Information
Name : XSS vulnerability in Joomla 1.6.3.
Software : All 1.6.x installs prior to and including 1.6.3 are affected.
Vendor Hompeage : http://www.joomla.org
Vulnerability Type : Cross-Site Scripting
Severity : High
Researcher : Mesut Timur mesut [at]
Correct! After working with vendor it was confirmed by the vendor that this was
patched in firmware release LR.MN.P311e.
An update was made to the advisory listed this firmware version as the fix.
http://www.foofus.net/?page_id=483
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03057508
Version: 2
HPSBMU02714 SSRT100244 rev.2 - HP Network Node Manager i (NNMi) for HP-UX,
Linux, Solaris, and Windows, Remote Unauthorized Disclosure of Information
NOTICE: The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2011-11-10-1 iOS 5.0.1 Software Update
iOS 5.0.1 Software Update is now available and addresses the
following:
CFNetwork
Available for: iOS 3.0 through 5.0 for iPhone 3GS,
iPhone 4 and iPhone 4S,
iOS 3.1 through 5.0 for iPod touch (3rd
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/
Apple OS X Sandbox Predefined Profiles Bypass
1. *Advisory Information*
Title: Apple OS X Sandbox Predefined Profiles Bypass
Advisory ID: CORE-2011-0919
Advisory URL:
FOREGROUND SECURITY, SECURITY ADVISORY 2011-004
- Original release date: November 10, 2011
- Discovered by: Jose Carlos de Arriba - Senior Security Analyst at Foreground
Security
- Contact: (jcarriba (at) foregroundsecurity (dot) com,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n)
Firmware 7.6
Time Capsule and AirPort Base Station (802.11n) Firmware 7.6 is now
available and addresses the following:
Available for: AirPort Extreme Base Station with 802.11n,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03082086
Version: 1
HPSBST02722 SSRT100279 rev.1 - HP StorageWorks P4000 Virtual SAN Appliance,
Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03082006
Version: 1
HPSBHF02721 SSRT100605 rev.1 - HP Directories Support for ProLiant Management
Processors for Integrated Lights-Out iLO2 and iLO3, Unauthorized Access
NOTICE: The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2011:170
http://www.mandriva.com/security/
Title:
==
iGuard Biometric Access Control - Multiple Vulnerabilities
Date:
=
2011-11-08
References:
===
2011/Q3-4
URL: http://vulnerability-lab.com/get_content.php?id=104
VL-ID:
=
104
Introduction:
=
Each iGuard Biometric / Smart Card Security Appliance has
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2344-1 secur...@debian.org
http://www.debian.org/security/Florian Weimer
November 11, 2011
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 20-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 20-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2011:171
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2011:172
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2011:173
http://www.mandriva.com/security/
Dear All,
Here are with the Issue-22, November 2011 of ClubHack Magazine.
This issue covers following articles:-
0x00 Tech Gyan - Looking Into the Eye of the Bits
0x01 Tool Gyan - Ravan JavaScript Distributed Computing System
0x02 Mom's Guide - Best Practices of Web Application Security
0x03
==
ClubHack 2011 Security Conference
3rd, 4th 5th December 2011
http://clubhack.com/2011
==
Team ClubHack brings you the 5th edition of ClubHack Hacking and
Wordpress Zingiri Web Shop Plugin = 2.2.3 Remote Code Execution Vulnerability
author...: Egidio Romano aka EgiX
mail.: n0b0d13s[at]gmail[dot]com
software link: http://wordpress.org/extend/plugins/zingiri-web-shop/
affected versions: from 0.9.12 to 2.2.3
20 matches
Mail list logo