[Full-disclosure] Security Advent Calendar

2012-12-05 Thread Security Advent Calendar
Hello, This year there is an advent calendar aimed at security - http://secadvent.com Every day for the period Dec 1 -25 a security related article will be published on the website. Today's article is a crypto type puzzle. Best of luck from the Security Advent Cal

[Full-disclosure] [ MDVSA-2012:176 ] libxml2

2012-12-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:176 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:175 ] libssh

2012-11-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:175 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-172 - Zero Point - Cross Site Scripting (XSS)

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853376 * Advisory ID: DRUPAL-SA-CONTRIB-2012-172 * Project: Zero Point [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-November-28 * Security risk: Critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-168 - Services - Information Disclosure

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853200 * Advisory ID: DRUPAL-SA-CONTRIB-2012-168 * Project: Services [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-11-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Information Disclosure

[Full-disclosure] [Security-news] SA-CONTRIB-2012-170 - MultiLink - Access Bypass

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853244 * Advisory ID: DRUPAL-SA-CONTRIB-2012-170 * Project: Multi-Language Link and Redirect (MultiLink) [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-November-28 * Security risk: Moderately critical [2] * Exploitable from: Remote

[Full-disclosure] [Security-news] SA-CONTRIB-2012-171 - Webmail Plus - SQL injection - (unsupported)

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853268 * Advisory ID: DRUPAL-SA-CONTRIB-2012-171 * Project: Webmail Plus [1] (third-party module) * Version: 6.x * Date: 2012-November-28 * Security risk: Critical [2] * Exploitable from: Remote * Vulnerability: SQL Injection

[Full-disclosure] [Security-news] SA-CONTRIB-2012-169 - Email Field - Cross Site Scripting and Access bypass

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853214 * Advisory ID: DRUPAL-SA-CONTRIB-2012-169 * Project: Email Field [1] (third-party module) * Version: 6.x * Date: 2012-11-28 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2012-167 - Mixpanel - Cross site scripting (XSS)

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853198 * Advisory ID: DRUPAL-SA-CONTRIB-2012-167 * Project: Mixpanel [1] (third-party module) * Version: 6.x * Date: 2012-November-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [SE-2011-01] Additional materials released for SAT TV research

2012-11-27 Thread Security Explorations
Hello All, We have decided to release additional information about security issues discovered as part of our digital satellite TV research. This additional publication is done in a response to continuous inquiries received regarding SE-2011-01 project. Cumulative reports containing detailed

[Full-disclosure] [ MDVSA-2012:174 ] libtiff

2012-11-22 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:174 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:173 ] firefox

2012-11-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:173 http://www.mandriva.com/security

Re: [Full-disclosure] [SE-2012-01] Security vulnerabilities in Java SE (details released)

2012-11-21 Thread Security Explorations
Hello All, We have updated our project details page and added selected Proof of Concept codes to it that have been developed as part of our Java SE security research. They are available for download from SE-2012-01 project details page. Those willing to better understand Reflection API based

[Full-disclosure] n.runs-SA-2012.004 - SPLUNK Unauthenticated remote DoS

2012-11-19 Thread security
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2012.004 19-Nov-2012 Vendors:Splunk Inc., http://www.splunk.com Product:Splunk 4.0 - 4.3.4 Vulnerability: Unauthenticated remote

[Full-disclosure] n.runs-SA-2012.004 - SPLUNK Unauthenticated remote DoS

2012-11-19 Thread security
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2012.004 19-Nov-2012 Vendors:Splunk Inc., http://www.splunk.com Product:Splunk 4.0 - 4.3.4 Vulnerability: Unauthenticated remote

[Full-disclosure] [ MDVSA-2012:172 ] libproxy

2012-11-19 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:172 http://www.mandriva.com/security

[Full-disclosure] [SE-2012-01] Security vulnerabilities in Java SE (details released)

2012-11-19 Thread Security Explorations
Hello All, On 14 Nov 2012, Security Explorations delivered a talk at Devoxx Java Community Conference in Antwerp where we disclosed details pertaining to our research project verifying security of Java SE platform (project SE-2012-01). Presentation slides for this talk along with our more

