[Full-disclosure] [ MDVSA-2012:082 ] pidgin

2012-05-28 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:082 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:081 ] firefox

2012-05-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:081 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:080 ] wireshark

2012-05-23 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:080 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-083 - Taxonomy List - Cross Site Scripting (XSS)

2012-05-23 Thread security-news
View online: http://drupal.org/node/1597262 * Advisory ID: DRUPAL-SA-CONTRIB-2012-083 * Project: Taxonomy List [1] (third-party module) * Version: 6.x * Date: 2012-May-23 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-084 - Search API - Cross Site Scripting (XSS)

2012-05-23 Thread security-news
View online: http://drupal.org/node/1597364 * Advisory ID: DRUPAL-SA-CONTRIB-2012-084 * Project: Search API [1] (third-party module) * Version: 7.x * Date: 2012-May-23 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-085 - BrowserID - Multiple Vulnerabilities

2012-05-23 Thread security-news
View online: http://drupal.org/node/1597414 * Advisory ID: DRUPAL-SA-CONTRIB-2012-085 * Project: BrowserID (Mozilla Persona) [1] (third-party module) * Version: 7.x * Date: 2012-May-23 * Security risk: Critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Request

[Full-disclosure] [ MDVSA-2012:079 ] sudo

2012-05-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:079 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:077 ] imagemagick

2012-05-17 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:077 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:078 ] imagemagick

2012-05-17 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:078 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-076 - Ubercart Product Keys Access Bypass

2012-05-16 Thread security-news
View online: http://drupal.org/node/1585532 * Advisory ID: DRUPAL-SA-CONTRIB-2012-076 * Project: Ubercart Product Keys [1] (third-party module) * Version: 6.x * Date: 2012-May-16 * Security risk: Moderately Critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2012-77 - Advertisement - Cross Site Scripting Information Disclosure

2012-05-16 Thread security-news
View online: http://drupal.org/node/1585544 * Advisory ID: DRUPAL-SA-CONTRIB-2012-077 * Project: Advertisement [1] (third-party module) * Version: 6.x * Date: 2012-May-16 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-078 - Smart Breadcrumb - Cross Site Scripting (XSS)

2012-05-16 Thread security-news
View online: http://drupal.org/node/1585564 * Advisory ID: DRUPAL-SA-CONTRIB-2012-078 * Project: Smart Breadcrumb [1] (third-party module) * Version: 6.x * Date: 2012-May-16 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-079 - Post Affiliate Pro - Cross Site Scripting (XSS) and Access Bypass - Unsupported

2012-05-16 Thread security-news
View online: http://drupal.org/node/1585648 * Advisory ID: DRUPAL-SA-CONTRIB-2012-079 * Project: Post Affiliate Pro [1] (third-party module) * Version: 6.x * Date: 2012-May-16 * Security risk: Critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Access

[Full-disclosure] [Security-news] SA-CONTRIB-2012-080 - Hostmaster (Aegir) - Access Bypass and Cross Site Scripting (XSS)

2012-05-16 Thread security-news
View online: http://drupal.org/node/1585678 * Advisory ID: DRUPAL-SA-CONTRIB-2012-080 * Project: Hostmaster (Aegir) [1] (third-party module) * Version: 6.x * Date: 2012-May-16 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Multiple vulnerabilities

[Full-disclosure] [Security-news] SA-CONTRIB-2012-081 - Aberdeen - Cross Site Scripting

2012-05-16 Thread security-news
View online: http://drupal.org/node/1585890 * Advisory ID: DRUPAL-SA-CONTRIB-2012-081 * Project: Aberdeen [1] (third-party theme) * Version: 6.x * Date: 2012-May-16 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-082 - Zen - Cross Site Scripting

2012-05-16 Thread security-news
View online: http://drupal.org/node/1585960 * Advisory ID: DRUPAL-SA-CONTRIB-2012-082 * Project: Zen [1] (third-party theme) * Version: 6.x * Date: 2012-May-16 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [ MDVSA-2012:075 ] ffmpeg

2012-05-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:075 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:076 ] ffmpeg

2012-05-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:076 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:074 ] ffmpeg

2012-05-14 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:074 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:073 ] openssl

2012-05-11 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:073 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:068-1 ] php

2012-05-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:068-1 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:071 ] php

2012-05-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:071 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:072 ] roundcubemail

2012-05-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:072 http://www.mandriva.com/security

[Full-disclosure] CORE-2011-1123: Windows Kernel ReadLayoutFile Heap Overflow

2012-05-09 Thread Core Security Advisories Team (fr)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ Windows Kernel ReadLayoutFile Heap Overflow 1. *Advisory Information* Title: Windows Kernel ReadLayoutFile Heap Overflow Advisory ID: CORE-2011-1123 Advisory URL: http

