-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2014-03-10-2 Apple TV 6.1
Apple TV 6.1 is now available and addresses the following:
Apple TV
Available for: Apple TV 2nd generation and later
Impact: An attacker with access to an Apple TV may access sensitive
user information from logs
D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:050
http://www.mandriva.com/en/support/security/
__
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2014-03-10-1 iOS 7.1
iOS 7.1 is now available and addresses the following:
Backup
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A maliciously crafted backup can alter the filesystem
Desc
This vulnerability allows an app to install any number of apps with
any type of permissions without user's explicit consent. It is based
on two things:
1. You can install an app from Google Play using just the browser,
even from PC.
2. An app can embed a browser and automatically login into yo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04135307
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04135307
Version: 1
HPSBGN02970 r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2872-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
March 10, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2871-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
March 10, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:049
http://www.mandriva.com/en/support/security/
__
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2014:048
http://www.mandriva.com/en/support/security/
__
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2870-1 secur...@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
March 08, 2014
# Exploit Author: Nawaf Alkeraithe
==
for "E-store 1.0":
# Google Dork: "Powered by: PD" inurl:"page.php?id"
#Vulnerable page:
http://[target]/page.php?id=[SQL Injection]
==
for "E-store 2.0":
# Google Dork: "Powered by: PD" in
11 matches
Mail list logo