[Full-disclosure] [Security-news] SA-CONTRIB-2012-166 - Table of Contents - Access Bypass

2012-11-14 Thread security-news
View online: http://drupal.org/node/1841046 * Advisory ID: DRUPAL-SA-CONTRIB-2012-166 * Project: Table of Contents [1] (third-party module) * Version: 6.x * Date: 2012-November-14 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2012-165 - Chaos tool suite (ctools) - Cross Site Scripting (XSS)

2012-11-14 Thread security-news
View online: http://drupal.org/node/1840992 * Advisory ID: DRUPAL-SA-CONTRIB-2012-165 * Project: Chaos tool suite (ctools) [1] (third-party module) * Version: 6.x * Date: 2012-November-14 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site

[Full-disclosure] [Security-news] SA-CONTRIB-2012-164 - Smiley module and Smileys module - Cross Site Scripting (XSS)

2012-11-14 Thread security-news
View online: http://drupal.org/node/1840892 * Advisory ID: DRUPAL-SA-CONTRIB-2012-164 * Project: Smiley [1] (third-party module) * Project: Smileys [2] (third-party module) * Version: 6.x * Date: 2012-November-14 * Security risk: Moderately critical [3] * Exploitable from: Remote

[Full-disclosure] [Security-news] SA-CONTRIB-2012-162 - RESTful Web Services - Cross site request forgery (CSRF)

2012-11-14 Thread security-news
View online: http://drupal.org/node/1840740 * Advisory ID: DRUPAL-SA-CONTRIB-2012-162 * Project: RESTful Web Services [1] (third-party module) * Version: 7.x * Date: 2012-November-14 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site

[Full-disclosure] [Security-news] SA-CONTRIB-2012-163 - User Read-Only - Permission escalation

2012-11-14 Thread security-news
View online: http://drupal.org/node/1840886 * Advisory ID: DRUPAL-SA-CONTRIB-2012-163 * Project: User Read-Only [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-November-14 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [ MDVSA-2012:171 ] icedtea-web

2012-11-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:171 http://www.mandriva.com/security

[Full-disclosure] Cisco Security Advisory: Cisco Ironport Appliances Sophos Anti-virus Vulnerabilities

2012-11-08 Thread Cisco Systems Product Security Incident Response Team
=== Cisco IronPort Email Security Appliances (ESA) and Cisco IronPort Web Security Appliances (WSA) include versions of Sophos Anti-Virus that contain multiple vulnerabilities that could allow an unauthenticated, remote attacker to gain control of the system, escalate privileges, or cause a

[Full-disclosure] [IA42] Zoner Photo Studio v15 Build 3 (Zps.exe) Registry Value Parsing Local Buffer Overflow

2012-11-08 Thread Inshell Security
Inshell Security Advisory http://www.inshell.net 1. ADVISORY INFORMATION --- Product:Zoner Photo Studio Vendor URL: www.zoner.com Type: Stack-based Buffer Overflow [CWE-121] Date found: 2012-10-17 Date published: 2012-11-09 CVSSv2 Score: 4,4 (AV:L

[Full-disclosure] [Security-news] SA-CONTRIB-2012-160 - OM Maximenu - Cross Site Scripting (XSS)

2012-11-07 Thread security-news
View online: http://drupal.org/node/1834866 * Advisory ID: DRUPAL-SA-CONTRIB-2012-160 * Project: OM Maximenu [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-November-07 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site

[Full-disclosure] [Security-news] SA-CONTRIB-2012-161 - Webform CiviCRM Integration - Access Bypass

2012-11-07 Thread security-news
View online: http://drupal.org/node/1834868 * Advisory ID: DRUPAL-SA-CONTRIB-2012-161 * Project: Webform CiviCRM Integration [1] (third-party module) * Version: 7.x * Date: 2012-November-07 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access

[Full-disclosure] Cisco Security Advisory: Cisco Secure Access Control System TACACS+ Authentication Bypass Vulnerability

