-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:020
http://www.mandriva.com/en/support/security
View online: https://drupal.org/node/2179099
* Advisory ID: DRUPAL-SA-CONTRIB-2014-004
* Project: Secure Cookie Data [1] (third-party module)
* Version: 7.x
* Date: 2014-January-22
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability
View online: https://drupal.org/node/2179103
* Advisory ID: DRUPAL-SA-CONTRIB-2014-005
* Project: Leaflet [1] (third-party module)
* Version: 7.x
* Date: 2014-January-22
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: https://drupal.org/node/2179085
* Advisory ID: DRUPAL-SA-CONTRIB-2014-003
* Project: Doubleclick for Publishers (DFP) [1] (third-party module)
* Version: 7.x
* Date: 2014-January-22
* Security risk: Moderately critical [2]
* Exploitable from: Remote
View online: https://drupal.org/node/2179123
* Advisory ID: DRUPAL-SA-CONTRIB-2014-006
* Project: Language Switcher Dropdown [1] (third-party module)
* Version: 7.x
* Date: 2014-January-22
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:013
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:014
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:011
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:012
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:007
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:008
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:009
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:010
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:002
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:003
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:004
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:005
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:006
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- ---
VMware Security Advisory
Advisory ID: VMSA-2014-0001
Synopsis:VMware Workstation, Player, Fusion, ESXi, ESX and vCloud
Director address several security
of 3.x should upgrade to 3.2.5 or later
- Users of 4.x should upgrade to 4.0.0 or later
(This is also fixed in 4.0.0-RC2 but users are recommended to use 4.0.0 or
later)
Credit:
This issue was identified by the Spring development team.
References:
http://www.gopivotal.com/security/cve-2013-6429
:
This issue was originally reported to the Spring Framework developers by Jon
Passki and the security implications brough to the attention of the Pivotal
security team by Arun Neelicattu.
References:
http://www.gopivotal.com/security/cve-2013-6430
https://jira.springsource.org/browse/SPR-9983
https
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Multiple Vulnerabilities in Cisco Secure Access
Control System
Advisory ID: cisco-sa-20140115-csacs
Revision 1.0
For Public Release 2014 January 15 12:00 UTC (GMT
View online: https://drupal.org/SA-CORE-2014-001
* Advisory ID: DRUPAL-SA-CORE-2014-001
* Project: Drupal core [1]
* Version: 6.x, 7.x
* Date: 2014-January-15
* Security risk: Highly critical [2]
* Exploitable from: Remote
* Vulnerability: Multiple vulnerabilities
View online: https://drupal.org/node/2173321
* Advisory ID: DRUPAL-SA-CONTRIB-2014-002
* Project: Anonymous Posting [1] (third-party module)
* Version: 7.x
* Date: 2014-01-15
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:001
http://www.mandriva.com/en/support/security
===
A vulnerability in the Cisco WAP4410N Wireless-N Access Point, Cisco WRVS4400N
Wireless-N Gigabit Security Router, and the Cisco RVS4000 4-port Gigabit
Security Router could allow an unauthenticated, remote attacker to gain
root-level access to an affected device.
Cisco will release free
View online: https://drupal.org/node/2169595
* Advisory ID: DRUPAL-SA-CONTRIB-2014-001
* Project: Entity API [1] (third-party module)
* Version: 7.x
* Date: 2014-January-08
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: https://drupal.org/node/2169767
* Advisory ID: PSA-2014-001
* Project: Media [1] (third-party module)
* Version: 7.x
* Date: 2014-01-08
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access Bypass
DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:302
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:300
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:301
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:299
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- ---
VMware Security Advisory
Advisory ID: VMSA-2013-0016
Synopsis:VMware ESXi and ESX unauthorized file access through
vCenter Server and ESX
Issue date
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:296
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:297
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:298
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:295
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:289
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:291
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:291
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:290
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:292
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:293
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:294
http://www.mandriva.com/en/support/security
View online: https://drupal.org/node/2158651
* Advisory ID: DRUPAL-SA-CONTRIB-2013-098
* Project: Ubercart [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2013-12-18
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Session Fixation
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:288
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:287-1
http://www.mandriva.com/en/support/security
Asterisk Project Security Advisory - AST-2013-006
ProductAsterisk
SummaryBuffer Overflow when receiving odd length 16 bit SMS
message
Asterisk Project Security Advisory - AST-2013-007
ProductAsterisk
SummaryAsterisk Manager User Dialplan Permission Escalation
Nature of Advisory Permission Escalation
Microsoft takes security vulnerability reports at sec...@microsoft.com, as
Dieyu mentioned on Friday.
