-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:228
http://www.mandriva.com/en/support/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:229
http://www.mandriva.com/en/support/security/
January 2013, we encountered the latest version of RealArcade installer
provided by GameHouse (a division of RealNetworks) on a system during an
audit. Considering its historical vulnerabilities and recent reports about
vulnerabilities in game clients/installers, we decided to take a closer
look
TITLE: Unauthenticated Remote File Upload via HTTP for lua-Programming language 1.6 on iOSDate: 8/1/2013Author: Larry W. Cashdollar, @_larry0Download:https://itunes.apple.com/us/app/lua-programming-language/id578116006?mt=8ls=1http://www.tayutec.com/indexen.htmlDescription: "Please download the
On Sep 10, 2013, at 02:19 PM, "Larry W. Cashdollar" lar...@me.com wrote:https://itunes.apple.com/us/app/lua-programming-language/id578116006?mt=8ls=1Sorry that URL above is incorrect:
Title:
==
eTransfer Lite v1.0 iOS - Persistent Filename Vulnerability
Date:
=
2013-08-31
References:
===
http://www.vulnerability-lab.com/get_content.php?id=1064
VL-ID:
=
1064
Common Vulnerability Scoring System:
3.8
Introduction:
Title:
==
Microsoft SharePoint 2013 (Cloud) - Persistent Exception Handling Web
Vulnerability
Date:
=
2013-09-11
References:
===
http://www.vulnerability-lab.com/get_content.php?id=812
Security Bulletin: MS13-067
http://technet.microsoft.com/de-de/security/bulletin/MS13-067
Title:
==
Talkie Bluetooth Video iFiles 2.0 iOS - Multiple Vulnerabilities
Date:
=
2013-08-30
References:
===
http://www.vulnerability-lab.com/get_content.php?id=1062
VL-ID:
=
1063
Common Vulnerability Scoring System:
8.8
**
Title: Synology DSM multiple vulnerabilities
Version affected: = 4.3-3776
Vendor: Synology
Discovered by: Andrea Fabrizi
Email: andrea.fabr...@gmail.com
Web: http://www.andreafabrizi.it
Twitter: @andreaf83
Status: unpatched