+ About the security content of Safari 6.0.5
http://support.apple.com/kb/HT5785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0879
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0991
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0992
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0993
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0994
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0995
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0996
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0998
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0999
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1000
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1003
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1004
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1005
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1007
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1008
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1009
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1013
+ About the security content of OS X Mountain Lion v10.8.4 and Security Update 2013-002
http://support.apple.com/kb/HT5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0982
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0983
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1024
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0984
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0985
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1945
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0986
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0987
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0989
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0155
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1854
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1856
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0990
+ phpMyAdmin 4.0.3 released
http://sourceforge.net/p/phpmyadmin/news/2013/06/phpmyadmin-403-is-released/
+ PMASA-2013-6 XSS due to unescaped HTML output in Create View page
http://www.phpmyadmin.net/home_page/security/PMASA-2013-6.php
+ Wireshark 1.10.0 released
http://www.wireshark.org/docs/relnotes/wireshark-1.10.0.html
+ Apache Struts 2.3.14.3 released
http://struts.apache.org/release/2.3.x/docs/version-notes-23143.html
+ ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers
http://www.securitytracker.com/id/1028632
+ Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1028627
+ Apple OS X Bugs Let Remote Users Execute Arbitrary Code and Local Users Bypass Security Restrictions
http://www.securitytracker.com/id/1028625
+ REMOTE: Apache Struts includeParams Remote Code Execution
http://www.exploit-db.com/exploits/25980
+ DoS/PoC: Mac OSX Server DirectoryService Buffer Overflow
http://www.exploit-db.com/exploits/25974
+ Apache Struts CVE-2013-2134 OGNL Expression Injection Vulnerability
http://www.securityfocus.com/bid/60346
+ Apache Struts CVE-2013-2135 OGNL Expression Injection Vulnerability
http://www.securityfocus.com/bid/60345
+ Linux Kernel 'copy_event_to_user()' Function Local Information Disclosure Vulnerability
http://www.securityfocus.com/bid/60341
+ Apple Safari Prior to 6.0.5 Multiple Security Vulnerabilities
http://www.securityfocus.com/bid/60330
Trend Micro Smart Protection Server 2.6 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=1965
重要インフラのサイバー・テロに向けた官・民の取り組み
【第4回】“サイバー戦争”をも見据えた米国の取り組みと日本の対応(前編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20130517/477527/?ST=security
JVNVU#91792294 Apple Safari における複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNVU91792294/
JVNVU#92046435 Apple OS X における複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNVU92046435/
VU#722868 IBM QRadar SIEM command injection vulnerability
http://www.kb.cert.org/vuls/id/722868
VU#927644 QNAP VioStor NVR firmware version 4.0.3 and QNAP NAS multiple
http://www.kb.cert.org/vuls/id/927644
REMOTE: Exim sender_address Parameter - RCE Exploit
http://www.exploit-db.com/exploits/25970
REMOTe: MiniUPnPd 1.0 Stack Buffer Overflow Remote Code Execution
http://www.exploit-db.com/exploits/25975
REMOTE: Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution
http://www.exploit-db.com/exploits/25979
REMOTE: Plesk Apache Zeroday Remote Exploit
http://www.exploit-db.com/exploits/25986
REMOTE: Xpient Cash Drawer Operation Vulnerability
http://www.exploit-db.com/exploits/25987
DoS/PoC: PEStudio 3.69 - Denial of Service
http://www.exploit-db.com/exploits/25972
SA53693 Apache Struts OGNL Expression Injection Vulnerabilities
http://secunia.com/advisories/53693/
SA53681 Google Chrome Multiple Vulnerabilities
http://secunia.com/advisories/53681/
SA53684 Apple Mac OS X Multiple Vulnerabilities
http://secunia.com/advisories/53684/
SA53711 Apple Safari Multiple Vulnerabilities
http://secunia.com/advisories/53711/
SA53709 ISC BIND Recursive Query Handling Denial of Service Vulnerability
http://secunia.com/advisories/53709/
Mac OSX Server DirectoryService Buffer Overflow
http://cxsecurity.com/issue/WLB-2013060040
0 件のコメント:
コメントを投稿