-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2014-02-25-1 OS X Mavericks 10.9.2 and Security Update
2014-001
OS X Mavericks 10.9.2 and Security Update 2014-001 is now available
and addresses the following:
Apache
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2014-02-25-2 Safari 6.1.2 and Safari 7.0.2
Safari 6.1.2 and Safari 7.0.2 is now available and addresses the
following:
WebKit
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03744742
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03744742
Version: 3
HPSBPI02869
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04125866
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04125866
Version: 1
HPSBMU02966
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04047415
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04047415
Version: 1
HPSBST02955
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2014-02-25-3 QuickTime 7.7.5
QuickTime 7.7.5 is now available and addresses the following:
QuickTime
Available for: Windows 7, Vista, XP SP2 or later
Impact: Playing a maliciously crafted movie file may lead to an
unexpected application
*) Issue:
Authentication-Bypass in CosmoShop ePRO V10.17.00 (and lower, maybe higher)
*) Author:
l0om ( http://l0om.org )
*) Date:
26.02.2013
*) Overview:
Cosmoshop provides an admin backup-function which saves .htaccess protected
MySQL dump files
in a backup directory. This directory does
Title: Persistent XSS in Media File Renamer V1.7.0 wordpress plugin
Date: 1/31/2014
Author: Larry W. Cashdollar, @_larry0
Vendor: Notified 2/4/2014
CVE: 2014-2040
Download:
http://www.meow.fr/media-file-renamer/
Vulnerability:
The following functions do not sanitize input before being echoed
Document Title:
===
Barracuda Networks Bug Bounty #31 Firewall - Persistent Access Policy
Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1070
Barracuda Networks Security ID (BNSEC): BNSEC-2068
Release Date:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Prime Infrastructure Command Execution Vulnerability
Advisory ID: cisco-sa-20140226-pi
Revision 1.0
For Public Release 2014 February 26 16:00 UTC (GMT)
Summary
===
A vulnerability in Cisco Prime Infrastructure could allow
10 matches
Mail list logo