Mail Index
- [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege
- Splunk Enterprise Information Theft CVE-2017-5607
- SEC Consult SA-20170403-0 :: Misbehavior of PHP fsockopen function
- From: SEC Consult Vulnerability Lab
- [security bulletin] HPESBGN03721 rev.1 - HPE Operations Bridge Analytics, Remote Cross-Site Scripting (XSS)
- Kaseya VSA 6.5 Parameter Reflected XSS, Enumeration and Bruteforce Weakness
- Lotus Protector for Mail Security remote code execution
- Avaya Radvision SCOPIA Desktop dlg_loginownerid.jsp ownerid SQL Injection
- AirWatch Self Service Portal Username Parameter LDAP Injection
- Manhattan Software IWMS (Integrated Workplace Management System) XML External Entity (XXE) Injection File Disclosure
- Lantern CMS Path Disclosure, SQL Injection, Reflected XSS
- CVE-2017-7185 - Mongoose OS - Use-after-free / Denial of Service
- Computer Associates API Gateway CRLF Response Splitting, Directory Traversal vulnerabilities
- Tweek!DM Document Management Authentication bypass, SQL injection
- SilverStripe CMS - Path Disclosure
- SmartJobBoard - Cross-site scripting, personal information disclosure and PHPMailer package
- AcoraCMS browser redirect and Cross-site scripting vulnerabilities
- Kaseya information disclosure vulnerability
- iPlatinum iOneView Multiple Parameter Reflected XSS
- Moodle URL Manipulation Remote Account Information Disclosure
- OS-S-2017-01: The password for the application protection of the Schneider Modicon TM221CE16R can be retrieved without authentication. Subsequently the application may be arbitrarily downloaded, uploaded and modified. CVSS 10.
- The password for the project protection of the Schneider Modicon TM221CE16R is hard-coded and cannot be changed.
- AST-2017-001: Buffer overflow in CDR's set user
- From: Asterisk Security Team
- [SECURITY] [DSA 3826-1] tryton-server security update
- From: Salvatore Bonaccorso
- DefenseCode ThunderScan SAST Advisory: Apache Tomcat Directory/Path Traversal
- [security bulletin] HPESBGN03727 rev.1 - HPE Business Process Monitor, Remote Unauthorized Access to Data
- Spiceworks 7.5 TFTP Improper Access Control File Overwrite / Upload
- Trend Micro Enterprise Mobile Security Android Application - MITM SSL Certificate Vulnerability (CVE-2016-9319)
- Apple Music Android Application - MITM SSL Certificate Vulnerability (CVE-2017-2387)
- SEC Consult SA-20170407-0 :: Server-Side Request Forgery in MyBB forum
- From: SEC Consult Vulnerability Lab
- D-Link DWR-116 - CVE-2017-6190 - Arbitrary File Download
- [CVE-2016-6805] Arbitrary File Read due to eXternal Xml Entity attack in Apache Ignite
- [security bulletin] HPESBGN03733 rev.1 - HPE Universal CMDB using Apache Struts, Remote Code Execution
- [SECURITY] [DSA 3827-1] jasper security update
- [slackware-security] libtiff (SSA:2017-098-01)
- From: Slackware Security Team
- Foscam All networked devices, multiple Design Errors. SSL bypass.
