Re: PunBB 1.3.6 bug

2011-09-27 Thread Henri Salo
On Sun, Sep 25, 2011 at 02:14:37PM +, a...@irist.ir wrote: # #

[security bulletin] HPSBUX02702 SSRT100606 rev.4 - HP-UX Apache Web Server, Remote Denial of Service (DoS)

2011-09-27 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c02997184 Version: 4 HPSBUX02702 SSRT100606 rev.4 - HP-UX Apache Web Server, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as

openEngine 2.0 'id' Blind SQL Injection vulnerability

2011-09-27 Thread sschurtz
Advisory: openEngine 2.0 'id' Blind SQL Injection vulnerability Advisory ID:SSCHADV2011-019 Author: Stefan Schurtz Affected Software: Successfully tested on openEngine 2.0 100226 Vendor URL: http://www.openengine.de/ Vendor Status:

NGS00109 Patch Notification: ImpressPages CMS Remote code execution

2011-09-27 Thread Research@NGSSecure
High Risk Vulnerability in ImpressPages CMS 27 September 2011 David Middlehurst of NGS Secure has discovered a High risk vulnerability in ImpressPages CMS v1.0.12. Impact: Remote code execution Please update all instances of Impress Pages to the 1.0.13 release:

Secunia Research: Novell GroupWise Internet Agent TZNAME Parsing Vulnerability

2011-09-27 Thread Secunia Research
== Secunia Research 27/09/2011 - Novell GroupWise Internet Agent TZNAME Parsing Vulnerability - == Table of Contents Affected

Secunia Research: Novell GroupWise Internet Agent HTTP Interface Buffer Overflow

2011-09-27 Thread Secunia Research
== Secunia Research 27/09/2011 - Novell GroupWise Internet Agent HTTP Interface Buffer Overflow - == Table of Contents Affected

iDefense Security Advisory 09.26.11: Novell GroupWise iCal TZNAME Heap Overflow Vulnerability

2011-09-27 Thread labs-no-reply
iDefense Security Advisory 09.26.11 http://labs.idefense.com/intelligence/vulnerabilities/ Sep 26, 2011 I. BACKGROUND GroupWise is Novell's messaging platform, and includes support for email, calendaring, and instant messaging. More information is available at the following website: