-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Core Security Technologies - CoreLabs Advisory
http://corelabs.coresecurity.com/
Apple OS X ATSServer CFF CharStrings INDEX Sign Mismatch
1. *Advisory Information*
Title: Apple OS X ATSServer CFF CharStrings INDEX Sign Mismatch
[intro]
Hello, I found security bug in D-Link DIR-300 wireless router. It can
be used to bypass authentication mechanizm by attacker with access to
web interface. I reported it to D-Link but they are not replying for
my emails. According to other D-Link security holes and their status I
think that
||| Security Advisory|||
||| CVE-2010-3890 (CVE candidate)|||
||| CVE-2010-3891 (CVE candidate)|||
||| CVE-2010-3892 (CVE candidate)|||
||| CVE-2010-3893 (CVE candidate)|||
||| CVE-2010-3894 (CVE
JQuarks4s Joomla Component 1.0.0 Blind SQL Injection Vulnerability
Name JQuarks4s
Vendor
http://www.iptechinside.com/labs/projects/list_files/jquarks-for-surveys
Versions Affected 1.0.0
AuthorSalvatore Fresta aka Drosophila
Website
===
Ubuntu Security Notice USN-1008-4 November 08, 2010
libvirt regression
https://launchpad.net/bugs/665531
===
A security issue affects the following Ubuntu releases:
Ubuntu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2010:223
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2010:222
http://www.mandriva.com/security/
==
Secunia Research 09/11/2010
- Microsoft PowerPoint PP7X32.DLL Record Parsing Vulnerability -
==
Table of Contents
Affected
On some versions of the firmware, exploit says that something goes
wrong despite of password change is successfull. There is a fixed
version:
---cut here---
?php
if(sizeof($argv)!=4) {
echo Usage: php5 $argv[0] router ip addres port
admin password\n;
exit;
}
$ch=curl_init();
==
Secunia Research 09/11/2010
- Microsoft Office Drawing Shape Container Parsing Vulnerability -
==
Table of Contents
Affected
10 matches
Mail list logo