Vtiger CRM Authenticated Remote Code Execution (CVE-2015-6000)

2015-09-28 Thread Benjamin Daniel Mussler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Vtiger CRM Authenticated Remote Code Execution (CVE-2015-6000) 1. Summary 2. Vulnerability Details 3. Exploitation / Proof of Concept 4. Timeline 5. See Also ## 1. Summ

IconLover v5.4.5 - Stack Buffer Overflow Vulnerability

2015-09-28 Thread Vulnerability Lab
Document Title: === IconLover v5.4.5 - Stack Buffer Overflow Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1609 Release Date: = 2015-09-28 Vulnerability Laboratory ID (VL-ID): ===

Photos in Wifi v1.0.1 iOS - Arbitrary File Upload Vulnerability

2015-09-28 Thread Vulnerability Lab
Document Title: === Photos in Wifi v1.0.1 iOS - Arbitrary File Upload Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1600 Release Date: = 2015-09-28 Vulnerability Laboratory ID (VL-ID): ==

NodeBB v0.8.2 - Client Side Cross Site Web Vulnerability

2015-09-28 Thread Vulnerability Lab
Document Title: === NodeBB v0.8.2 - Client Side Cross Site Web Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1600 Release Date: = 2015-09-24 Vulnerability Laboratory ID (VL-ID): =

WinRAR SFX v5.21 - Remote Code Execution Vulnerability

2015-09-28 Thread Vulnerability Lab
Document Title: === WinRAR SFX v5.21 - Remote Code Execution Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1608 Video: https://www.youtube.com/watch?v=fo0l0oT4468 Release Date: = 2015-09-28 Vulnerability La

Flowdock API Bug Bounty #3 - (Invite) Persistent Web Vulnerability

2015-09-28 Thread Vulnerability Lab
Document Title: === Flowdock API Bug Bounty #3 - (Invite) Persistent Web Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1574 Release Date: = 2015-09-24 Vulnerability Laboratory ID (VL-ID): ===

My.WiFi USB Drive v1.0 iOS - File Include Vulnerability

2015-09-28 Thread Vulnerability Lab
Document Title: === My.WiFi USB Drive v1.0 iOS - File Include Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1589 Release Date: = 2015-09-24 Vulnerability Laboratory ID (VL-ID): ==

Git-1.9.5 ssh-agent.exe Buffer Overflow

2015-09-28 Thread apparitionsec
[+] Credits: hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AS-GIT-SSH-AGENT-BUFF-OVERFLOW.txt Vendor: git-scm.com Product: Git-1.9.5-preview20150319.exe github.com/ms

Subject mail: CVE-2015-7320 - Multiple Reflective XSS in Appointment Booking Calendar 1.1.7 WordPress plugin

2015-09-28 Thread ibemed
Vulnerability title: Multiple Reflective XSS in Appointment Booking Calendar 1.1.7 WordPress plugin CVE: CVE-2015-7320 Vendor: WordPress DWBooster Product: Appointment Booking Calendar Affected version: 1.1.7 Fixed version: 1.1.8 Reported by: Ibéria Medeiros Vulnerability Details: ===

CVE-2015-7320 - Multiple Reflective XSS in Appointment Booking Calendar 1.1.7 WordPress plugin

2015-09-28 Thread ibemed
Vulnerability title: Multiple Reflective XSS in Appointment Booking Calendar 1.1.7 WordPress plugin CVE: CVE-2015-7320 Vendor: WordPress DWBooster Product: Appointment Booking Calendar Affected version: 1.1.7 Fixed version: 1.1.8 Reported by: Ibéria Medeiros Vulnerability Details: ===

CVE-2015-7319 - SQL Injection in Appointment Booking Calendar 1.1.7 WordPress plugin

2015-09-28 Thread ibemed
Vulnerability title: SQL Injection in Appointment Booking Calendar 1.1.7 WordPress plugin CVE: CVE-2015-7319 Vendor: WordPress DWBooster Product: Appointment Booking Calendar Affected version: 1.1.7 Fixed version: 1.1.8 Reported by: Ibéria Medeiros Vulnerability Details: = It

Git-1.9.5 ssh-agent.exe Buffer Overflow

2015-09-28 Thread apparitionsec
[+] Credits: hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AS-GIT-SSH-AGENT-BUFF-OVERFLOW.txt Vendor: git-scm.com Product: Git-1.9.5-preview20150319.exe github.com/ms

[security bulletin] HPSBHF03513 rev.1 - HP PCs and Workstations running Windows and Linux with NVidia Graphics Driver, Local Denial of Service (DoS), Elevation of Privilege

2015-09-28 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04815468 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04815468 Version: 1 HPSBHF03513