-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:082
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:081
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:080
http://www.mandriva.com/security
View online: http://drupal.org/node/1597262
* Advisory ID: DRUPAL-SA-CONTRIB-2012-083
* Project: Taxonomy List [1] (third-party module)
* Version: 6.x
* Date: 2012-May-23
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1597364
* Advisory ID: DRUPAL-SA-CONTRIB-2012-084
* Project: Search API [1] (third-party module)
* Version: 7.x
* Date: 2012-May-23
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1597414
* Advisory ID: DRUPAL-SA-CONTRIB-2012-085
* Project: BrowserID (Mozilla Persona) [1] (third-party module)
* Version: 7.x
* Date: 2012-May-23
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Request
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:079
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:077
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:078
http://www.mandriva.com/security
View online: http://drupal.org/node/1585532
* Advisory ID: DRUPAL-SA-CONTRIB-2012-076
* Project: Ubercart Product Keys [1] (third-party module)
* Version: 6.x
* Date: 2012-May-16
* Security risk: Moderately Critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: http://drupal.org/node/1585544
* Advisory ID: DRUPAL-SA-CONTRIB-2012-077
* Project: Advertisement [1] (third-party module)
* Version: 6.x
* Date: 2012-May-16
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1585564
* Advisory ID: DRUPAL-SA-CONTRIB-2012-078
* Project: Smart Breadcrumb [1] (third-party module)
* Version: 6.x
* Date: 2012-May-16
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1585648
* Advisory ID: DRUPAL-SA-CONTRIB-2012-079
* Project: Post Affiliate Pro [1] (third-party module)
* Version: 6.x
* Date: 2012-May-16
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting, Access
View online: http://drupal.org/node/1585678
* Advisory ID: DRUPAL-SA-CONTRIB-2012-080
* Project: Hostmaster (Aegir) [1] (third-party module)
* Version: 6.x
* Date: 2012-May-16
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Multiple vulnerabilities
View online: http://drupal.org/node/1585890
* Advisory ID: DRUPAL-SA-CONTRIB-2012-081
* Project: Aberdeen [1] (third-party theme)
* Version: 6.x
* Date: 2012-May-16
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1585960
* Advisory ID: DRUPAL-SA-CONTRIB-2012-082
* Project: Zen [1] (third-party theme)
* Version: 6.x
* Date: 2012-May-16
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:075
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:076
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:074
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:073
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:068-1
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:071
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:072
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/
Windows Kernel ReadLayoutFile Heap Overflow
1. *Advisory Information*
Title: Windows Kernel ReadLayoutFile Heap Overflow
Advisory ID: CORE-2011-1123
Advisory URL:
http
View online: http://drupal.org/node/1569482
* Advisory ID: DRUPAL-SA-CONTRIB-2012-073
* Project: Glossary [1] (third-party module)
* Version: 6.x
* Date: 2012-May-09
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1569508
* Advisory ID: DRUPAL-SA-CONTRIB-2012-074
* Project: Contact Forms [1] (third-party module)
* Version: 7.x
* Date: 2012-May-09
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: http://drupal.org/node/1569512
* Advisory ID: DRUPAL-SA-CONTRIB-2012-075
* Project: Take Control [1] (third-party module)
* Version: 6.x
* Date: 2012-May-09
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Request Forgery
Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/
SAP Netweaver Dispatcher Multiple Vulnerabilities
1. *Advisory Information*
Title: SAP Netweaver Dispatcher Multiple Vulnerabilities
Advisory ID: CORE-2012-0123
Advisory URL:
http://www.coresecurity.com/content/sap-netweaver
for Papers and Call for
Workshops for c0c0n 2012 http://www.is-ra.org/c0c0n/, a 3-day Security
and Hacking Conference (1 day pre-conference workshop and 2 day
conference), full of interesting presentations, talks and of course filled
with fun!
