Damn, subject is obviously wrong, it's mantis, gallery was already
CVE-2008-3662. Rest of the advisory is correct though.
Sorry for the confusion.
--
Hanno Böck Blog: http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail:[EMAIL PROTECTED]
signature.asc
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200809-14
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200809-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - -
*Google Chrome Carriage Return Null Object Memory Exhaustion Remote Dos.*
*Version Affected:*
Chrome/0.2.149.30
Chrome/0.2.149.29
*Severity:*
High
*Description:*
The Google chrome browser is vulnerable to memory exhaustion based
denial of
service which can be triggered remotely.The
===
Ubuntu Security Notice USN-645-1 September 24, 2008
firefox, firefox-3.0, xulrunner-1.9 vulnerabilities
CVE-2008-0016, CVE-2008-3835, CVE-2008-3836, CVE-2008-3837,
CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061,
===
Ubuntu Security Notice USN-645-2 September 24, 2008
firefox vulnerabilities
CVE-2008-0016, CVE-2008-3835, CVE-2008-3836, CVE-2008-3837,
CVE-2008-4058, CVE-2008-4059, CVE-2008-4060, CVE-2008-4061,
CVE-2008-4062, CVE-2008-4063,
:: :: :: :::: ::
:: :: :::: :: .. ::
:::: : :: :: :: :: ::
:: :: :: :: : :: :: :: :: ::::
:: :: :: : :: :: :: ::
:: :: :: :::: ::
:: :: :::: :: .. ::
:::: : :: :: :: :: ::
:: :: :: :: : :: :: :: :: ::::
:: :: :: : :: :: :: ::
:: :: :: :::: ::
:: :: :::: :: .. ::
:::: : :: :: :: :: ::
:: :: :: :: : :: :: :: :: ::::
:: :: :: : :: :: :: ::
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco IOS Software Layer 2 Tunneling
Protocol (L2TP) Denial of Service Vulnerability
Advisory ID: cisco-sa-20080924-l2tp
http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml
Revision 1.0
For Public Release
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Vulnerability in Cisco IOS While Processing
SSL Packet
Advisory ID: cisco-sa-20080924-ssl
http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml
Revision 1.0
For Public Release 2008 September 24 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco 1, uBR10012, uBR7200 Series
Devices IPC Vulnerability
Advisory ID: cisco-sa-20080924-ipc
http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml
Revision 1.0
For Public Release 2008 September 24 1600 UTC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco IOS MPLS Forwarding Infrastructure
Denial of Service Vulnerability
Advisory ID: cisco-sa-20080924-mfi
http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml
Revision 1.0
For Public Release 2008 September 24
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco IOS NAT Skinny Call Control Protocol
Vulnerability
Advisory ID: cisco-sa-20080924-sccp
http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml
Revision 1.0
For Public Release 2008 September 24 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco IOS Software Firewall Application
Inspection Control Vulnerability
Advisory ID: cisco-sa-20080924-iosfw
http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml
Revision 1.0
For Public Release 2008
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco Unified Communications Manager Session
Initiation Protocol Denial of Service Vulnerabilities
Advisory ID: cisco-sa-20080924-cucm
http://www.cisco.com/warp/public/707/cisco-sa-20080924-cucm.shtml
Revision 1.0
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco uBR10012 Series Devices SNMP
Vulnerability
Advisory ID: cisco-sa-20080924-ubr
http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml
Revision 1.0
For Public Release 2008 September 24 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco IOS MPLS VPN May Leak Information
Advisory ID: cisco-sa-20080924-vpn
http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml
Revision 1.0
For Public Release 2008 September 24 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco IOS IPS Denial of Service
Vulnerability
Advisory ID: cisco-sa-20080924-iosips
http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml
Revision 1.0
For Public Release 2008 September 24 1600 UTC (GMT
I'm also using Google Chrome.
Another concern for me - its setup downloads:
http://cache.pack.google.com/chrome/install/149.30/chrome_installer.exe
which is not signed by authenticode.
Can anyone post hashes of this file downloaded over a trusted network?
Or, is this info available at some
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
* Discovery Date: Sept 17, 2008
* Security risk: high
* Exploitable from: Remote
* Vulnerability: SQL Injection
* Discovered by: Justin C. Klein Keane (a.k.a. Mad Irish)
Description
Drupal (http://drupal.org) is a robust content management system
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Drupal Ajax Checklist Module SQL Injection Vulnerability
* Discovery Date: Sept 15, 2008
* Security risk: high
* Exploitable from: Remote
* Vulnerability: SQL Injection
* Discovered by: Justin C. Klein Keane [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:204
http://www.mandriva.com/security/
23 matches
Mail list logo