[security bulletin] HPSBMU03073 rev.1 - HP Network Virtualization, Remote Execution of Code, Disclosure of Information

2014-07-23 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04374202 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04374202 Version: 1 HPSBMU03073 r

SQL Injection in Е2

2014-07-23 Thread High-Tech Bridge Security Research
Advisory ID: HTB23222 Product: Е2 Vendor: Ilya Birman Vulnerable Version(s): v2844 and probably prior Tested Version: v2844 Advisory Publication: July 2, 2014 [without technical details] Vendor Notification: July 2, 2014 Vendor Patch: July 3, 2014 Public Disclosure: July 23, 2014 Vulnerabilit

[oCERT-2014-005] LPAR2RRD input sanitization errors

2014-07-23 Thread Daniele Bianco
#2014-005 LPAR2RRD input sanitization errors Description: LPAR2RRD is a performance monitoring and capacity planning software for IBM Power Systems. LPAR2RRD generates historical, future trends and nearly "real-time" CPU utilization graphs of LPAR's and shared CPU usage. Insufficient input sani

Multiple Vulnerabilities in Parallels� Plesk Sitebuilder

2014-07-23 Thread cseye_ut
#+ # Title : Multiple Vulnerabilities in Parallels® Plesk Sitebuilder # Author : alieye # vendor : http://www.parallels.com/ # Contact : cseye...@yahoo.com # Risk : High # Class: Remote # # Google Dork: # inurl::2006/Sites ext:aspx # inurl::

[SECURITY] [DSA 2985-1] mysql-5.5 security update

2014-07-23 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-2985-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso July 22, 2014

[SECURITY] [DSA 2984-1] acpi-support security update

2014-07-23 Thread Luciano Bello
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian Security Advisory DSA-2984-1 secur...@debian.org http://www.debian.org/security/ Luciano Bello July 22, 2014

Barracuda Networks #35 Web Firewall 610 v6.0.1 - Filter Bypass & Persistent Vulnerability

2014-07-23 Thread Vulnerability Lab
Document Title: === Barracuda Networks #35 Web Firewall 610 v6.0.1 - Filter Bypass & Persistent Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1101 Barracuda Networks Security ID (BNSEC): BNSEC-2361 http://www.barracuda.c