SafeNet SoftRemote Local Buffer Overflow - Security Advisory - SOS-09-008
Release Date. 30-Oct-2009
Vendor Notification Date. 20-Jul-2009
Product. SafeNet SoftRemote
Platform. Microsoft Windows
Affected versions. 10.8.5
[ONSEC-09-020] Mura CMS root folder disclosure
Objective: Mura CMS <= 5.1
Type: Disclosure of ways
Threat: Medium
Date Discovered: 22.09.2009
Date of notification Developer: 22.09.2009
Released corrections:
Author: Vladimir Vorontsov
OnSec Russian Security Group (onsec [dot] ru)
Descriptio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2009:291
http://www.mandriva.com/security/
where is the test vuln code ?
2009/10/28 iDefense Labs
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> iDefense Security Advisory 10.28.09
> http://labs.idefense.com/intelligence/vulnerabilities/
> Oct 28, 2009
>
> I. BACKGROUND
>
> Firefox is the Mozilla Foundation's open source internet
2WIRE REMOTE DENIAL OF SERVICE
Device: 2wire Gateway Router/Modem
Vulnerable Software: =< 5.29.52
Vulnerable Models: 1700HG
1701HG
1800HW
2071
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2009:290
http://www.mandriva.com/security/
"""
> FRHACK: By Hackers, For Hackers! http://www.frhack.org
##
FRHACK is the First International IT Security Conference, by hackers -
for hackers, in France!
FRHACK is not commercial - but - highly technical.
"""
Here's an insane keynote b
==
Secunia Research 28/10/2009
- Mozilla Firefox Floating Point Memory Allocation Vulnerability -
==
Table of Contents
Affected Softwa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1921-1 secur...@debian.org
http://www.debian.org/security/ Giuseppe Iuculano
October 28, 2009
ZDI-09-074: Multiple Vendor Hummingbird STR Service Stack Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-09-074
October 28, 2009
-- Affected Vendors:
EMC
OpenText
-- Affected Products:
EMC Documentum eRoom
OpenText Hummingbird
OpenText Search Server
--
Hi all,
we've developed a Wireshark plugin that will allow you to view
obfuscated pcaps of traffic from a Mariposa infected client and actually
decrypt them within Wireshark. The software is available to all as open
source software under the GNU GPL license. We hope that it helps in
doing further
That sure would have be some funny words, glad I'm not talking about
how difficult to exploit it is! That would make me look pretty dumb
bringing something totally unrelated to my comment into the argument.
Yeep.
2009/10/29 laurent gaffie :
> Bonjour Fionnbharr Davies!,
>
> I'm glad to ma
12 matches
Mail list logo