[+] Credits: John Page aka hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/IBMI-ACCESS-BUFFER-OVERFLOW-DOS.txt
Vendor:
==
www.ibm.com
Product:
IBM i Access for Windows
Description:
Kibana versions prior to 4.1.3 and 4.2.1 are vulnerable to a CSRF attack.
We have been assigned CVE 2015-8131for this issue.
CVSS Score: 4.0
Remediation:
We recommend that all Kibana users upgrade to either 4.1.3, 4.2.1, or a later
version.
Confirmation:
We have
VMware Security Advisory
Advisory ID: VMSA-2015-0008
Synopsis:VMware product updates address information disclosure
issue
Issue date: 2015-11-18
Updated on: 2015-11-18
CVE number:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3399-1 secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 18, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c04894110
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04894110
Version: 2
HPSBGN03521
[+] Credits: John Page aka hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/IBMI-CLIENT-ACCESS-BUFFER-OVERFLOW.txt
Vendor:
==
www.ibm.com
Product:
IBM i Access for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c04891218
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04891218
Version: 1
HPSBUX03522
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3400-1 secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 19, 2015