2012-11-07 Thread Cisco Systems Product Security Incident Response Team
Secure ACS. Cisco has released free software updates that address this vulnerability. There are no workarounds for this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121107-acs -BEGIN PGP

[Full-disclosure] Cisco Security Advisory: Cisco Nexus 1000V Series Switch Software Release 4.2(1)SV1(5.2) Virtual Security Gateway Bypass Issue

2012-11-07 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Nexus 1000V Series Switch Software Release 4.2(1)SV1(5.2) Virtual Security Gateway Bypass Issue Document ID: cisco-sr-20121107-n1k Revision 1.0 For Public Release 2012 November 7 16:00 UTC (GMT

[Full-disclosure] [ MDVSA-2012:170 ] firefox

2012-11-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:170 http://www.mandriva.com/security

[Full-disclosure] n.runs-SA-2012.003 - SPLUNK DoS HashDOS

2012-11-02 Thread security
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2012.003 02-Nov-2012 Vendors:Splunk Inc., http://www.splunk.com Product

[Full-disclosure] n.runs-SA-2012.003 - SPLUNK DoS HashDOS

2012-11-02 Thread security
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2012.003 02-Nov-2012 Vendors:Splunk Inc., http://www.splunk.com Product

[Full-disclosure] [ MDVSA-2012:169 ] java-1.6.0-openjdk

2012-11-01 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:169 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-159 - Password policy - Information leakage of hashed passwords

2012-10-31 Thread security-news
View online: https://drupal.org/node/1828340 * Advisory ID: DRUPAL-SA-CONTRIB-2012-159 * Project: Password policy [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-October-31 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Information

[Full-disclosure] Cisco Security Advisory: Cisco Prime Data Center Network Manager Remote Command Execution Vulnerability

2012-10-31 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Cisco Prime Data Center Network Manager Remote Command Execution Vulnerability Advisory ID: cisco-sa-20121031-dcnm Revision 1.0 For Public Release 2012 October 31 16:00 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified MeetingPlace Web Conferencing

2012-10-31 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified MeetingPlace Web Conferencing Advisory ID: cisco-sa-20121031-mp Revision 1.0 For Public Release 2012 October 31 16:00 UTC (GMT

[Full-disclosure] [Security-news] SA-CONTRIB-2012-158 - MailChimp - Cross Site Scripting (XSS)

2012-10-24 Thread security-news
View online: http://drupal.org/node/1822166 * Advisory ID: DRUPAL-SA-CONTRIB-2012-158 * Project: MailChimp [1] (third-party module) * Version: 7.x * Date: 2012-October-24 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-157 - Time Spent - Multiple Vulnerabilities - (unsupported)

2012-10-24 Thread security-news
View online: https://drupal.org/node/1822066 * Advisory ID: DRUPAL-SA-CONTRIB-2012-157 * Project: Time Spent [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-October-24 * Security risk: Critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Cross

[Full-disclosure] [SE-2012-01] Challenging Oracle (in a different way)

2012-10-22 Thread Security Explorations
Hello All, On Oct 16, 2012, Oracle corporation released Java SE Critical Patch Update [1], which incorporated fixes for 19 security issues that we reported to the company earlier this year. This included a fix for a serious Issue 32 [2] found shortly after the out-of-band patch was released by

[Full-disclosure] [ MDVSA-2012:168 ] hostapd

2012-10-22 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:168 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CORE-2012-003 - Drupal core - Arbitrary PHP code execution and Information disclosure

2012-10-17 Thread security-news
View online: http://drupal.org/node/1815912 * Advisory ID: DRUPAL-SA-CORE-2012-003 * Project: Drupal core [1] * Version: 7.x * Date: 2012-October-17 * Security risk: Highly critical [2] * Exploitable from: Remote * Vulnerability: Information Disclosure, Arbitrary PHP code execution

[Full-disclosure] [Security-news] SA-CONTRIB-2012-156 - Search API - Cross Site Request Forgery (CSRF)