[Full-disclosure] [Security-news] SA-CONTRIB-2012-073 - Glossary - Cross-Site Scripting (XSS)

2012-05-09 Thread security-news
View online: http://drupal.org/node/1569482 * Advisory ID: DRUPAL-SA-CONTRIB-2012-073 * Project: Glossary [1] (third-party module) * Version: 6.x * Date: 2012-May-09 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-074 - Contact Forms - Access Bypass

2012-05-09 Thread security-news
View online: http://drupal.org/node/1569508 * Advisory ID: DRUPAL-SA-CONTRIB-2012-074 * Project: Contact Forms [1] (third-party module) * Version: 7.x * Date: 2012-May-09 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2012-075 - Take Control - Cross Site Request Forgery (CSRF)

2012-05-09 Thread security-news
View online: http://drupal.org/node/1569512 * Advisory ID: DRUPAL-SA-CONTRIB-2012-075 * Project: Take Control [1] (third-party module) * Version: 6.x * Date: 2012-May-09 * Security risk: Critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Request Forgery

[Full-disclosure] CORE-2012-0123 - SAP Netweaver Dispatcher Multiple Vulnerabilities

2012-05-08 Thread CORE Security Technologies Advisories
Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ SAP Netweaver Dispatcher Multiple Vulnerabilities 1. *Advisory Information* Title: SAP Netweaver Dispatcher Multiple Vulnerabilities Advisory ID: CORE-2012-0123 Advisory URL: http://www.coresecurity.com/content/sap-netweaver

[Full-disclosure] c0c0n 2012 CFP - Extended Deadline: May 15, 2012

2012-05-07 Thread c0c0n International Information Security Conference
for Papers and Call for Workshops for c0c0n 2012 http://www.is-ra.org/c0c0n/, a 3-day Security and Hacking Conference (1 day pre-conference workshop and 2 day conference), full of interesting presentations, talks and of course filled with fun! The conference topics are divided into four domains as follows

[Full-disclosure] [ MDVSA-2012:069 ] cifs-utils

2012-05-04 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:069 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:070 ] samba

2012-05-04 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:070 http://www.mandriva.com/security

[Full-disclosure] VMSA-2012-0009 VMware Workstation, Player, ESXi and ESX patches address critical security issues

2012-05-03 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 --- VMware Security Advisory Advisory ID: VMSA-2012-0009 Synopsis:VMware Workstation, Player, ESXi and ESX patches address critical security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-068 - Node Gallery - Cross Site Request Forgery (CSRF) - Unsupported

2012-05-02 Thread security-news
View online: http://drupal.org/node/1557852 * Advisory ID: DRUPAL-SA-CONTRIB-2012-068 * Project: Node Gallery [1] (third-party module) * Version: 6.x * Date: 2012-May-02 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Request Forgery

[Full-disclosure] [Security-news] SA-CONTRIB-2012-069 - Addressbook - Multiple vulnerabilities - Unsupported

2012-05-02 Thread security-news
View online: http://drupal.org/node/1557868 * Advisory ID: DRUPAL-SA-CONTRIB-2012-069 * Project: Addressbook [1] (third-party module) * Version: 6.x * Date: 2012-May-02 * Security risk: Highly critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Cross Site

[Full-disclosure] [Security-news] SA-CONTRIB-2012-070 - Taxonomy Grid : Catalog - Cross Site Scripting (XSS) - Unsupported

2012-05-02 Thread security-news
View online: http://drupal.org/node/1557872 * Advisory ID: DRUPAL-SA-CONTRIB-2012-070 * Project: Taxonomy Grid : Catalog [1] (third-party module) * Version: 6.x * Date: 2012-May-02 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-071 - Glossify - Cross Site Scripting (XSS) - Unsupported

2012-05-02 Thread security-news
View online: http://drupal.org/node/1557874 * Advisory ID: DRUPAL-SA-CONTRIB-2012-071 * Project: Glossify Internal Links Auto SEO [1] (third-party module) * Version: 6.x * Date: 2012-May-02 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross

[Full-disclosure] [Security-news] SA-CONTRIB-2012-072 - cctags - Cross Site Scripting (XSS)

2012-05-02 Thread security-news
View online: http://drupal.org/node/1558248 * Advisory ID: DRUPAL-SA-CONTRIB-2012-072 * Project: cctags [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-May-02 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CORE-2012-002 - Drupal core multiple vulnerabilities

