-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
ESA-2014-009: RSA BSAFEĀ® SSL-J Multiple Vulnerabilities
EMC Identifier: ESA-2014-009
CVE Identifier: CVE-2011-1473, CVE-2014-0625, CVE-2014-0626, CVE-2014-0627
Severity Rating: CVSS v2 Base Score: See below for individual scores
Affected
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:034
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:031
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:033
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:032
http://www.mandriva.com/en/support/security/
** WORKSHOPS
***
CISTI'2014 - 9th Iberian Conference on Information Systems and Technologies
Barcelona, Spain, June 18 - 21, 2014
Dell SecureWorks Security Advisory SWRX-2014-001
Open Web Analytics Pre-Auth SQL Injection
Advisory Information
Title: Open Web Analytics Pre-Auth SQL Injection
Advisory ID: SWRX-2014-001
Advisory URL:
http://www.secureworks.com/cyber-threat-intelligence/advisories/SWRX-2014-001/
Date published:
###
# phpmybackuppro Cross-Site Scripting vulnerability
###
#
#
# @@@@@@@ @@@@@ @@@
# @@@@@@@@@ @@ @@@ @@@@@
Vulnerable products : Linksys EA2700, EA3500, E4200, EA4500
Vulnerability:
Due to an unknown bug, which occurs by every indication during the
installation and/or upgrade process, port 8083 will often open,
allowing for direct bypass of authentication to the classic Linksys
GUI administrative
Document Title:
===
mbDriveHD v1.0.7 iOS - Multiple Web Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1198
Release Date:
=
2014-02-14
Vulnerability Laboratory ID (VL-ID):
Document Title:
===
File Hub v1.9.1 iOS - Multiple Web Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1195
Release Date:
=
2014-02-15
Vulnerability Laboratory ID (VL-ID):
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2861-1 secur...@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
February 16, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2862-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
February 16, 2014
CVE-2014-1861
Affected versions: 4.3.3
4.3.1 and probably prior versions.
Jetro Cockpit Secure Browsing makes use of a client running on a
user's workstation in the enterprise's internal network, and a server
in the DMZ that connects on the client's behalf to the
Document Title:
===
My PDF Creator DE DM v1.4 iOS - Multiple Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1201
Release Date:
=
2014-02-16
Vulnerability Laboratory ID (VL-ID):
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:035
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:036
http://www.mandriva.com/en/support/security/
CHRISTMAS ISLANDS PATENT APPLICATION20142329
RECON 2014 February 17th, 2014
BACKGROUND
[FIELD OF INVENTION]
- REcon 2014 is a computer security conference for reverse engineers,
hackers, and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:037
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:038
http://www.mandriva.com/en/support/security/
20 matches
Mail list logo