==
Secunia Research 03/08/2016
LibGD "_gdContributionsAlloc()" Integer Overflow
Denial of Service Vulnerability
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05219560
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05219560
Version: 1
HPSBGN03633
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco RV180 VPN and RV180W Wireless-N Multifunction
VPN Routers Remote Code Execution Vulnerability
Advisory ID: cisco-sa-20160803-rv180_2
Revision 1.0
For Public Release 2016 August 3 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco RV180 VPN and RV180W Wireless-N Multifunction
VPN Routers Unauthorized Access Vulnerability
Advisory ID: cisco-sa-20160803-rv180_1
Revision 1.0
For Public Release 2016 August 3 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco RV110W, RV130W, and RV215W Routers Static
Credential Vulnerability
Advisory ID: cisco-sa-20160803-rv110_130w2
Revision 1.0
For Public Release 2016 August 3 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco Unified Communications Manager IM and Presence
Service SIP Packet Processing Denial of Service Vulnerability
Advisory ID: cisco-sa-20160803-ucm
Revision 1.0
For Public Release 2016 August 3 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3639-1 secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 03, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3638-1 secur...@debian.org
https://www.debian.org/security/ Alessandro Ghedini
August 03, 2016
--
-
-
WorldCIST'17 - 5th World Conference on Information Systems and Technologies
Porto Santo Island, Madeira, Portugal
11th-13th of April 2017
http://www.worldcist.org/
---
WORKSHOP FORMAT
The Information Systems and Technologies research
Advisory ID: HTB23297
Product: Atutor
Vendor: Atutor
Vulnerable Version(s): 2.2.1 and probably prior
Tested Version: 2.2.1
Advisory Publication: February 24, 2016 [without technical details]
Vendor Notification: February 24, 2016
Vendor Patch: July 1, 2016
Public Disclosure: August 2, 2016
10 matches
Mail list logo