Intex Wireless N150 Easy Setup Router
Vulnerabilities
1. Overview
Intex Wireless N150 Easy Setup Router, firmware version: V5.07.51_en_INX01,
uses default credentials, vulnerable to cross-site request forgery, clear text
Transmission of Sensitive Information and other attacks.
2.
PERSICON Security Advisory
===
Title: Login Form Hijacking vulnerability
Product: Citrix Netscaler
Vulnerable Version: 11.0 Build 64.35
Fixed Version: 11.0 Build 66.11
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] php (SSA:2016-148-03)
New php packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--+
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
- -
Debian Security Advisory DSA-3588-1 secur...@debian.org
https://www.debian.org/security/Luciano Bello
May 29, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] libxml2 (SSA:2016-148-01)
New libxml2 packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--+
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] libxslt (SSA:2016-148-02)
New libxslt packages are available for Slackware 14.0, 14.1, and -current to
fix a security issue.
Here are the details from the Slackware 14.1 ChangeLog:
+--+
Description:
Jetty is a Java HTTP (Web) server and Servlet container.
The Jetty path normalization mechanism suffers of an implementation issue
when parsing the request URLs.
The path normalization logic implemented in the PathResource class and
introduced in Jetty versions 9.3.x can be
WebKitGTK+ Security Advisory WSA-2016-0004
Date reported : May 30, 2016
Advisory ID: WSA-2016-0004
Advisory
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3589-1 secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 30, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
1. ADVISORY INFORMATION
===
Product: Lorex ECO DVR
Vendor URL: https://www.lorextechnology.com/
Type: Hard coded password [CWE-259]
Date found: 2016-05-04
Date published: 2016-05-30
CVE: -
2. CREDITS
==
This
10 matches
Mail list logo