2012-10-17 Thread security-news
View online: http://drupal.org/node/1815770 * Advisory ID: DRUPAL-SA-CONTRIB-2012-156 * Project: Search API [1] (third-party module) * Version: 7.x * Date: 2012-October-17 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Request Forgery

[Full-disclosure] [ MDVSA-2012:167 ] firefox

2012-10-13 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:167 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:166 ] bacula

2012-10-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:166 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:165 ] graphicsmagick

2012-10-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:165 http://www.mandriva.com/security

[Full-disclosure] [CORE-2012-0613] - Cisco WebEx .wrf Memory Corruption Vulnerability

2012-10-11 Thread Core Security Advisories Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ Cisco WebEx .wrf Memory Corruption Vulnerability 1. *Advisory Information* Title: Cisco WebEx .wrf Memory Corruption Vulnerability Advisory ID: CORE-2012-0613 Advisory URL: http

[Full-disclosure] [ MDVSA-2012:164 ] libxslt

2012-10-11 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:164 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:163 ] firefox

2012-10-11 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:163 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-155 - ShareThis - Cross Site Scripting (XSS)

2012-10-10 Thread security-news
View online: http://drupal.org/node/1808856 * Advisory ID: DRUPAL-SA-CONTRIB-2012-155 * Project: ShareThis [1] (third-party module) * Version: 7.x * Date: 2012-October-10 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-154 - Basic webmail - Multiple vulnerabilities

2012-10-10 Thread security-news
View online: http://drupal.org/node/1808852 * Advisory ID: DRUPAL-SA-CONTRIB-2012-154 * Project: Basic webmail [1] (third-party module) * Version: 6.x * Date: 2012-October-10 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-153 - Mandrill - Information Disclosure

2012-10-10 Thread security-news
View online: http://drupal.org/node/1808846 * Advisory ID: DRUPAL-SA-CONTRIB-2012-153 * Project: Mandrill [1] (third-party module) * Version: 7.x * Date: 2012-October-10 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Information Disclosure

[Full-disclosure] [Security-news] SA-CONTRIB-2012-152 - Feeds - Access bypass

2012-10-10 Thread security-news
View online: https://drupal.org/node/1808832 * Advisory ID: DRUPAL-SA-CONTRIB-2012-152 * Project: Feeds [1] (third-party module) * Version: 7.x * Date: 2012-October-10 * Security risk: Not critical [2] * Exploitable from: Remote * Vulnerability: Access bypass DESCRIPTION

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in the Cisco WebEx Recording Format Player

2012-10-10 Thread Cisco Systems Product Security Incident Response Team
. Cisco has updated affected versions of the WebEx meeting sites and Cisco WebEx WRF Player to address these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex -BEGIN PGP SIGNATURE

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco Firewall Services Module

2012-10-10 Thread Cisco Systems Product Security Incident Response Team
result in a denial of service (DoS) condition. Cisco has released free software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module

2012-10-10 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module Advisory ID: cisco-sa-20121010-asa Revision 1.0 For Public Release 2012 October 10 16:00 UTC (GMT

[Full-disclosure] [ MDVSA-2012:162 ] bind

2012-10-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:162 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:161 ] html2ps

2012-10-06 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:161 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:160 ] imagemagick

2012-10-05 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:160 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:150-1 ] java-1.6.0-openjdk

2012-10-05 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:150-1 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:151-1 ] ghostscript

2012-10-05 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:151-1 http://www.mandriva.com/security

[Full-disclosure] VMSA-2012-0014 VMware vCenter Operations, CapacityIQ, and Movie Decoder security updates

2012-10-04 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 --- VMware Security Advisory Advisory ID: VMSA-2012-0014 Synopsis: VMware vCenter Operations, CapacityIQ, and Movie Decoder security updates Issue

[Full-disclosure] [Security-news] SA-CONTRIB-2012-151 - Commerce Extra Panes - Cross Site Request Forgery

2012-10-03 Thread security-news
View online: http://drupal.org/node/1802258 * Advisory ID: DRUPAL-SA-CONTRIB-2012-151 * Project: Commerce extra panes [1] (third-party module) * Version: 7.x * Date: 2012-October-3 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Request

