-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4606-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
January 20, 2020
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4575-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
November 24, 2019
WebKitGTK and WPE WebKit Security Advisory WSA-2019-0003
Date reported : May 20, 2019
Advisory ID : WSA-2019-0003
WebKitGTK Advisory URL :
WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002
Date reported : April 10, 2019
Advisory ID : WSA-2019-0002
WebKitGTK Advisory URL :
Hi Rodrigo:
Thank you so much for this CFP. Kindly see attached from my end.
In my talk on the incoming "2019 Industrial Control Systems (ICS) Cyber
Security Conference | Singapore"
(https://www.icscybersecurityconference.com/singapore/), I will be covering
Zero-day & fileless malware hunting
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4421-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
March 31, 2019
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4404-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
March 09, 2019
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4395-2 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
February 26, 2019
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4395-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
February 18, 2019
WebKitGTK+ and WPE WebKit Security Advisory WSA-2019-0001
Date reported : February 08, 2019
Advisory ID : WSA-2019-0001
WebKitGTK+ Advisory URL :
WebKitGTK+ and WPE WebKit Security AdvisoryWSA-2018-0009
Date reported : December 13, 2018
Advisory ID :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4352-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
December 07, 2018
WebKitGTK+ and WPE WebKit Security AdvisoryWSA-2018-0008
Date reported : November 21, 2018
Advisory ID :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4340-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
November 18, 2018
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4330-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
November 02, 2018
---
WebKitGTK+ and WPE WebKit Security AdvisoryWSA-2018-0007
Date reported : September 26, 2018
Advisory ID :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4297-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
September 19, 2018
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4289-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
September 07, 2018
WebKitGTK+ and WPE WebKit Security AdvisoryWSA-2018-0006
Date reported : August 07, 2018
Advisory ID :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4256-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
July 26, 2018
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4237-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
June 30, 2018
WebKitGTK+ and WPE WebKit Security AdvisoryWSA-2018-0005
Date reported : June 13, 2018
Advisory ID :
USB devices must not be trusted (see [8] for further ways of exploitation).
Furthermore, already the basic BSI IT-Grundschutz contains in section M4.63 the
requirement "The telecommuting computer should provide a boot protection
mechanism to prevent booting from removable data media, e.
WebKitGTK+ Security Advisory WSA-2018-0004
Date reported : May 07, 2018
Advisory ID: WSA-2018-0004
Advisory
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4182-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
April 28, 2018
WebKitGTK+ Security Advisory WSA-2018-0003
Date reported : April 04, 2018
Advisory ID : WSA-2018-0003
Advisory URL :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4103-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
January 31, 2018
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4064-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
December 12, 2017
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4020-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
November 05, 2017
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3926-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
August 04, 2017
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3795-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
February 26, 2017
Title: Multiple issues in OpManager
Author: Michael Heydon
Product: OpManager
Tested Versions: 12100 & 12200
Vendor: Zoho ManageEngine
Vendor Notified: 2016-08-14
Disclosure Date: 2016-11-20
Product Description:
OpManager is a web-based network monitoring system. It is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3645-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
August 09, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3637-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
July 31, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3594-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
June 04, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3590-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
June 01, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3564-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
May 02, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3549-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
April 15, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3531-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
March 25, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3513-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
March 10, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3511-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
March 09, 2016
Yes Tested it to on several devices jailbreaked and official firmware from
9.0.1 until 9.3 beta and this bypass doesn't work .
I think the user is unlocking with Touch ID as Edsel stated before .
Sent from my Secure device
> On 07 Mar 2016, at 15:26, Edsel Adap wrote:
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3507-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
March 05, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3486-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
February 21, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3456-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
January 27, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3442-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
January 13, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3438-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
January 09, 2016
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3418-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
December 14, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3415-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
December 09, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3376-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
October 20, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3351-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
September 03, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3315-1 secur...@debian.org
https://www.debian.org/security/ Michael Gilbert
July 23, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3267-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
May 22, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3242-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
April 30, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3238-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
April 26, 2015
October 2014
Vulnerability Type: Stored Cross Site Scripting
CVE Reference: CVE-2015-2223
Risk Level: High
Solution Status:
Discovered and Provided: Michael Hendrickx, help AG
About the product:
Palo Alto Traps is an advanced
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3187-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
March 15, 2015
cases will fail since libssl was not detected)
Please ACK this email, and let me know when I can let this source code out.