-Original Message-
From: Full-Disclosure [mailto:full-disclosure-boun...@lists.grok.org.uk] On
Behalf Of Pedro Luis Karrasquillo
Sent: Friday, December 13, 2013 9:04 PM
To: full
Making a turn here, let's see what turns out!
I know that using Wireshark we can capture traffic in/out of the routers
interfaces.I don't want to dig up the routers concept because face it i already
know how it works and so do you.
I have only a few questions to ask.
1) The traffic on any device
of it human-readable?
On Tue, Dec 3, 2013 at 3:06 PM, ICSS Security ctrlaltdel...@outlook.pt wrote:
Making a turn here, let's see what turns out!
I know that using Wireshark we can capture traffic in/out of the routers
interfaces.I don't want to dig up the routers concept because face it i
View online: https://drupal.org/node/2149791
* Advisory ID: DRUPAL-SA-CONTRIB-2013-097
* Project: OG Features [1] (third-party module)
* Version: 6.x
* Date: 2013-December-04
* Security risk: Not Critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- ---
VMware Security Advisory
Advisory ID: VMSA-2013-0014
Synopsis:VMware Workstation, Fusion, ESXi and ESX patches
address a guest privilege
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:285
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:286
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:287
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:282
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:283
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:284
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:281
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:279
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:280
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:272
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:273
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:274
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:275
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:276
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:277
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:278
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:269
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:270
http://www.mandriva.com/en/support/security
View online: https://drupal.org/node/2140097
* Advisory ID: DRUPAL-SA-CONTRIB-2013-093
* Project: Invitation [1] (third-party module)
* Version: 7.x
* Date: 2013-November-20
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: https://drupal.org/node/2140123
* Advisory ID: DRUPAL-SA-CONTRIB-2013-094
* Project: EU Cookie Compliance [1] (third-party module)
* Version: 7.x
* Date: 2013-November-20
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross
View online: https://drupal.org/node/2140237
* Advisory ID: DRUPAL-SA-CONTRIB-2013-096
* Project: Entity reference [1] (third-party module)
* Version: 7.x
* Date: 2013-November-20
* Security risk: Not critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: https://drupal.org/node/2140217
* Advisory ID: DRUPAL-SA-CONTRIB-2013-095
* Project: Organic groups [1] (third-party module)
* Version: 7.x
* Date: 2013-November-20
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: https://drupal.org/SA-CORE-2013-003
* Advisory ID: DRUPAL-SA-CORE-2013-003
* Project: Drupal core [1]
* Version: 6.x, 7.x
* Date: 2013-November-20
* Security risk: Highly critical [2]
* Exploitable from: Remote
* Vulnerability: Multiple vulnerabilities
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:266
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:267
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:268
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
VMware Security Advisory
Advisory ID: VMSA-2013-0013
Synopsis:VMware Workstation host privilege escalation vulnerability
Issue date: 2013-11-14
Updated
View online: https://drupal.org/node/2135267
* Advisory ID: DRUPAL-SA-CONTRIB-2013-091
