-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I. VULNERABILITY
- -
Multiple vulnerabilities in squid 0.4.16_2 running on pfSense
Version 2.3.1-RELEASE-p1
II. BACKGROUND
- -
The pfSense project is a free network firewall distribution, based on the
# Exploit Title: Skype for Business 2013 user enumeration timing attack
# Date: 2016-06-08
# Exploit Author: nyxgeek
# Vendor Homepage: https://www.microsoft.com
# Version: Skype for Business 2013
#
#
# Skype for Business 2013 is vulnerable to a timing attack that allows for
username enumeration
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-3604-1 secur...@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 16, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05176765
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05176765
Version: 1
HPSBNS03625
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05176716
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05176716
Version: 1
HPSBGN03553