Zenario CMS v7.6 - (Delete) Persistent Cross Site Vulnerability

2017-05-03 Thread Vulnerability Lab
Document Title: === Zenario v7.6 - (Delete) Persistent Cross Site Vulnerability References (Source): https://www.vulnerability-lab.com/get_content.php?id=2042 Release Date: = 2017-03-20 Vulnerability Laboratory ID (VL-ID): =

Zenario v7.6 - Persistent Cross Site Scripting Vulnerability

2017-05-03 Thread Vulnerability Lab
Document Title: === Zenario v7.6 - Persistent Cross Site Scripting Vulnerability References (Source): https://www.vulnerability-lab.com/get_content.php?id=2044 https://github.com/TribalSystems/Zenario/commit/cd60f1c8a179ebb779fe0acc051b93f477129b1a Release Date

Arachni v1.5-0.5.11 - Persistent Cross Site Vulnerability

2017-05-03 Thread Vulnerability Lab
Document Title: === Arachni v1.5-0.5.11 - Persistent Cross Site Vulnerability References (Source): https://www.vulnerability-lab.com/get_content.php?id=2046 Release Date: = 2017-03-29 Vulnerability Laboratory ID (VL-ID): ===

Super File Explorer 1.0.1 - Arbitrary File Upload Vulnerability

2017-05-03 Thread Vulnerability Lab
Document Title: === Super File Explorer 1.0.1 - Arbitrary File Upload Vulnerability References (Source): https://www.vulnerability-lab.com/get_content.php?id=2034 Release Date: = 2017-02-23 Vulnerability Laboratory ID (VL-ID): =

Joomla com_tag v1.7.6 - (tag) SQL Injection Vulnerability

2017-05-03 Thread Vulnerability Lab
Document Title: === Joomla com_tag v1.7.6 - (tag) SQL Injection Vulnerability References (Source): https://www.vulnerability-lab.com/get_content.php?id=2061 IEDB: http://iedb.ir/exploits-7454.html Release Date: = 2017-05-02 Vulnerability Laborator

Hola VPN v1.34 - Privilege Escalation Vulnerability

2017-05-03 Thread Vulnerability Lab
Document Title: === Hola VPN v1.34 - Privilege Escalation Vulnerability References (Source): https://www.vulnerability-lab.com/get_content.php?id=2062 Release Date: = 2017-05-03 Vulnerability Laboratory ID (VL-ID): =

Mura CMS Cross-Site Scripting (XSS) Vulnerability

2017-05-03 Thread Leon . Zhao . 7
Credits === Zhao Liang, Huawei Weiran Labs Vendor: === Blue River Interactive Group Product: Mura CMS Mura CMS is built with one focused purpose in mind - to make it easier and faster for people to build and maintain even the most ambitious web

[SECURITY] [DSA 3843-1] tomcat8 security update

2017-05-03 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3843-1 secur...@debian.org https://www.debian.org/security/ Sebastien Delafond May 03, 2017

[SECURITY] [DSA 3842-1] tomcat7 security update

2017-05-03 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-3842-1 secur...@debian.org https://www.debian.org/security/ Sebastien Delafond May 03, 2017

MODX Revolution 2.0.1-pl - 2.5.6-pl blind SQLi

2017-05-03 Thread Anti Räis
MODX Revolution 2.0.1-pl - 2.5.6-pl blind SQLi ## Information === Name: MODX Revolution 2.0.1 - 2.5.6 (based on git commit) Software: MODX CMS Homepage: https://modx.com Vulnerability: blind SQL injection Prerequisites: attack

[security bulletin] HPESBHF03741 rev.1 - HPE Network products including Comware 7, IMC, and VCX running OpenSSL, Local Unauthorized Disclosure of Information, Remote Denial of Service (DoS), Unauthori

2017-05-03 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03741en_us SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesbhf03741en_us Version: 1 HPESBHF03