* Project: Groups, Communities and Co (GCC) [1] (third-party module)
* Version: 7.x
* Date: 2013-November-13
* Security risk: Moderately critical [2]
* Exploitable from: Remote
View online: https://drupal.org/node/2135257
* Advisory ID: DRUPAL-SA-CONTRIB-2013-090
* Project: Revisioning [1] (third-party module)
* Version: 7.x
* Date: 2013-November-13
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: https://drupal.org/node/2135273
* Advisory ID: DRUPAL-SA-CONTRIB-2013-092
* Project: Misery [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2013-November-13
* Security risk: Not critical [2]
* Exploitable from: Remote
* Vulnerability: Multiple
n.runs professionals GmbH
http://www.nruns.com/ security(at)nruns.com
n.runs-SA-2013.006 12-Nov-2013
Vendor: Microsoft, http
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:265
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Cisco TelePresence VX Clinical Assistant
Administrative Password Reset Vulnerability
Advisory ID: cisco-sa-20131106-tvxca
Revision 1.0
For Public Release 2013 November 6 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Cisco IOS Software Session Initiation Protocol Denial
of Service Vulnerability
Advisory ID: cisco-sa-20131106-sip
Revision 1.0
For Public Release 2013 November 6 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory
Cisco WAAS Mobile Remote Code Execution Vulnerability
Advisory ID: cisco-sa-20131106-waasm
Revision 1.0
For Public Release 2013 November 6 16:00 UTC (GMT
View online: https://drupal.org/node/2129373
* Advisory ID: DRUPAL-SA-CONTRIB-2013-087
* Project: Payment for Webform [1] (third-party module)
* Version: 7.x
* Date: 2013-November-06
* Security risk: Not critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: https://drupal.org/node/2129379
* Advisory ID: DRUPAL-SA-CONTRIB-2013-089
* Project: Node Access Keys [1] (third-party module)
* Version: 7.x
* Date: 2013-November-06
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access
View online: https://drupal.org/node/2129381
* Advisory ID: DRUPAL-SA-CONTRIB-2013-088
* Project: Secure Pages [1] (third-party module)
* Version: 6.x
* Date: 2013-November-06
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Missing Encryption
=
INTERNET SECURITY AUDITORS ALERT 2013-017
- Original release date: July 26th, 2013
- Last revised: July 26th, 2013
- Discovered by: Vicente Aguilera Diaz
- Severity: 6.8/10 (CVSSv2 Base Scored)
- CVE-ID: CVE-2013-6164
=
INTERNET SECURITY AUDITORS ALERT 2013-018
- Original release date: July 26th, 2013
- Last revised: July 26th, 2013
- Discovered by: Vicente Aguilera Diaz
- Severity: 4.3/10 (CVSSv2 Base Scored)
- CVE-ID: CVE-2013-6163
=
INTERNET SECURITY AUDITORS ALERT 2013-005
- Original release date: 3rd March 2013
- Last revised: 10th March 2013
- Discovered by: Eduardo Garcia Melia
- Severity: 5.2/10 (CVSS Base Scored)
=
I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:264
http://www.mandriva.com/en/support/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS XE Software for
1000 Series Aggregation Services Routers
Advisory ID: cisco-sa-20131030-asr1000
Revision 1.0
For Public Release 2013 October 30 16:00 UTC (GMT
View online: https://drupal.org/node/2124241
* Advisory ID: DRUPAL-SA-CONTRIB-2013-084
* Project: FileField Sources [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2013-Oct-30
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: https://drupal.org/node/2123995
* Advisory ID: DRUPAL-SA-CONTRIB-2013-083
* Project: Quiz [1] (third-party module)
* Version: 6.x
* Date: 2013-October-30
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass, Information
View online: https://drupal.org/node/2124279
* Advisory ID: DRUPAL-SA-CONTRIB-2013-085
* Project: Feed Element Mapper [1] (third-party module)
* Version: 6.x
* Date: 2013-October-30
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
101 - 200 of 3960 matches
Mail list logo