-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
ESA-2013-018: EMC Smarts Product - Cross Site Scripting Vulnerability
EMC Identifier: ESA-2013-018
CVE Identifier: CVE-2013-0936
Severity Rating: CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Affected products:
EMC Smarts Product versi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Resource Reservation Protocol Denial of Service
Vulnerability
Advisory ID: cisco-sa-20130327-rsvp
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Internet Key Exchange Vulnerability
Advisory ID: cisco-sa-20130327-ike
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Summary
===
The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Network Address Translation Vulnerability
Advisory ID: cisco-sa-20130327-nat
Revision 1.0
For Public Release 2013 March 27 10:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Smart Install Denial of Service Vulnerability
Advisory ID: cisco-sa-20130327-smartinstall
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Protocol Translation Vulnerability
Advisory ID: cisco-sa-20130327-pt
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Summary
===
The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software IP Service Level Agreement Vulnerability
Advisory ID: cisco-sa-20130327-ipsla
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Zone-Based Policy Firewall Session Initiation
Protocol Inspection Denial of Service Vulnerability
Advisory ID: cisco-sa-20130327-cce
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03691745
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03691745
Version: 1
HPSBST02848 S
Advisory ID: HTB23128
Product: McAfee Virtual Technician (MVT) 6.5.0.2101
Vendor: McAfee
Vulnerable Version(s): 6.5.0.2101 and probably prior
Tested Version: 6.5.0.2101 on Windows 7 SP1 and Internet Explorer 9
Vendor Notification: November 19, 2012
Vendor Patch: March 15, 2013
Public Disclosure:
Advisory ID: HTB23147
Product: AWS XMS
Vendor: http://www.aws-dms.com
Vulnerable Version(s): 2.5 and probably prior
Tested Version: 2.5
Vendor Notification: March 6, 2013
Vendor Patch: March 16, 2013
Public Disclosure: March 27, 2013
Vulnerability Type: Path Traversal [CWE-22]
CVE Reference: CVE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] bind (SSA:2013-086-01)
New bind packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37,
14.0, and -current to fix a security issue.
Here are the details from the Slackware 14.0 ChangeLog:
+-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] dhcp (SSA:2013-086-02)
New dhcp packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37,
14.0, and -current to fix a security issue.
Here are the details from the Slackware 14.0 ChangeLog:
+-
Tracked through issue 65
(http://code.google.com/p/naxsi/issues/detail?id=65), fixed at
check-in R545 (http://code.google.com/p/naxsi/source/detail?spec=svn545&r=545).
On Mon, Mar 25, 2013 at 10:00 PM, wrote:
> OWASP WAF Naxsi bypass Vulnerability
>
> Certain unspecified input is not properly ha
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2653-1 secur...@debian.org
http://www.debian.org/security/Florian Weimer
March 26, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03714148
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03714148
Version: 1
HPSBUX02857 S
16 matches
Mail list logo