ESA-2014-087: EMC NetWorker Module for MEDITECH (NMMEDI) Information Disclosure Vulnerability

2014-10-24 Thread Security Alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ESA-2014-087: EMC NetWorker Module for MEDITECH (NMMEDI) Information Disclosure Vulnerability EMC Identifier: ESA-2014-087 CVE Identifier: CVE-2014-4620 Severity Rating: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) Affected products:

ESA-2014-094: EMC Avamar Weak Password Storage Vulnerability

2014-10-24 Thread Security Alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ESA-2014-094: EMC Avamar Weak Password Storage Vulnerability EMC Identifier: ESA-2014-094 CVE Identifier: CVE-2014-4623 Severity Rating: 6.6 (AV:L/AC:M/Au:S/C:C/I:C/A:C) Affected products: • EMC Avamar Data Store (ADS) GEN4(S) and

ESA-2014-096: EMC Avamar Sensitive Information Disclosure Vulnerability

2014-10-24 Thread Security Alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ESA-2014-096: EMC Avamar Sensitive Information Disclosure Vulnerability EMC Identifier: ESA-2014-096 CVE Identifier: CVE-2014-4624 Severity Rating: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C) Affected products: • EMC Avamar Data Store (ADS) and

APPLE-SA-2014-10-22-1 QuickTime 7.7.6

2014-10-24 Thread Apple Product Security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 APPLE-SA-2014-10-22-1 QuickTime 7.7.6 QuickTime 7.7.6 is now available and addresses the following: QuickTime Available for: Windows 7, Vista, XP SP2 or later Impact: Playing a maliciously crafted movie file may lead to an unexpected application

[ MDVSA-2014:202 ] php

2014-10-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:202 http://www.mandriva.com/en/support/security/

Dell SonicWall GMS v7.2.x - Persistent Web Vulnerability

2014-10-24 Thread Vulnerability Lab
Document Title: === Dell SonicWall GMS v7.2.x - Persistent Web Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1222 Release Date: = 2014-10-21 Vulnerability Laboratory ID (VL-ID):

File Manager v4.2.10 iOS - Code Execution Vulnerability

2014-10-24 Thread Vulnerability Lab
Document Title: === File Manager v4.2.10 iOS - Code Execution Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1343 Release Date: = 2014-10-21 Vulnerability Laboratory ID (VL-ID):

[ MDVSA-2014:204 ] libxml2

2014-10-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:204 http://www.mandriva.com/en/support/security/

[ MDVSA-2014:203 ] openssl

2014-10-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:203 http://www.mandriva.com/en/support/security/

OpenBSD = 5.5 Local Kernel Panic

2014-10-24 Thread Alejandro Hernandez
OpenBSD = 5.5 (All architectures) is prone to a local DoS condition by triggering a kernel panic through a malformed ELF executable. A patch has been released to address this issue. See 013 Reliability Fix at: http://www.openbsd.org/errata55.html#013_kernexec More details and PoC code:

[SECURITY] [DSA 3055-1] pidgin security update

2014-10-24 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-3055-1 secur...@debian.org http://www.debian.org/security/Moritz Muehlenhoff October 23, 2014

[KIS-2014-11] TestLink = 1.9.12 (execSetResults.php) PHP Object Injection Vulnerability

2014-10-24 Thread Egidio Romano
-- TestLink = 1.9.12 (execSetResults.php) PHP Object Injection Vulnerability -- [-] Software Link: http://testlink.org/ [-] Affected Versions:

[KIS-2014-12] TestLink = 1.9.12 (database.class.php) Path Disclosure Weakness

2014-10-24 Thread Egidio Romano
TestLink = 1.9.12 (database.class.php) Path Disclosure Weakness [-] Software Link: http://testlink.org/ [-] Affected Versions: Version 1.9.12 and prior versions.

[slackware-security] pidgin (SSA:2014-296-02)

2014-10-24 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] pidgin (SSA:2014-296-02) New pidgin packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--+

[slackware-security] glibc (SSA:2014-296-01)

2014-10-24 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] glibc (SSA:2014-296-01) New glibc packages are available for Slackware 14.1 and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--+

[ MDVSA-2014:205 ] lua

2014-10-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:205 http://www.mandriva.com/en/support/security/

[ MDVSA-2014:206 ] ctags

2014-10-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:206 http://www.mandriva.com/en/support/security/

[ MDVSA-2014:207 ] ejabberd

2014-10-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:207 http://www.mandriva.com/en/support/security/

[ MDVSA-2014:208 ] phpmyadmin

2014-10-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:208 http://www.mandriva.com/en/support/security/

[ MDVSA-2014:209 ] java-1.7.0-openjdk

2014-10-24 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:209 http://www.mandriva.com/en/support/security/