FreeBSD Security Advisory FreeBSD-SA-15:20.expat

2015-08-19 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 = FreeBSD-SA-15:20.expat Security Advisory The FreeBSD Project Topic:

CVE-2015-5699 - Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, Vulnerable to Local Privilege Escalation

2015-08-19 Thread Gregory Pickett
Title === Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, Vulnerable to Local Privilege Escalation Summary === Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, is vulnerable to local privilege escalation via Command Injection. C

Re: Hawkeye-G v3 CSRF Vulnerability ***[UPDATED CORRECTED]

2015-08-19 Thread aabbccdd05407

Trend Micro Deep Discovery Authentication Bypass

2015-08-19 Thread apparitionsec
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-DDI-0818.txt Vendor: www.trendmicro.com Product: === Trend Micro Deep Discovery 3.7

Trend Micro Deep Discovery XSS

2015-08-19 Thread apparitionsec
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-DDI-081815b.txt Vendor: www.trendmicro.com Product: ==

[SYSS-2015-041] XSS in OpenText Secure MFT

2015-08-19 Thread adrian . vollmer
Advisory ID: SYSS-2015-041 Product: Secure MFT Vendor: OpenText Affected Version(s): 2013 R1, 2014 R1, 2014 R2 Tested Version(s): 2014 R2 SP4 Vulnerability Type: Cross-Site Scripting (CWE-79) Risk Level: Medium Solution Status: Fixed Vendor Notification: 2015-08-05 Solution Date: 2015-08-14 Public

Re: CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information

2015-08-19 Thread Asher995
Good brunettes will obtain loads of favorable assessment from their customers. There are several online assessment websites the place you may try to discover a overview of the brunette escort that you've got chosen. Since there are a number of brunette escorts in Istanbul, it should be a cakew

RE: CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information

2015-08-19 Thread Chillman, Paul, Vodafone UK
I think the list is a bit broken: http://www.securityfocus.com/archive/1/536261/30/0/threaded -Original Message- From: asher...@gmail.com [mailto:asher...@gmail.com] Sent: 19 August 2015 08:21 To: bugtraq@securityfocus.com Subject: Re: CORE-2009-01515 - WordPress Privileges Unchecked in

Re: CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information

2015-08-19 Thread paul . szabo
Some spammer (asher...@gmail.com?) wrote to bugtraq: > Good brunettes ... escort ladies obtainable. This made it to their web archive: http://www.securityfocus.com/archive/1/536261 What is happening: did they "stuff up" their spam filter, is the moderator losing focus? Lately there are also some

Re: EMC Documentum Content Server: arbitrary code execution (incomplete fix in CVE-2015-4532)

2015-08-19 Thread andrew
Sorry, previous disclosure contests CVE-2015-4533, though CVE-2015-4532 will be also contested soon. __ Regards, Andrey B. Panfilov -Original Message- From: and...@panfilov.tel Sent: Tuesday, August 18, 2015 4:25 AM To: Bugtraq Subject: EMC Documentum Content Server: arbitrary code

Privilege escalation through RPC commands in EMC Documentum Content Server (incomplete fix in CVE-2015-4532)

2015-08-19 Thread andrew
Product: EMC Documentum Content Server Vendor: EMC Version: ANY CVE: N/A Risk: High Status: public/not fixed For detailed description see attached VRF#HUFG9EBA.txt and VRF#HX5OLZ0F.txt, for vendor announcement see CVE-2015-4532 in http://seclists.org/bugtraq/2015/Aug/86. The problem is PoC code

CVE-2015-3269 Apache Flex BlazeDS Insecure Xml Entity Expansion Vulnerability

2015-08-19 Thread Christofer Dutz
CVE-2015-3269 Apache Flex BlazeDS Insecure Xml Entity Expansion Vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Flex BlazeDS 4.7.0 Description: When receiving XML encoded AMF messages containing DTD entities, the default XML parser configu

[security bulletin] HPSBUX03400 SSRT102211 rev.1 - HP-UX Running BIND, Remote Denial of Service (DoS)

2015-08-19 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04769567 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04769567 Version: 1 HPSBUX03400