The conference topics are divided into four domains as follows
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:069
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:070
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
---
VMware Security Advisory
Advisory ID: VMSA-2012-0009
Synopsis:VMware Workstation, Player, ESXi and ESX patches address
critical security
View online: http://drupal.org/node/1557852
* Advisory ID: DRUPAL-SA-CONTRIB-2012-068
* Project: Node Gallery [1] (third-party module)
* Version: 6.x
* Date: 2012-May-02
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Request Forgery
View online: http://drupal.org/node/1557868
* Advisory ID: DRUPAL-SA-CONTRIB-2012-069
* Project: Addressbook [1] (third-party module)
* Version: 6.x
* Date: 2012-May-02
* Security risk: Highly critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting, Cross Site
View online: http://drupal.org/node/1557872
* Advisory ID: DRUPAL-SA-CONTRIB-2012-070
* Project: Taxonomy Grid : Catalog [1] (third-party module)
* Version: 6.x
* Date: 2012-May-02
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1557874
* Advisory ID: DRUPAL-SA-CONTRIB-2012-071
* Project: Glossify Internal Links Auto SEO [1] (third-party module)
* Version: 6.x
* Date: 2012-May-02
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross
View online: http://drupal.org/node/1558248
* Advisory ID: DRUPAL-SA-CONTRIB-2012-072
* Project: cctags [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-May-02
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1557938
* Advisory ID: DRUPAL-SA-CORE-2012-002
* Project: Drupal core [1]
* Version: 7.x
* Date: 2012-May-2
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Denial of Service, Access bypass
DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:067
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:065
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
--
VMware Security Advisory
Advisory ID: VMSA-2012-0008
Synopsis:VMware ESX updates to ESX Service Console
Issue date: 2012-04-26
Updated on: 2012-04-26
View online: http://drupal.org/node/1547520
* Advisory ID: DRUPAL-SA-CONTRIB-2012-062
* Project: Creative Commons [1] (third-party module)
* Version: 6.x
* Date: 2012-April-25
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1547660
* Advisory ID: DRUPAL-SA-CONTRIB-2012-063
* Project: RealName [1] (third-party module)
* Version: 6.x
* Date: 2012-April-25
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1547674
* Advisory ID: DRUPAL-SA-CONTRIB-2012-064
* Project: Ubercart [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-April-25
* Security risk: Moderately critical [2]
* Exploitable from: Varies (Local Remote)
* Vulnerability: Cross
Hi - WIll you please remove me from this list? Thank you!
On Apr 25, 2012, at 12:49 PM, security-n...@drupal.org wrote:
security-n...@drupal.org
___
Security-news mailing list
security-n...@drupal.org
http://lists.drupal.org/mailman/listinfo
View online: http://drupal.org/node/1547686
* Advisory ID: DRUPAL-SA-CONTRIB-2012-065
* Project: Site Documentation [1] (third-party module)
* Version: 6.x
* Date: 2012-April-25
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Information
View online: http://drupal.org/node/1547736
* Advisory ID: DRUPAL-SA-CONTRIB-2012-066
* Project: Spaces [1] (third-party module)
* Version: 6.x
* Date: 2012-April-25
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
View online: http://drupal.org/node/1547738
* Advisory ID: DRUPAL-SA-CONTRIB-2012-067
* Project: Linkit [1] (third-party module)
* Version: 7.x
* Date: 2012-April-25
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:064
http://www.mandriva.com/security
Weblog
Fix
This issue was resolved with the release of MS12-025 [6]. It appears the
fix was part of a security push for System.Drawing.dll
Asterisk Project Security Advisory - AST-2012-004
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Asterisk Project Security Advisory - AST-2012-005
Product Asterisk
Summary Heap Buffer Overflow in Skinny Channel Driver
Nature of Advisory Exploitable Heap Buffer Overflow
Asterisk Project Security Advisory - AST-2012-006
Product Asterisk
Summary Remote Crash Vulnerability in SIP Channel Driver
Nature of Advisory Remote Crash
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:061
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:062
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:063
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:060
http://www.mandriva.com/security
View online: http://drupal.org/node/1538436
* Advisory ID: DRUPAL-SA-CONTRIB-2012-060
* Project: Commerce Reorder [1] (third-party module)
* Version: 7.x
* Date: 2012-April-18
* Security risk: Not critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Request Forgery
View online: http://drupal.org/node/1538704
* Advisory ID: DRUPAL-SA-CONTRIB-2012-061
* Project: Gigya - Social optimization [1] (third-party module)
* Version: 6.x
* Date: 2012-April-18
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:032-1
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:059
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:058
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:056
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:057
http://www.mandriva.com/security
Hello,
Security Explorations discovered a security vulnerability in Apple
Quicktime [1] software and its Java extensions in particular.
