-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:007
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:008
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:010
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:009
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2845-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
January 17, 2014
Title:
Ammyy Admin - Hidden hard-coded option and Access Control vulnerability.
Credit:
==
Name: Bhadresh Patel
Company/affiliation: Cyberoam Technologies Private Limited
Website: www.cyberoam.com
CVE:
- CVE-2013-5581 for hidden hard-coded option (CWE-255).
- CVE-2013-5582 for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2831-2 secur...@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
January 17, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Folks,
This is not meant to be a big release, but it does fix some issues
present in previous versions, and adds some new features (please find
the changelog below).
So if you're using the ipv6toolkit, please upgrade to version 1.5.2.
Tarballs