+ UPDATE: HPSBHF02888 rev.3 - HP Network Products including H3C and 3COM Routers and Switches, Remote Information Disclosure and Code Execution
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03808969-3%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ Perl 5.18.1 released
http://www.perl.org/get.html
+ IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1028954
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0590
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0595
+ RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1028953
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4973
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4974
+ Linux Kernel ARM Null Pointer Dereference Lets Local Users Deny Service
http://www.securitytracker.com/id/1028951
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5634
+ REMOTE: Oracle Endeca Server Remote Command Execution
http://www.exploit-db.com/exploits/27877
+ DoS/PoC: libtiff <= 3.9.5 - Integer Overflow
http://www.exploit-db.com/exploits/27875
+ SA54645 IBM Lotus iNotes Multiple Cross-Site Scripting Vulnerabilities
http://secunia.com/advisories/54645/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0590
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0595
+ SA54651 IBM WebSphere Extended Deployment Compute Grid Information Disclosure Weakness
http://secunia.com/advisories/54651/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4039
+ SA54655 IBM Tivoli Workload Scheduler OpenSSL Multiple Vulnerabilities
http://secunia.com/advisories/54655/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0014
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0884
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
+ SA54643 IBM WebSphere Commerce Tools Pages Cross-Site Scripting Vulnerabilities
http://secunia.com/advisories/54643/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0566
+ SA54621 RealPlayer Two Vulnerabilities
http://secunia.com/advisories/54621/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4973
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4974
+ Linux Kernel NULL Pointer Dereference Local Denial of Service Vulnerability
http://www.securityfocus.com/bid/61995
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5634
Trend Micro Deep Discovery Inspector 3.5 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2000
【スマホ少女の憂鬱、スマホ少年の暴走~今、10代が危ない】
第12回 話し合いと微調整を繰り返す、親は子供のスマホ利用にどう向き合う?(後編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20130821/499306/?ST=security
JVNVU#92040696 SearchBlox に複数の脆弱性
http://jvn.jp/cert/JVNVU92040696/
VU#595142 Corporater EPM Suite is vulnerable to cross-site request forgery and cross-site scripting
http://www.kb.cert.org/vuls/id/595142
VU#246524 Real Media Player filename handler stack buffer overflow vulnerability
http://www.kb.cert.org/vuls/id/246524
REMOTE: Belkin G Wireless Router Firmware 5.00.12 - RCE PoC
http://www.exploit-db.com/exploits/27873
0 件のコメント:
コメントを投稿