2013年6月6日木曜日

6日 木曜日、先勝

+ About the security content of Safari 6.0.5
http://support.apple.com/kb/HT5785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0879
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0991
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0992
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0993
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0994
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0995
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0996
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0998
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0999
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1000
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1003
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1004
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1005
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1007
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1008
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1009
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1013

+ About the security content of OS X Mountain Lion v10.8.4 and Security Update 2013-002
http://support.apple.com/kb/HT5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0982
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0983
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1024
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0984
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0985
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1945
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0986
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0987
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0989
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0155
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1854
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1856
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0990

+ phpMyAdmin 4.0.3 released
http://sourceforge.net/p/phpmyadmin/news/2013/06/phpmyadmin-403-is-released/

+ PMASA-2013-6 XSS due to unescaped HTML output in Create View page
http://www.phpmyadmin.net/home_page/security/PMASA-2013-6.php

+ Wireshark 1.10.0 released
http://www.wireshark.org/docs/relnotes/wireshark-1.10.0.html

+ Apache Struts 2.3.14.3 released
http://struts.apache.org/release/2.3.x/docs/version-notes-23143.html

+ ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers
http://www.securitytracker.com/id/1028632

+ Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1028627

+ Apple OS X Bugs Let Remote Users Execute Arbitrary Code and Local Users Bypass Security Restrictions
http://www.securitytracker.com/id/1028625

+ REMOTE: Apache Struts includeParams Remote Code Execution
http://www.exploit-db.com/exploits/25980

+ DoS/PoC: Mac OSX Server DirectoryService Buffer Overflow
http://www.exploit-db.com/exploits/25974

+ Apache Struts CVE-2013-2134 OGNL Expression Injection Vulnerability
http://www.securityfocus.com/bid/60346

+ Apache Struts CVE-2013-2135 OGNL Expression Injection Vulnerability
http://www.securityfocus.com/bid/60345

+ Linux Kernel 'copy_event_to_user()' Function Local Information Disclosure Vulnerability
http://www.securityfocus.com/bid/60341

+ Apple Safari Prior to 6.0.5 Multiple Security Vulnerabilities
http://www.securityfocus.com/bid/60330

Trend Micro Smart Protection Server 2.6 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=1965

重要インフラのサイバー・テロに向けた官・民の取り組み
【第4回】“サイバー戦争”をも見据えた米国の取り組みと日本の対応(前編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20130517/477527/?ST=security

JVNVU#91792294 Apple Safari における複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNVU91792294/

JVNVU#92046435 Apple OS X における複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNVU92046435/

VU#722868 IBM QRadar SIEM command injection vulnerability
http://www.kb.cert.org/vuls/id/722868

VU#927644 QNAP VioStor NVR firmware version 4.0.3 and QNAP NAS multiple
http://www.kb.cert.org/vuls/id/927644

REMOTE: Exim sender_address Parameter - RCE Exploit
http://www.exploit-db.com/exploits/25970

REMOTe: MiniUPnPd 1.0 Stack Buffer Overflow Remote Code Execution
http://www.exploit-db.com/exploits/25975

REMOTE: Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution
http://www.exploit-db.com/exploits/25979

REMOTE: Plesk Apache Zeroday Remote Exploit
http://www.exploit-db.com/exploits/25986

REMOTE: Xpient Cash Drawer Operation Vulnerability
http://www.exploit-db.com/exploits/25987

DoS/PoC: PEStudio 3.69 - Denial of Service
http://www.exploit-db.com/exploits/25972

SA53693 Apache Struts OGNL Expression Injection Vulnerabilities
http://secunia.com/advisories/53693/

SA53681 Google Chrome Multiple Vulnerabilities
http://secunia.com/advisories/53681/

SA53684 Apple Mac OS X Multiple Vulnerabilities
http://secunia.com/advisories/53684/

SA53711 Apple Safari Multiple Vulnerabilities
http://secunia.com/advisories/53711/

SA53709 ISC BIND Recursive Query Handling Denial of Service Vulnerability
http://secunia.com/advisories/53709/

Mac OSX Server DirectoryService Buffer Overflow
http://cxsecurity.com/issue/WLB-2013060040

0 件のコメント:

コメントを投稿