Title:
==
vOlk Botnet Framework v4.0 - Multiple Web Vulnerabilities
Date:
=
2012-10-09
References:
===
http://www.vulnerability-lab.com/get_content.php?id=721
VL-ID:
=
721
Common Vulnerability Scoring System:
8.3
Introduction:
=
Title:
==
Omnistar Document Manager v8.0 - Multiple Vulnerabilities
Date:
=
2012-10-03
References:
===
http://www.vulnerability-lab.com/get_content.php?id=712
VL-ID:
=
712
Common Vulnerability Scoring System:
8.3
Introduction:
=
Advisory ID: HTB23116
Product: OpenX
Vendor: OpenX
Vulnerable Version(s): 2.8.10 and probably prior
Tested Version: 2.8.10
Vendor Notification: September 19, 2012
Public Disclosure: October 10, 2012
Vulnerability Type: Cross-Site Scripting [CWE-79], SQL Injection [CWE-89]
CVE References: CVE-2012
#!/usr/bin/perl
# Microsoft Office Excel ReadAV Arbitrary Code Execution
# Author: Jean Pascal Pereira
# Vendor URI: http://office.microsoft.com
# Vendor Description:
# Microsoft Excel is a commercial spreadsheet application written and
distributed by Microsoft for Microsoft Windows and M
#!/usr/bin/perl
# VLC Player 2.0.3 <= ReadAV Arbitrary Code Execution
# Author: Jean Pascal Pereira
# Vendor URI: http://www.videolan.org/vlc/
# Vendor Description:
# VLC is a free and open source cross-platform multimedia player
# and framework that plays most multimedia files as well as
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
CVE-2012-4501: Apache CloudStack configuration vulnerability
Severity: Critical
Vendors:
The Apache Software Foundation
Citrix, Inc.
Versions Affected:
As no official releases have been made, this does not affect any
official Apache CloudStack rel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in the Cisco WebEx Recording Format Player
Advisory ID: cisco-sa-20121010-webex
Revision 1.0
For Public Release 2012 October 10 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco Firewall Services Module
Advisory ID: cisco-sa-20121010-fwsm
Revision 1.0
For Public Release 2012 October 10 16:00 UTC (GMT)
- --
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security
Appliances and Cisco Catalyst 6500 Series ASA Services Module
Advisory ID: cisco-sa-20121010-asa
Revision 1.0
For Public Release 2012 October 10 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:162
http://www.mandriva.com/security/
_
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-firefox (SSA:2012-283-01)
New mozilla-firefox packages are available for Slackware 13.37, 14.0,
and -current to fix security issues.
Here are the details from the Slackware 14.0 ChangeLog:
+--+
Sorry, that's actually a NULL pointer bug. :) It's not exploitable.
12 matches
Mail list logo