[Full-disclosure] [Security-news] SA-CONTRIB-2012-150 - Twitter Pull - Cross Site Scripting (XSS)

2012-10-03 Thread security-news
View online: http://drupal.org/node/1802230 * Advisory ID: DRUPAL-SA-CONTRIB-2012-150 * Project: Twitter Pull [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-October-03 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-149 - Hostip - Cross Site Scripting (XSS)

2012-10-03 Thread security-news
View online: http://drupal.org/node/1802218 * Advisory ID: DRUPAL-SA-CONTRIB-2012-149 * Project: Hostip [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-October-03 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [ MDVSA-2012:159 ] freeradius

2012-10-03 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:159 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:158 ] gc

2012-10-03 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:158 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:157 ] openjpeg

2012-10-03 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:157 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:153-1 ] dhcp

2012-10-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:153-1 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:155-1 ] xinetd

2012-10-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:155-1 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:156 ] inn

2012-10-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:156 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:152-1 ] bind

2012-10-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:152-1 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:154-1 ] apache

2012-10-01 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:154-1 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:155 ] xinetd

2012-09-28 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:155 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:154 ] apache

2012-09-28 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:154 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-148 - OG - Access Bypass

2012-09-26 Thread security-news
View online: http://drupal.org/node/1796036 * Advisory ID: DRUPAL-SA-CONTRIB-2012-148 * Project: Organic groups [1] (third-party module) * Version: 7.x * Date: 2012-September-26 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] Cisco Security Advisory: Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ecc Note: The September 26, 2012, Cisco IOS Software Security Advisory

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software DHCP Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
released free software updates that address this vulnerability. A workaround that mitigates this vulnerability is available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-dhcp Note: The September 26, 2012

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software DHCP Version 6 Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
DHCP version 6 (DHCPv6) server feature enabled, causing a reload. Cisco has released free software updates that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-dhcpv6 Note: The

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Tunneled Traffic Queue Wedge Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
traffic from transiting the affected interfaces. Cisco has released free software updates that addresses this vulnerability. There are no workarounds for this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerabilities

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
updates that address these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-nat Note: The September 26, 2012, Cisco IOS Software Security Advisory bundled publication includes 9 Cisco Security

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Malformed Border Gateway Protocol Attribute Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-bgp Note: The September 26, 2012, Cisco IOS Software Security Advisory bundled publication includes 9 Cisco Security Advisories. Eight of the advisories address vulnerabilities in Cisco

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Intrusion Prevention System Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ios-ips Note: The September 26, 2012, Cisco IOS Software

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-sip Note: The September 26, 2012, Cisco IOS Software Security Advisory bundled publication includes 9 Cisco Security Advisories. Eight of the

[Full-disclosure] Cisco Security Advisory: Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-cucm Note: The September 26, 2012, Cisco IOS Software Security Advisory bundled publication includes 9 Cisco Security Advisories. Eight of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses a

Re: [Full-disclosure] [SE-2012-01] Critical security issue affecting Java SE 5/6/7

2012-09-26 Thread Security Explorations
ility to carry an early warning to the public regarding security risks identified in a given software / technology. Due to our "old fashioned" approach to communication (we don't tweet, blog, etc.), we carry these warnings by the means of sending posts to Bugtraq and Full Disclosur

[Full-disclosure] [SE-2012-01] Critical security issue affecting Java SE 5/6/7

2012-09-25 Thread Security Explorations
Hello All, We've recently discovered yet another security vulnerability affecting all latest versions of Oracle Java SE software. The impact of this issue is critical - we were able to successfully exploit it and achieve a complete Java security sandbox bypass in the environment of Java SE

[Full-disclosure] [Security-news] SA-CONTRIB-2012-147 - FileField Sources - Cross Site Scripting (XSS)

2012-09-19 Thread security-news
View online: http://drupal.org/node/1789306 * Advisory ID: DRUPAL-SA-CONTRIB-2012-147 * Project: FileField Sources [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-September-19 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site

[Full-disclosure] [Security-news] SA-CONTRIB-2012-146 - Simplenews Scheduler - Arbitrary code execution

