-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code
Execution Vulnerability
Advisory ID: cisco-sa-20160406-remcode
Revision 1.0
For Public Release 2016 April 6 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Prime Infrastructure and Evolved Programmable Network Manager Privilege
Escalation API Vulnerability
Advisory ID: cisco-sa-20160406-privauth
Revision 1.0
For Public Release 2016 April 6 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco TelePresence Server Malformed STUN Packet Processing Denial of Service
Vulnerability
Advisory ID: cisco-sa-20160406-cts2
Revision 1.0
For Public Release 2016 April 6 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco Security Advisory: Cisco UCS Invicta Default SSH Key Vulnerability
Advisory ID: cisco-sa-20160406-ucs
Revision 1.0
For Public Release 2016 April 06 16:00 GMT (UTC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Cisco TelePresence Server Crafted URL Handling Denial of Service Vulnerability
Advisory ID: cisco-sa-20160406-cts1
Revision 1.0
For Public Release 2016 April 6 16:00 UTC (GMT
Advisory ID: HTB23286
Product: SocialEngine
Vendor: Webligo
Vulnerable Version(s): 4.8.9 and probably prior
Tested Version: 4.8.9
Advisory Publication: December 21, 2015 [without technical details]
Vendor Notification: December 21, 2015
Public Disclosure: April 6, 2016
Vulnerability Type: SQL
Hi All,
Please would you mind telling us exactly which products and version are
concerned by this issue ?
We contact Fortinet and it seems they are not informed about it and there is no
patch available at this time.
Regards,
Jacques
Jacques GRILLOT
Responsable RĂ©seau et Infrastructure
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] subversion (SSA:2016-097-01)
New subversion packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--+