2012-05-02 Thread security-news
View online: http://drupal.org/node/1557938 * Advisory ID: DRUPAL-SA-CORE-2012-002 * Project: Drupal core [1] * Version: 7.x * Date: 2012-May-2 * Security risk: Critical [2] * Exploitable from: Remote * Vulnerability: Denial of Service, Access bypass DESCRIPTION

[Full-disclosure] [ MDVSA-2012:067 ] samba

2012-05-01 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:067 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:065 ] php

2012-04-27 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:065 http://www.mandriva.com/security

[Full-disclosure] VMSA-2012-0008 VMware ESX updates to ESX Service Console

2012-04-26 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 -- VMware Security Advisory Advisory ID: VMSA-2012-0008 Synopsis:VMware ESX updates to ESX Service Console Issue date: 2012-04-26 Updated on: 2012-04-26

[Full-disclosure] [Security-news] SA-CONTRIB-2012-062 - Creative Commons - Cross Site Scripting (XSS)

2012-04-25 Thread security-news
View online: http://drupal.org/node/1547520 * Advisory ID: DRUPAL-SA-CONTRIB-2012-062 * Project: Creative Commons [1] (third-party module) * Version: 6.x * Date: 2012-April-25 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-063 - RealName - Cross Site Scripting (XSS)

2012-04-25 Thread security-news
View online: http://drupal.org/node/1547660 * Advisory ID: DRUPAL-SA-CONTRIB-2012-063 * Project: RealName [1] (third-party module) * Version: 6.x * Date: 2012-April-25 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-064 - Ubercart - Multiple vulnerabilities

2012-04-25 Thread security-news
View online: http://drupal.org/node/1547674 * Advisory ID: DRUPAL-SA-CONTRIB-2012-064 * Project: Ubercart [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-April-25 * Security risk: Moderately critical [2] * Exploitable from: Varies (Local Remote) * Vulnerability: Cross

Re: [Full-disclosure] [Security-news] SA-CONTRIB-2012-063 - RealName - Cross Site Scripting (XSS)

2012-04-25 Thread security-news
Hi - WIll you please remove me from this list? Thank you! On Apr 25, 2012, at 12:49 PM, security-n...@drupal.org wrote: security-n...@drupal.org ___ Security-news mailing list security-n...@drupal.org http://lists.drupal.org/mailman/listinfo

[Full-disclosure] [Security-news] SA-CONTRIB-2012-065 - Sitedoc - Information disclosure

2012-04-25 Thread security-news
View online: http://drupal.org/node/1547686 * Advisory ID: DRUPAL-SA-CONTRIB-2012-065 * Project: Site Documentation [1] (third-party module) * Version: 6.x * Date: 2012-April-25 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Information

[Full-disclosure] [Security-news] SA-CONTRIB-2012-066 - Spaces and Spaces OG - Access Bypass

2012-04-25 Thread security-news
View online: http://drupal.org/node/1547736 * Advisory ID: DRUPAL-SA-CONTRIB-2012-066 * Project: Spaces [1] (third-party module) * Version: 6.x * Date: 2012-April-25 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2012-067 - Linkit - Access bypass

2012-04-25 Thread security-news
View online: http://drupal.org/node/1547738 * Advisory ID: DRUPAL-SA-CONTRIB-2012-067 * Project: Linkit [1] (third-party module) * Version: 7.x * Date: 2012-April-25 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [ MDVSA-2012:064 ] openssl0.9.8

2012-04-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:064 http://www.mandriva.com/security

[Full-disclosure] .NET Framework EncoderParameter integer overflow vulnerability

2012-04-23 Thread Akita Software Security
Weblog Fix This issue was resolved with the release of MS12-025 [6]. It appears the fix was part of a security push for System.Drawing.dll

[Full-disclosure] AST-2012-004: Asterisk Manager User Unauthorized Shell Access

2012-04-23 Thread Asterisk Security Team
Asterisk Project Security Advisory - AST-2012-004 Product Asterisk Summary Asterisk Manager User Unauthorized Shell Access Nature of Advisory Permission Escalation

[Full-disclosure] AST-2012-005: Heap Buffer Overflow in Skinny Channel Driver

2012-04-23 Thread Asterisk Security Team
Asterisk Project Security Advisory - AST-2012-005 Product Asterisk Summary Heap Buffer Overflow in Skinny Channel Driver Nature of Advisory Exploitable Heap Buffer Overflow

[Full-disclosure] AST-2012-006: Remote Crash Vulnerability in SIP Channel Driver

2012-04-23 Thread Asterisk Security Team
Asterisk Project Security Advisory - AST-2012-006 Product Asterisk Summary Remote Crash Vulnerability in SIP Channel Driver Nature of Advisory Remote Crash

