Foofus.net Security Advisory: foofus-2007
Title: Lexmark Multifunction Printer Information exposure
Version:X656de
Vendor:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2338-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
November 07, 2011
Trustwave's SpiderLabs Security Advisory TWSL2011-017:
Multiple Vulnerabilities in Merethis Centreon
https://www.trustwave.com/spiderlabs/advisories/TWSL2011-017.txt
Published: 2011-11-04
Version: 1.0
Vendor: Merethis (http://www.merethis.com and http://www.centreon.com)
Product: Centreon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2339-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
November 07, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2336-1 secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 07, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2340-1 secur...@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
November 7, 2011
Recurity Labs GmbH
http://www.recurity-labs.com
entomol...@recurity-labs.com
Date: 08.11.2011
Vendor: Cisco Systems
Product:
Folks,
We have uploaded the slides of my IPv6 Security presentation at H2HC
2011 http://www.h2hc.com.br/?lang=en. -- The slides are available at:
http://www.si6networks.com/presentations/h2hc2011/fgont-h2hc2011-ipv6-security.pdf.
That aside, on November 15-16 I'll be teaching a two-day IPv6
Hi list,
We are proud to present a new free hacking challenge for you! It's all
about getting root on a linux host! It's another step after the great
success of the GotRoot security puzzle. SSH into our vulnerable server
and disclose /root/secret.txt. Increase your knowledge about restricted
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03024266
Version: 1
HPSBHF02706 SSRT100613 rev.1 - HP Integrated Lights-Out iLO2 and iLO3 running
SSL/TLS, Denial of Service (DoS), Unauthorized Modification
NOTICE: The information in this
Advisory: osCSS2 _ID parameter Local file inclusion
Advisory ID:SSCHADV2011-034
Author: Stefan Schurtz
Affected Software: Successfully tested on osCSS2 2.1.0 (latest version)
Vendor URL: http://oscss.org/
Vendor Status: Fixed in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
CVE-2011-3376 Apache Tomcat - Privilege Escalation via Manager app
Severity: Low
Vendor: The Apache Software Foundation
Versions Affected:
- - Tomcat 7.0.0 to 7.0.21
Description:
This issue only affects environments running web applications that
12 matches
Mail list logo