2013年7月3日水曜日
3日 水曜日、大安
+ Opera 15.00 released
http://www.opera.com/docs/changelogs/unified/1500/
+ squid 3.3.6 released
http://www.squid-cache.org/Versions/v3/3.3/RELEASENOTES.html
+ UPDATE: Cisco Prime Network Control Systems Database Default Credentials Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-ncs
+ HPSBUX02893 rev.1 - HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Cross Site Scripting (XSS)
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03820647-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ HPSBUX02889 SSRT101252 rev.1 - HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03809278-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ CVE-2012-5526 Configuration vulnerability in Perl
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5526_configuration_vulnerability
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5526
+ CVE-2012-6329 Code Injection vulnerability in Perl 5.8
https://blogs.oracle.com/sunsecurity/entry/cve_2012_6329_code_injection1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6329
+ CVE-2011-0465 Improper Input Validation vulnerability in X.Org
https://blogs.oracle.com/sunsecurity/entry/cve_2011_0465_improper_input
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465
+ CVE-2012-5134 Buffer Overflow vulnerability in libxml2
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5134_buffer_overflow
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134
+ Multiple Input Validation vulnerabilities in kerberos
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151
+ Samba 4.0.7 Available for Download
http://samba.org/samba/history/samba-4.0.7.html
+ Apple OS X QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1028723
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1018
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1019
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1022
+ Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation Metasploit
http://cxsecurity.com/issue/WLB-2013070020
+ Windows 8 to NT EPATHOBJ Local Ring 0 Exploit
http://cxsecurity.com/issue/WLB-2013060019
Advisory: Sophos Anti-Virus for UNIX - Process memory limit recommendations on AIX systems
http://www.sophos.com/en-us/support/knowledgebase/118805.aspx
モバイルデバイスからの情報漏えいと戦う「安全な暗号化」
第3回 情報価値で4段階に分類、漏えい対策にメリハリを
http://itpro.nikkeibp.co.jp/article/COLUMN/20130625/487538/?ST=security
最新サイバー攻撃に備える
大規模化するDDoS攻撃
http://itpro.nikkeibp.co.jp/article/COLUMN/20130628/488536/?ST=security
相次ぐWeb改ざん、原因はまたもや“Gumblar”か
http://itpro.nikkeibp.co.jp/article/NEWS/20130702/488823/?ST=security
LOCAL: Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
http://www.exploit-db.com/exploits/26554
DoS/PoC: WinAmp 5.63 - Invalid Pointer Dereference
http://www.exploit-db.com/exploits/26557
DoS/PoC: WinAmp 5.63 - Stack-based Buffer Overflow
http://www.exploit-db.com/exploits/26558
登録:
コメントの投稿 (Atom)
0 件のコメント:
コメントを投稿