[Full-disclosure] [ MDVSA-2012:061 ] raptor

2012-04-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:061 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:062 ] openoffice.org

2012-04-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:062 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:063 ] libreoffice

2012-04-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:063 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:060 ] openssl

2012-04-19 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:060 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-060 - Commerce Reorder - Cross Site Request Forgery

2012-04-18 Thread security-news
View online: http://drupal.org/node/1538436 * Advisory ID: DRUPAL-SA-CONTRIB-2012-060 * Project: Commerce Reorder [1] (third-party module) * Version: 7.x * Date: 2012-April-18 * Security risk: Not critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Request Forgery

[Full-disclosure] [Security-news] SA-CONTRIB-2012-061 - Gigya - Social optimization - Cross Site Scripting (XSS)

2012-04-18 Thread security-news
View online: http://drupal.org/node/1538704 * Advisory ID: DRUPAL-SA-CONTRIB-2012-061 * Project: Gigya - Social optimization [1] (third-party module) * Version: 6.x * Date: 2012-April-18 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site

[Full-disclosure] [ MDVSA-2012:032-1 ] mozilla

2012-04-17 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:032-1 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:059 ] python-sqlalchemy

2012-04-16 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:059 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:058 ] curl

2012-04-13 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:058 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:056 ] rpm

2012-04-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:056 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:057 ] freetype2

2012-04-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:057 http://www.mandriva.com/security

[Full-disclosure] [SE-2012-01] Security weakness in Apple Quicktime Java extensions

2012-04-12 Thread Security Explorations
Hello, Security Explorations discovered a security vulnerability in Apple Quicktime [1] software and its Java extensions in particular. When combined with the Issue 15 reported to Oracle on Apr 2 2012 [2], this new issue might be used to successfully bypass all JVM security restrictions

[Full-disclosure] VMSA-2012-0007 VMware hosted products and ESXi/ESX patches address privilege escalation

2012-04-12 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 --- VMware Security Advisory Advisory ID: VMSA-2012-0007 Synopsis:VMware hosted products and ESXi/ESX patches address privilege escalation Issue

[Full-disclosure] [ MDVSA-2012:055 ] samba

2012-04-11 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:055 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-058 - Fivestar - Input Validation

2012-04-11 Thread security-news
View online: http://drupal.org/node/1528614 * Advisory ID: DRUPAL-SA-CONTRIB-2012-058 * Project: Fivestar [1] (third-party module) * Version: 6.x * Date: 2012-April-11 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Input Validation

[Full-disclosure] [Security-news] SA-CONTRIB-2012-059 - Autosave - Cross Site Scripting

2012-04-11 Thread security-news
View online: http://drupal.org/node/1528864 * Advisory ID: DRUPAL-SA-CONTRIB-2012-059 * Project: Autosave [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-April-11 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Request

[Full-disclosure] [ MDVSA-2012:054 ] libtiff

2012-04-05 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:054 http://www.mandriva.com/security

[Full-disclosure] Cisco Security Advisory: Buffer Overflow Vulnerabilities in the Cisco WebEx Player

2012-04-04 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Buffer Overflow Vulnerabilities in the Cisco WebEx Player Advisory ID: cisco-sa-20120404-webex Revision 1.0 For Public Release 2012 April 4 16:00 UTC (GMT

[Full-disclosure] [ MDVSA-2012:053 ] ocsinventory

2012-04-04 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:053 http://www.mandriva.com/security

[Full-disclosure] [Security-news] SA-CONTRIB-2012-056 - Janrain Engage - Sensitive Data Protection Vulnerability

2012-04-04 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-056 * Project: Janrain Engage (formerly RPX) [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-April-04 * Security risk: Less critical [2] * Exploitable from: Not exploitable * Vulnerability: Sensitive Data Protection Vulnerability

[Full-disclosure] [Security-news] SA-CONTRIB-2012-057 - Printer, email and PDF versions - Cross Site Scripting (XSS)

2012-04-04 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-057 * Project: Printer, email and PDF versions [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-April-04 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting DESCRIPTION

[Full-disclosure] [ MDVSA-2012:050 ] phpmyadmin

2012-04-03 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:050 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:051 ] libvorbis

2012-04-03 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:051 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:052 ] libvorbis

2012-04-03 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:052 http://www.mandriva.com/security

