ESA-2013-003: EMC Avamar Client Elevation of Privilege Vulnerability
EMC Identifier: ESA-2013-003
CVE Identifier: CVE-2012-2291
Severity Rating: CVSS v2 Base Score: 6.8 (AV:L/AC:L/Au:S/C:C/I:C/A:C)
Affected products:
EMC Avamar HP-UX Client 4.x, 5.x and 6.x
EMC Avamar Mac OS C
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:186
http://www.mandriva.com/en/support/security/
__
On Fri, Jun 28, 2013 at 12:47:46AM +0100, Vulnerability Lab wrote:
> (Copy of the Vendor Homepage: http://www.barracudanetworks.ca/cudatel.aspx )
What?
> Report-Timeline:
>
> 2012-11-26: Researcher Notification & Coordination (Chokri Ben Achour)
> 2012-11-27: Vendor Notifica
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] ruby (SSA:2013-178-01)
New ruby packages are available for Slackware 13.1, 13.37, 14.0, and -current
to fix a security issue.
Here are the details from the Slackware 14.0 ChangeLog:
+--+
patches/package
Title:
==
Barracuda CudaTel 2.6.02.04 - Persistent Web Vulnerability
Date:
=
2013-06-21
References:
===
http://vulnerability-lab.com/get_content.php?id=777
BARRACUDA NETWORK SECURITY ID: BNSEC-834
VL-ID:
=
777
Common Vulnerability Scoring System:
===
Title:
==
Barracuda CudaTel 2.6.02.04 - Multiple Web Vulnerabilities
Date:
=
2013-06-25
References:
===
http://vulnerability-lab.com/get_content.php?id=778
BARRACUDA NETWORK SECURITY ID: BNSEC-811
VL-ID:
=
778
Common Vulnerability Scoring System:
===