--
] Never tell me the odds! | ipv6 mesh networks [
] Michael Richardson, Sandelman Software Works| network architect [
] m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3165-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
February 21, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3166-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
February 22, 2015
2014
Vulnerability Type: Insecure Direct Object References
CVE Reference: CVE-2014-8487
Risk Level: Low Solution
Status: Solution not yet released
Discovered and Provided: Michael Hendrickx, Help AG
About the vendor:
Kony
*** kingkaust...@me.com wrote:
#
Title:- Reflected XSS vulnarbility in Asus RT-N10 Plus router
Author: Kaustubh G. Padwad
Product: ASUS Router RT-N10 Plus
Firmware: 2.1.1.1.70
Severity: HIGH
Auth: Not requierd
CVE ID: CVE-2015-1437
#
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3148-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
January 31, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3131-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
January 18, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3111-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
December 22, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3052-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
October 15, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3039-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
September 28, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2965-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
June 22, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2959-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
June 14, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2939-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
May 31, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2930-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
May 17, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2920-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
May 03, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2905-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
April 15, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2883-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
March 23, 2014
~~
Title: Synology DSM Blind SQL Injection
Version affected: = 4.3-3827
Vendor: Synology
Discovered by: Michael Wisniewski
Status: Patched
~~
The file /photo/include/blog/article.php contains a Blind SQL
Injection Vulnerability in the 'value' variable in the URL.
The vendor was contacted
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2877-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
March 12, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2862-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
February 16, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2811-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
December 07, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2795-2 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
November 16, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2797-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
November 16, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2798-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
November 17, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2795-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
November 13, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2785-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
October 26, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2786-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
October 27, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2779-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
October 13, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2741-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
August 25, 2013
Please note also this will only affect 3.1.4 and 3.1.5. There are not official
3.1.2 and 3.1.3 releases and the problem file was added after the 3.1.1 release.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2724-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
July 17, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
- -
Debian Security Advisory DSA-2719-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
July 10, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2698-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
June 18, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2701-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
May 29, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2695-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
May 29, 2013
.
I reported this to secur...@kde.org and created a launchpad ticket
against the Ubuntu package on May 13, followed up with a proof of
concept on the 17th, and have received no response at all from either.
Apologies if that was the wrong contact method.
Regards,
Michael
The EDSC 2013 CFP is open!
EDSC is a new security conference focusing on embedded
systems, hardware, and anything behind the silicon
curtain. Embedded testing is a rapidly expanding area
of the security industry staying current is important
for engineers, researchers, and testers alike.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2642-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
March 09, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2629-1 secur...@debian.org
http://www.debian.org/security/ Michael Gilbert
February 25, 2013
While I support full disclosure, I also advocate responsible disclosure. The
public _has_ a right to know, but in this case, they can play no significant
part in remedy or mitigation unless they are employees of the vendor or the
customer. I believe the best course of action for a SCADA
Maybe what some of us need to learn from this is that we should never think in
absolutes such as local VS domain users. There are numerous account types and
the overrides to take into account with any OS and they change.
This is more of a wakeup call to brush up on our understanding of
On 12/14/10 8:35 PM, musnt live wrote:
Original e-mail is from Theo DeRaadt
http://marc.info/?l=openbsd-techm=129236621626462w=2
Then also read Jason Wright's response and clear denial:
http://marc.info/?l=openbsd-techm=129244045916861w=2
--
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948
through other vectors).
Plenty of developers use Visual Studio to create non-MFC applications.
And at least a few of us use Microsoft toolchains and libraries without
the enormous pile of VS overhead. (Whether there's anyone in the latter
group who uses MFC is another question.)
--
Michael Wojcik
1 - 100 of 297 matches
Mail list logo