-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04735247
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04735247
Version: 1
HPSBUX03369
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3342-1 secur...@debian.org
https://www.debian.org/security/ Alessandro Ghedini
August 20, 2015
#2015-009 VLC arbitrary pointer dereference
Description:
The VLC media player is an open source media player and streaming media
server.
The stable VLC version suffers from an arbitrary pointer dereference
vulnerability.
The vulnerability affects the 3GP file format parser, insufficient
restri
Document Title:
===
UBNT Bug Bounty #3 - Persistent Filename Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1467
Video: http://www.vulnerability-lab.com/get_content.php?id=1468
Release Date:
=
2015-08-11
Vul
Document Title:
===
UBNT Bug Bounty #1 - Client Side Cross Site Scripting Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1465
#52988
Release Date:
=
2015-08-17
Vulnerability Laboratory ID (VL-ID):
==
Document Title:
===
ChiefPDF Software v2.x - Buffer Overflow Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1578
Release Date:
=
2015-08-20
Vulnerability Laboratory ID (VL-ID):
===
Document Title:
===
WebSolutions India Design CMS - SQL Injection Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1577
Release Date:
=
2015-08-20
Vulnerability Laboratory ID (VL-ID):
==
Document Title:
===
PDF Shaper v3.5 - (MSF) Remote Buffer Overflow Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1579
Video: https://youtu.be/-HTEIisSiH8
Release Date:
=
2015-08-16
Vulnerability Laboratory
Document Title:
===
Microsoft HTA (HTML Application) - Remote Code Execution Vulnerability
(MS14-064)
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1576
Video: http://youtu.be/Vkswz7vt23M
http://web.nvd.nist.gov/view/vuln/detail?vulnI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3341-1 secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 20, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
ESA-2015-132: EMC Documentum D2 Fail Open Vulnerability
EMC Identifier: ESA-2015-132
CVE Identifier: CVE-2015-4537
Severity Rating: CVSS v2 Base Score: 8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C)
Affected products:
EMC Documentum D2 4.2 and earlier
On 8/19/2015 6:12 AM, paul.sz...@sydney.edu.au wrote:
What is happening: did they "stuff up" their spam filter,
is the moderator losing focus?
http://media.giphy.com/media/l41lUJ1YoZB1lHVPG/giphy.gif
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3340-1 secur...@debian.org
https://www.debian.org/security/ Alessandro Ghedini
August 19, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-3339-1 secur...@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 19, 2015
14 matches
Mail list logo