2012-09-19 Thread security-news
View online: http://drupal.org/node/1789284 * Advisory ID: DRUPAL-SA-CONTRIB-2012-146 * Project: Simplenews Scheduler [1] (third-party module) * Version: 6.x * Date: 2012-September-19 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Arbitrary PHP

[Full-disclosure] [Security-news] SA-CONTRIB-2012-145 - Imagemenu - Cross Site Scripting (XSS)

2012-09-19 Thread security-news
View online: http://drupal.org/node/1789260 * Advisory ID: DRUPAL-SA-CONTRIB-2012-145 * Project: Imagemenu [1] (third-party module) * Version: 6.x * Date: 2012-September-19 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-144 Fonecta verify - Cross Site Scripting (XSS)

2012-09-19 Thread security-news
View online: http://drupal.org/node/1789258 * Advisory ID: DRUPAL-SA-CONTRIB-2012-144 * Project: Fonecta verify [1] (third-party module) * Version: 7.x * Date: 2012-September-19 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-143 PRH Search - Cross Site Scripting (XSS)

2012-09-19 Thread security-news
View online: http://drupal.org/node/1789252 * Advisory ID: DRUPAL-SA-CONTRIB-2012-143 * Project: PRH Search [1] (third-party module) * Version: 7.x * Date: 2012-September-19 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-142 - Spambot - Cross Site Scripting (XSS)

2012-09-19 Thread security-news
View online: http://drupal.org/node/1789242 * Advisory ID: DRUPAL-SA-CONTRIB-2012-142 * Project: Spambot [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-September-19 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [2.0 Update] Cisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client

2012-09-19 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client Advisory ID: cisco-sa-20120620-ac Revision 2.0 Last Updated 2012 September 19 16:01 UTC (GMT) For Public Release 2012 June 20 16:00 UTC (GMT

[Full-disclosure] [IA38] NCMedia Sound Editor Pro v7.5.1 MRUList201202.dat File Handling Local Buffer Overflow

2012-09-16 Thread Inshell Security
Inshell Security Advisory http://www.inshell.net 1. ADVISORY INFORMATION --- Product:Sound Editor Pro v7.5.1 Vendor URL: www.soundeditorpro.com Type: Stack-based Buffer Overflow [CWE-121] Date found: 2012-08-15 Date published: 2012-09-16 CVSSv2 Score

[Full-disclosure] [ MDVSA-2012:153 ] dhcp

2012-09-16 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:153 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:152 ] bind

2012-09-13 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:152 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-139 - PDFThumb OS Injection

2012-09-12 Thread security-news
View online: http://drupal.org/node/1782580 * Advisory ID: DRUPAL-SA-CONTRIB-2012-139 * Project: PDFThumb [1] (third-party module) * Version: 7.x * Date: 2012-September-12 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: OS Injection

[Full-disclosure] [Security-news] SA-CONTRIB-2012-141 - Mass Contact - Access bypass

2012-09-12 Thread security-news
View online: http://drupal.org/node/1782832 * Advisory ID: DRUPAL-SA-CONTRIB-2012-141 * Project: Mass Contact [1] (third-party module) * Version: 6.x * Date: 2012-September-12 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2012-140 - Inf08 - Cross Site Scripting (XSS)

2012-09-12 Thread security-news
View online: http://drupal.org/node/1782686 * Advisory ID: DRUPAL-SA-CONTRIB-2012-140 * Project: Inf08 [1] (third-party module) * Version: 6.x * Date: 2012-September-12 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] Cisco Security Advisory: Cisco ASA-CX and Cisco PRSM Log Retention Denial of Service Vulnerability

2012-09-12 Thread Cisco Systems Product Security Incident Response Team
) +- Summary === Cisco ASA-CX Context-Aware Security appliance and Cisco Prime Security Manager (PRSM) contain a denial of service (DoS) vulnerability in versions prior to 9.0.2-103. Successful exploitation of this vulnerability on the Cisco ASA-CX could cause the device to stop processing user

<    3   4   5   6   7   8   9   10   11   12   >