[security bulletin] HPSBUX02860 SSRT101146 rev.1 - HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass, Unauthorized Modification and Other Vulnerabil

2013-04-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03716627 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03716627 Version: 1 HPSBUX02860 S

US-CERT Alert TA13-088A: DNS Amplification Attacks

2013-04-01 Thread US-CERT Alerts
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 National Cyber Awareness System TA13-088A: DNS Amplification Attacks Original release date: March 29, 2013 Systems Affected * Domain Name System (DNS) servers Overview A Domain Name Server (DNS) Amplification attack is a popular form of Distrib

[SECURITY] [DSA 2656-1] bind9 security update

2013-04-01 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-2656-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso March 30, 2013

Authentication bypass on Netgear WNR1000

2013-04-01 Thread roberto
Authentication bypass on Netgear WNR1000 [ADVISORY INFORMATION] Title: Authentication bypass on Netgear WNR1000 Discovery date: 10/11/2012 Release date: 29/03/2013 Credits:Roberto Paleari (robe...@greyhats.it, twitter: @rpaleari) [VULNER

[waraxe-2013-SA#101] - Update Spoofing Vulnerability in Royal TS 2.1.5

2013-04-01 Thread come2waraxe
[waraxe-2013-SA#101] - Update Spoofing Vulnerability in Royal TS 2.1.5 === Author: Janek Vind "waraxe" Date: 29. March 2013 Location: Estonia, Tartu Web: http://www.waraxe.us/advisory-101.html Description of vulnerable s

[waraxe-2013-SA#100] - Update Spoofing Vulnerability in mRemote 1.50

2013-04-01 Thread come2waraxe
[waraxe-2013-SA#100] - Update Spoofing Vulnerability in mRemote 1.50 === Author: Janek Vind "waraxe" Date: 29. March 2013 Location: Estonia, Tartu Web: http://www.waraxe.us/advisory-100.html Description of vulnerable sof

[Suspected Spam] [slackware-security] libssh (SSA:2013-087-01)

2013-04-01 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] libssh (SSA:2013-087-01) New libssh packages are available for Slackware 14.0, and -current to fix a security issue. Here are the details from the Slackware 14.0 ChangeLog: +--+ patches/packages/libssh-

[security bulletin] HPSBUX02859 SSRT101144 rev.1 - HP-UX Running XNTP, Remote Denial of Service (DoS) and Execute Arbitrary Code

2013-04-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 UPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03714526 Version: 1 HPSBUX02859 SSRT101144 rev.1 - HP-UX Running XNTP, Remote Denial of Service (DoS) and Execute Arbitrary Code NOTICE: The information in this Security Bulletin should be acted

MailOrderWorks v5.907 - Multiple Web Vulnerabilities

2013-04-01 Thread Vulnerability Lab
Title: == MailOrderWorks v5.907 - Multiple Web Vulnerabilities Date: = 2013-01-02 References: === http://www.vulnerability-lab.com/get_content.php?id=798 VL-ID: = 796 Common Vulnerability Scoring System: 4.5 Introduction: ==