Re: EMC Avamar: World writable cache files

2013-06-28 Thread security_alert
ESA-2013-003: EMC Avamar Client Elevation of Privilege Vulnerability EMC Identifier: ESA-2013-003 CVE Identifier: CVE-2012-2291 Severity Rating: CVSS v2 Base Score: 6.8 (AV:L/AC:L/Au:S/C:C/I:C/A:C) Affected products: • EMC Avamar HP-UX Client 4.x, 5.x and 6.x • EMC Avamar Mac OS C

[ MDVSA-2013:186 ] puppet

2013-06-28 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2013:186 http://www.mandriva.com/en/support/security/ __

Re: Barracuda CudaTel 2.6.02.04 - Persistent Web Vulnerability

2013-06-28 Thread Henri Salo
On Fri, Jun 28, 2013 at 12:47:46AM +0100, Vulnerability Lab wrote: > (Copy of the Vendor Homepage: http://www.barracudanetworks.ca/cudatel.aspx ) What? > Report-Timeline: > > 2012-11-26: Researcher Notification & Coordination (Chokri Ben Achour) > 2012-11-27: Vendor Notifica

[slackware-security] ruby (SSA:2013-178-01)

2013-06-28 Thread Slackware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [slackware-security] ruby (SSA:2013-178-01) New ruby packages are available for Slackware 13.1, 13.37, 14.0, and -current to fix a security issue. Here are the details from the Slackware 14.0 ChangeLog: +--+ patches/package

Barracuda CudaTel 2.6.02.04 - Persistent Web Vulnerability

2013-06-28 Thread Vulnerability Lab
Title: == Barracuda CudaTel 2.6.02.04 - Persistent Web Vulnerability Date: = 2013-06-21 References: === http://vulnerability-lab.com/get_content.php?id=777 BARRACUDA NETWORK SECURITY ID: BNSEC-834 VL-ID: = 777 Common Vulnerability Scoring System: ===

Barracuda CudaTel 2.6.02.04 - Multiple Web Vulnerabilities

2013-06-28 Thread Vulnerability Lab
Title: == Barracuda CudaTel 2.6.02.04 - Multiple Web Vulnerabilities Date: = 2013-06-25 References: === http://vulnerability-lab.com/get_content.php?id=778 BARRACUDA NETWORK SECURITY ID: BNSEC-811 VL-ID: = 778 Common Vulnerability Scoring System: ===