list is a bit broken:
http://www.securityfocus.com/archive/1/536261/30/0/threaded
-Original Message-
From: asher...@gmail.com [mailto:asher...@gmail.com]
Sent: 19 August 2015 08:21
To: bugtraq@securityfocus.com
Subject: Re: CORE-2009-01515 - WordPress Privileges Unchecked in
Some spammer (asher...@gmail.com?) wrote to bugtraq:
> Good brunettes ... escort ladies obtainable.
This made it to their web archive:
http://www.securityfocus.com/archive/1/536261
What is happening: did they "stuff up" their spam filter,
is the moderator losing focus?
Lately there are also some
Sorry,
previous disclosure contests CVE-2015-4533, though CVE-2015-4532 will be
also contested soon.
__
Regards,
Andrey B. Panfilov
-Original Message-
From: and...@panfilov.tel
Sent: Tuesday, August 18, 2015 4:25 AM
To: Bugtraq
Subject: EMC Documentum Content Server: arbitrary code
Product: EMC Documentum Content Server
Vendor: EMC
Version: ANY
CVE: N/A
Risk: High
Status: public/not fixed
For detailed description see attached VRF#HUFG9EBA.txt and VRF#HX5OLZ0F.txt,
for vendor announcement see CVE-2015-4532 in
http://seclists.org/bugtraq/2015/Aug/86. The problem is PoC code
CVE-2015-3269 Apache Flex BlazeDS Insecure Xml Entity Expansion
Vulnerability
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected: Apache Flex BlazeDS 4.7.0
Description: When receiving XML encoded AMF messages containing DTD
entities, the
default XML parser configu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04769567
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04769567
Version: 1
HPSBUX03400
13 matches
Mail list logo