-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
ESA-2014-087: EMC NetWorker Module for MEDITECH (NMMEDI) Information Disclosure
Vulnerability
EMC Identifier: ESA-2014-087
CVE Identifier: CVE-2014-4620
Severity Rating: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Affected products:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
ESA-2014-094: EMC Avamar Weak Password Storage Vulnerability
EMC Identifier: ESA-2014-094
CVE Identifier: CVE-2014-4623
Severity Rating: 6.6 (AV:L/AC:M/Au:S/C:C/I:C/A:C)
Affected products:
EMC Avamar Data Store (ADS) GEN4(S) and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
ESA-2014-096: EMC Avamar Sensitive Information Disclosure Vulnerability
EMC Identifier: ESA-2014-096
CVE Identifier: CVE-2014-4624
Severity Rating: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
Affected products:
EMC Avamar Data Store (ADS) and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2014-10-22-1 QuickTime 7.7.6
QuickTime 7.7.6 is now available and addresses the following:
QuickTime
Available for: Windows 7, Vista, XP SP2 or later
Impact: Playing a maliciously crafted movie file may lead to an
unexpected application
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:202
http://www.mandriva.com/en/support/security/
Document Title:
===
Dell SonicWall GMS v7.2.x - Persistent Web Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1222
Release Date:
=
2014-10-21
Vulnerability Laboratory ID (VL-ID):
Document Title:
===
File Manager v4.2.10 iOS - Code Execution Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1343
Release Date:
=
2014-10-21
Vulnerability Laboratory ID (VL-ID):
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:204
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:203
http://www.mandriva.com/en/support/security/
OpenBSD = 5.5 (All architectures) is prone to a local DoS condition by
triggering a kernel panic through a malformed ELF executable.
A patch has been released to address this issue. See 013 Reliability Fix at:
http://www.openbsd.org/errata55.html#013_kernexec
More details and PoC code:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-3055-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
October 23, 2014
--
TestLink = 1.9.12 (execSetResults.php) PHP Object Injection Vulnerability
--
[-] Software Link:
http://testlink.org/
[-] Affected Versions:
TestLink = 1.9.12 (database.class.php) Path Disclosure Weakness
[-] Software Link:
http://testlink.org/
[-] Affected Versions:
Version 1.9.12 and prior versions.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] pidgin (SSA:2014-296-02)
New pidgin packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--+
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] glibc (SSA:2014-296-01)
New glibc packages are available for Slackware 14.1 and -current to fix
security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--+
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:205
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:206
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:207
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:208
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:209
http://www.mandriva.com/en/support/security/
20 matches
Mail list logo