[Full-disclosure] [SE-2012-01] Security vulnerabilities in Java SE

2012-04-03 Thread Security Explorations
Hello, The following information might be of interest for the readers of this list. It's been sent to Bugtraq yesterday, but hasn't get to the list yet. Security Explorations, a security and vulnerability research company from Poland, discovered multiple security issues in the latest version

[Full-disclosure] [ MDVSA-2012:046 ] libpng

2012-04-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:046 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:047 ] freeradius

2012-04-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:047 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:048 ] mutt

2012-04-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:048 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:049 ] nagios

2012-04-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:049 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:045 ] gnutls

2012-03-30 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:045 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:043 ] nginx

2012-03-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:043 http://www.mandriva.com/security

[Full-disclosure] [ MDVSA-2012:044 ] cvs

2012-03-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:044 http://www.mandriva.com/security

[Full-disclosure] VMSA-2012-0006 VMware ESXi and ESX address several security issues

2012-03-29 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 --- VMware Security Advisory Advisory ID: VMSA-2012-0006 Synopsis:VMware ESXi and ESX address several security issues Issue date: 2012-03-29 Updated

[Full-disclosure] [ MDVSA-2012:042 ] wireshark

2012-03-28 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2012:042 http://www.mandriva.com/security

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software RSVP Denial of Service Vulnerability

2012-03-28 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Cisco IOS Software RSVP Denial of Service Vulnerability Advisory ID: cisco-sa-20120328-rsvp Revision 1.0 For Public Release 2012 March 28 16:00 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Zone-Based Firewall Vulnerabilities

2012-03-28 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Cisco IOS Software Zone-Based Firewall Vulnerabilities Advisory ID: cisco-sa-20120328-zbfw Revision 1.0 For Public Release 2012 March 28 16:00 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS Software Traffic Optimization Features

2012-03-28 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS Software Traffic Optimization Features Advisory ID: cisco-sa-20120328-mace Revision 1.0 For Public Release 2012 March 28 16:00 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerability

2012-03-28 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerability Advisory ID: cisco-sa-20120328-nat Revision 1.0 For Public Release 2012 March 28 16:00 UTC (GMT

[Full-disclosure] [Security-news] SA-CONTRIB-2012-043 - MultiBlock - Cross Site Scripting

2012-03-28 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-0XX * Project: MultiBlock [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-March-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting DESCRIPTION

[Full-disclosure] [Security-news] SA-CONTRIB-2012-044 - Contact Forms - Cross Site Scripting

2012-03-28 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-044 * Project: Contact Forms [1] (third-party module) * Version: 6.x * Date: 2012-March-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting DESCRIPTION

[Full-disclosure] [Security-news] SA-CONTRIB-2012-045 - AddToAny - Cross Site Scripting

2012-03-28 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-045 * Project: Share Buttons (AddToAny) by Lockerz [1] (third-party module) * Version: 6.x * Date: 2012-March-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting DESCRIPTION

[Full-disclosure] [Security-news] SA-CONTRIB-2012-047 - Ubercart Views - Information disclosure

2012-03-28 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-047 * Project: Ubercart Views [1] (third-party module) * Version: 6.x * Date: 2012-March-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass DESCRIPTION

[Full-disclosure] [Security-news] SA-CONTRIB-2012-046 - Bundle Copy - Arbitrary Code execution

2012-03-28 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-046 * Project: Bundle copy [1] (third-party module) * Version: 7.x * Date: 2012-March-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Arbitrary PHP code execution DESCRIPTION

[Full-disclosure] [Security-news] SA-CONTRIB-2012-048 - Contact Save - Cross Site Scripting

2012-03-28 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-048 * Project: Contact Save [1] (third-party module) * Version: 6.x * Date: 2012-March-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting DESCRIPTION

[Full-disclosure] [Security-news] SA-CONTRIB-2012-049 - ShareThis - Multiple Vulnerablies

2012-03-28 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-049 * Project: ShareThis [1] (third-party module) * Version: 7.x * Date: 2012-March-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Cross Site Request Forgery DESCRIPTION

[Full-disclosure] [Security-news] SA-CONTRIB-2012-050 - CDN2 Video - Unsupported

2012-03-28 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-050 * Project: CDN2 Video [1] (third-party module) * Version: 6.x * Date: 2012-March-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Multiple vulnerabilities DESCRIPTION

[Full-disclosure] [Security-news] SA-CONTRIB-2012-053 - Organic Groups - Access Bypass

2012-03-28 Thread security-news
* Advisory ID: DRUPAL-SA-CONTRIB-2012-053 * Project: Organic groups [1] (third-party module) * Version: 6.x * Date: 2012-March-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass DESCRIPTION

<    5   6   7   8   9   10   11   12   13   14   >