- ChromeOS / ChromeBooks Persist Certain Network Settings in Guest Mode
- From: Nightwatch Cybersecurity Research
- DefenseCode ThunderScan SAST Advisory: WordPress Tribulant Slideshow Gallery Plugin - Cross-Site Scripting Vulnerabilities
- [SECURITY] CVE-2017-5651 Apache Tomcat Information Disclosure
- [SECURITY] CVE-2017-5648 Apache Tomcat Information Disclosure
- Multiple local privilege escalation vulnerabilities in Proxifier for Mac
- Microsoft Office OneNote 2007 DLL side loading vulnerability
- [SECURITY] [DSA 3829-1] bouncycastle security update
- FreeBSD Security Advisory FreeBSD-SA-17:03.ntp
- From: FreeBSD Security Advisories
- CVE-2017-7457 Moxa MX AOPC-Server v1.5 XML External Entity Injection
- CVE-2017-7455 Moxa MXview v2.8 Remote Private Key Disclosure
- CVE-2017-7456 Moxa MXview v2.8 Denial Of Service
- DefenseCode Security Advisory: Magento 0day Arbitrary File Upload Vulnerability (Remote Code Execution, CSRF)
- April 2017 - HipChat Server Advisory
- [SYSS-2017-005] agorum core Pro - Persistent Cross-Site Scripting
- From: erlijn . vangenuchten
- [SYSS-2017-006] agorum core Pro - Insecure Direct Object Reference
- From: erlijn . vangenuchten
- [SYSS-2017-007] agorum core Pro - Cross-Site Scripting
- From: erlijn . vangenuchten
- [SYSS-2017-008] agorum core Pro - Cross-Site Request Forgery
- From: erlijn . vangenuchten
- [SYSS-2017-009] agorum core Pro - Improper Restriction of XML External Entity Reference ('XXE')
- From: erlijn . vangenuchten
- [security bulletin] HPESBGN03728 rev.1 - HPE Operations Agent using OpenSSL, Remote Denial of Service (DoS), Unauthorized Access to Data
- [slackware-security] bind (SSA:2017-103-01)
- From: Slackware Security Team
- concrete5 v8.1.0 Host Header Injection
- Watchguard Fireware XXE DoS & User Enumeration
- [ANNOUNCE] HPACK Bomb Attack vulnerability in ATS - CVE-2016-5396
- [CVE-2017-5661] Apache XML Graphics FOP information disclosure vulnerability
- CVE-2017-7615 Mantis Bug Tracker v1.3.0 / 2.3.0 Pre-Auth Remote Password Reset
- [slackware-security] minicom (SSA:2017-108-01)
- From: Slackware Security Team
- CVE-2017-7692: Squirrelmail 1.4.22 Remote Code Execution
- CVE-2017-7220. OpenText Documentum Content Server: privilege evaluation using crafted RPC save-commands.
- DefenseCode ThunderScan SAST Advisory: Ultimate Form Builder Cross-Site Scripting (XSS) Vulnerability
- October CMS v1.0.412 several vulnerabilities
- [HITB-Announce] HITB GSEC 2017 CFP Closes April 30th
- [SECURITY] [DSA 3831-1] firefox-esr security update
- CVE-2017-7192: Starscream library before 2.0.4 allows SSL pinning bypass
- From: Security Advisories
- CVE-2017-5887: Starscream library before 2.0.4 SSL pinning not applied for websocket handshake
- From: Security Advisories
- Authentication bypass vulnerability in Western Digital My Cloud allows escalation to admin privileges
- [slackware-security] proftpd (SSA:2017-112-03)
- From: Slackware Security Team
- [slackware-security] mozilla-firefox (SSA:2017-112-01)
- From: Slackware Security Team
- [slackware-security] ntp (SSA:2017-112-02)
- From: Slackware Security Team
- Re: CVE-2017-7692: Squirrelmail 1.4.22 Remote Code Execution
- CVE-2017-7221. OpenText Documentum Content Server: arbitrary code execution in dm_bp_transition.ebs docbase method
- KL-001-2017-005 : Solarwinds LEM Privilege Escalation via Controlled Sudo Path
- From: KoreLogic Disclosures
- KL-001-2017-006 : Solarwinds LEM Privilege Escalation via Sudo Script Abuse
- From: KoreLogic Disclosures
- KL-001-2017-007 : Solarwinds LEM Management Shell Escape via Command Injection
- From: KoreLogic Disclosures
- KL-001-2017-008 : Solarwinds LEM Management Shell Arbitrary File Read
- From: KoreLogic Disclosures
- KL-001-2017-009 : Solarwinds LEM Database Listener with Hardcoded Credentials
- From: KoreLogic Disclosures
- [SECURITY] [DSA 3833-1] libav security update
- [slackware-security] mozilla-firefox (SSA:2017-114-01)
- From: Slackware Security Team
- [SECURITY] [DSA 3834-1] mysql-5.5 security update
- From: Salvatore Bonaccorso
- April 2017 - Confluence - Security Advisory
- CVE-2017-3162: Apache Hadoop DataNode web UI vulnerability
- FreeBSD Security Advisory FreeBSD-SA-17:04.ipfilter
- From: FreeBSD Security Advisories
- [SECURITY] [DSA 3836-1] weechat security update
- From: Salvatore Bonaccorso
- Live Helper Chat - Cross-Site Scripting
- Apple iOS 10.2 & 10.3 - Control Panel Denial of Service Vulnerability
- [SECURITY] [DSA 3838-1] ghostscript security update
- From: Salvatore Bonaccorso
- [security bulletin] HPESBHF03738 rev.1 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution
Mail converted by MHonArc