-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04374202
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04374202
Version: 1
HPSBMU03073 r
Advisory ID: HTB23222
Product: Е2
Vendor: Ilya Birman
Vulnerable Version(s): v2844 and probably prior
Tested Version: v2844
Advisory Publication: July 2, 2014 [without technical details]
Vendor Notification: July 2, 2014
Vendor Patch: July 3, 2014
Public Disclosure: July 23, 2014
Vulnerabilit
#2014-005 LPAR2RRD input sanitization errors
Description:
LPAR2RRD is a performance monitoring and capacity planning software for IBM
Power Systems. LPAR2RRD generates historical, future trends and nearly
"real-time" CPU utilization graphs of LPAR's and shared CPU usage.
Insufficient input sani
#+
# Title : Multiple Vulnerabilities in Parallels® Plesk Sitebuilder
# Author : alieye
# vendor : http://www.parallels.com/
# Contact : cseye...@yahoo.com
# Risk : High
# Class: Remote
#
# Google Dork:
# inurl::2006/Sites ext:aspx
# inurl::
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2985-1 secur...@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
July 22, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
- -
Debian Security Advisory DSA-2984-1 secur...@debian.org
http://www.debian.org/security/ Luciano Bello
July 22, 2014
Document Title:
===
Barracuda Networks #35 Web Firewall 610 v6.0.1 - Filter Bypass & Persistent
Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1101
Barracuda Networks Security ID (BNSEC): BNSEC-2361
http://www.barracuda.c