When combined with the Issue 15 reported to Oracle on Apr 2 2012 [2],
this new issue might be used to successfully bypass all JVM security
restrictions
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
---
VMware Security Advisory
Advisory ID: VMSA-2012-0007
Synopsis:VMware hosted products and ESXi/ESX patches address
privilege escalation
Issue
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:055
http://www.mandriva.com/security
View online: http://drupal.org/node/1528614
* Advisory ID: DRUPAL-SA-CONTRIB-2012-058
* Project: Fivestar [1] (third-party module)
* Version: 6.x
* Date: 2012-April-11
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Input Validation
View online: http://drupal.org/node/1528864
* Advisory ID: DRUPAL-SA-CONTRIB-2012-059
* Project: Autosave [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-April-11
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Request
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:054
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Buffer Overflow Vulnerabilities in the Cisco
WebEx Player
Advisory ID: cisco-sa-20120404-webex
Revision 1.0
For Public Release 2012 April 4 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:053
http://www.mandriva.com/security
* Advisory ID: DRUPAL-SA-CONTRIB-2012-056
* Project: Janrain Engage (formerly RPX) [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-April-04
* Security risk: Less critical [2]
* Exploitable from: Not exploitable
* Vulnerability: Sensitive Data Protection Vulnerability
* Advisory ID: DRUPAL-SA-CONTRIB-2012-057
* Project: Printer, email and PDF versions [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-April-04
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:050
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:051
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:052
http://www.mandriva.com/security
Hello,
The following information might be of interest for the readers of this
list. It's been sent to Bugtraq yesterday, but hasn't get to the list
yet.
Security Explorations, a security and vulnerability research company
from Poland, discovered multiple security issues in the latest version
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:046
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:047
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:048
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:049
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:045
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:043
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:044
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
---
VMware Security Advisory
Advisory ID: VMSA-2012-0006
Synopsis:VMware ESXi and ESX address several security issues
Issue date: 2012-03-29
Updated
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:042
http://www.mandriva.com/security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software RSVP Denial of Service Vulnerability
Advisory ID: cisco-sa-20120328-rsvp
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software Zone-Based Firewall Vulnerabilities
Advisory ID: cisco-sa-20120328-zbfw
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS Software
Traffic Optimization Features
Advisory ID: cisco-sa-20120328-mace
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software Network Address Translation
Vulnerability
Advisory ID: cisco-sa-20120328-nat
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
* Advisory ID: DRUPAL-SA-CONTRIB-2012-0XX
* Project: MultiBlock [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-March-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
DESCRIPTION
* Advisory ID: DRUPAL-SA-CONTRIB-2012-044
* Project: Contact Forms [1] (third-party module)
* Version: 6.x
* Date: 2012-March-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
DESCRIPTION
* Advisory ID: DRUPAL-SA-CONTRIB-2012-045
* Project: Share Buttons (AddToAny) by Lockerz [1] (third-party module)
* Version: 6.x
* Date: 2012-March-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
DESCRIPTION
* Advisory ID: DRUPAL-SA-CONTRIB-2012-047
* Project: Ubercart Views [1] (third-party module)
* Version: 6.x
* Date: 2012-March-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
DESCRIPTION
* Advisory ID: DRUPAL-SA-CONTRIB-2012-046
* Project: Bundle copy [1] (third-party module)
* Version: 7.x
* Date: 2012-March-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Arbitrary PHP code execution
DESCRIPTION
* Advisory ID: DRUPAL-SA-CONTRIB-2012-048
* Project: Contact Save [1] (third-party module)
* Version: 6.x
* Date: 2012-March-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
DESCRIPTION
* Advisory ID: DRUPAL-SA-CONTRIB-2012-049
* Project: ShareThis [1] (third-party module)
* Version: 7.x
* Date: 2012-March-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting, Cross Site Request Forgery
DESCRIPTION
* Advisory ID: DRUPAL-SA-CONTRIB-2012-050
* Project: CDN2 Video [1] (third-party module)
* Version: 6.x
* Date: 2012-March-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Multiple vulnerabilities
DESCRIPTION
* Advisory ID: DRUPAL-SA-CONTRIB-2012-053
* Project: Organic groups [1] (third-party module)
* Version: 6.x
* Date: 2012-March-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
DESCRIPTION
901 - 1000 of 3960 matches
Mail list logo