On Sun, Sep 25, 2011 at 02:14:37PM +, a...@irist.ir wrote:
#
#
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02997184
Version: 4
HPSBUX02702 SSRT100606 rev.4 - HP-UX Apache Web Server, Remote Denial of
Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon
as
Advisory: openEngine 2.0 'id' Blind SQL Injection vulnerability
Advisory ID:SSCHADV2011-019
Author: Stefan Schurtz
Affected Software: Successfully tested on openEngine 2.0 100226
Vendor URL: http://www.openengine.de/
Vendor Status:
High Risk Vulnerability in ImpressPages CMS
27 September 2011
David Middlehurst of NGS Secure has discovered a High risk vulnerability in
ImpressPages CMS v1.0.12.
Impact: Remote code execution
Please update all instances of Impress Pages to the 1.0.13 release:
==
Secunia Research 27/09/2011
- Novell GroupWise Internet Agent TZNAME Parsing Vulnerability -
==
Table of Contents
Affected
==
Secunia Research 27/09/2011
- Novell GroupWise Internet Agent HTTP Interface Buffer Overflow -
==
Table of Contents
Affected
iDefense Security Advisory 09.26.11
http://labs.idefense.com/intelligence/vulnerabilities/
Sep 26, 2011
I. BACKGROUND
GroupWise is Novell's messaging platform, and includes support for
email, calendaring, and instant messaging. More information is available
at the following website: