[security bulletin] HPSBMU03051 rev.1 - HP System Management Homepage running OpenSSL on Linux and Windows, Remote Denial of Service (DoS), Code Execution, Unauthorized Access, Disclosure of Informati

2014-06-25 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04345210 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04345210 Version: 1 HPSBMU03051

[HITB-Announce] #HITB2014KUL round 1 CFP submission deadline in 1 week

2014-06-25 Thread Hafez Kamal
The deadline to submit your papers for the the 12th and FINAL HITB Security Conference in Malaysia is just around the corner! Paper selection will be done in two rounds: ROUND 1 DEADLINE: 30th June 2014 FINAL DEADLINE: 31st July 2014 HITBSecConf2014 - Malaysia takes place at Intercontinental

[security bulletin] HPSBMU03053 rev.1 - HP Software Database and Middleware Automation, OpenSSL Vulnerability, Remote Unauthorized Access or Disclosure of Information

2014-06-25 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04347711 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04347711 Version: 1 HPSBMU03053

FreeBSD Security Advisory FreeBSD-SA-14:15.iconv

2014-06-25 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 = FreeBSD-SA-14:15.iconv Security Advisory The FreeBSD Project Topic:

FreeBSD Security Advisory FreeBSD-SA-14:16.file

2014-06-25 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 = FreeBSD-SA-14:16.file Security Advisory The FreeBSD Project Topic:

[slackware-security] gnupg2 (SSA:2014-175-03)

2014-06-25 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] gnupg2 (SSA:2014-175-03) New gnupg2 packages are available for Slackware 13.37, 14.0, 14.1, and -current to fix a security issue. Here are the details from the Slackware 14.1 ChangeLog: +--+

[slackware-security] gnupg (SSA:2014-175-02)

2014-06-25 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] gnupg (SSA:2014-175-02) New gnupg packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue. Here are the details from the Slackware 14.1 ChangeLog: +--+

[slackware-security] bind (SSA:2014-175-01)

2014-06-25 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] bind (SSA:2014-175-01) New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--+

[slackware-security] samba (SSA:2014-175-04)

2014-06-25 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] samba (SSA:2014-175-04) New samba packages are available for Slackware 14.0, 14.1, and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--+

[slackware-security] seamonkey (SSA:2014-175-05)

2014-06-25 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] seamonkey (SSA:2014-175-05) New seamonkey packages are available for Slackware 14.0, 14.1, and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--+

NEW VMSA-2014-0007 - VMware product updates address security vulnerabilities in Apache Struts library

2014-06-25 Thread VMware Security Response Center
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - VMware Security Advisory Advisory ID: VMSA-2014-0007 Synopsis:VMware product updates address security vulnerabilities in Apache Struts

Reflected Cross-Site Scripting (XSS) Vulnerability in Storesprite

2014-06-25 Thread High-Tech Bridge Security Research
Advisory ID: HTB23215 Product: Storesprite Vendor: Lamp Design Limited Vulnerable Version(s): 7 and probably prior Tested Version: 7 Advisory Publication: May 14, 2014 [without technical details] Vendor Notification: May 14, 2014 Vendor Patch: June 19, 2014 Public Disclosure: June 25, 2014

[RT-SA-2013-003] Endeca Latitude Cross-Site Scripting

2014-06-25 Thread RedTeam Pentesting GmbH
Advisory: Endeca Latitude Cross-Site Scripting RedTeam Pentesting discovered a Cross-Site Scripting (XSS) vulnerability in Endeca Latitude. By exploiting this vulnerability an attacker is able to execute arbitrary JavaScript code in the context of other Endeca Latitude users. Details ===

CVE-2014-2385 - Multiple Cross Site Scripting in Sophos Antivirus Configuration Console (Linux)

2014-06-25 Thread Portcullis Advisories
Vulnerability title: Multiple Cross Site Scripting in Sophos Antivirus Configuration Console (Linux) CVE: CVE-2014-2385 Vendor: Sophos Product: Antivirus Affected version: 9.5.1 Fixed version: 9.6.1 Reported by: Pablo Catalina Details: The Configuration Console of Sophos Antivirus 9.5.1 (Linux)

CVE-2014-3752 - Arbitrary Code Execution in G Data TotalProtection 2014

2014-06-25 Thread Portcullis Advisories
Vulnerability title: Arbitrary Code Execution in G Data TotalProtection 2014 CVE: CVE-2014-3752 Vendor: G Data Product: TotalProtection 2014 Affected version: v24.0.2.1 Fixed version: N/A Reported by: Kyriakos Economou Details: G Data TotalProtection 2014 v24.0.2.1 and possibly earlier versions

[SECURITY] [DSA 2967-1] gnupg security update

2014-06-25 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-2967-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso June 25, 2014