+ RHSA-2013:1452 Moderate: vino security update
http://rhn.redhat.com/errata/RHSA-2013-1452.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745
+ RHSA-2013:1451 Critical: java-1.7.0-openjdk security update
http://rhn.redhat.com/errata/RHSA-2013-1451.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851
+ Selenium Server 2.37.0 released
http://code.google.com/p/selenium/wiki/Grid2
+ Selenium IE Driver Server 2.37.0 released
http://docs.seleniumhq.org/download/
+ Selenium Client & WebDriver 2.37.0 released
http://docs.seleniumhq.org/download/
+ CentOS 5.10 released
http://lists.centos.org/pipermail/centos-announce/2013-October/019978.html
+ RHSA-2013:1449 Moderate: kernel security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1449.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
+ RHSA-2013:1452 Moderate: vino security update
http://rhn.redhat.com/errata/RHSA-2013-1452.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745
+ HS13-025 Multiple Vulnerabilities in Cosminexus
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html
+ HS13-025 Cosminexusにおける複数の脆弱性
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS13-025/index.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
+ Nmap 6.40 Released
http://seclists.org/nmap-announce/2013/1
+ Android Camera Driver Buffer Overflow / Memory Disclosure
http://cxsecurity.com/issue/WLB-2013100146
+ Apple iOS 7 for iPhone CVE-2013-5164 Local Security Bypass Vulnerability
http://www.securityfocus.com/bid/63278
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5164
+ Apple iOS 7 for iPhone CVE-2013-5162 Security Bypass Vulnerability
http://www.securityfocus.com/bid/63277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5162
+ Apple iOS 7 for iPhone CVE-2013-5144 Local Security Bypass Vulnerability
http://www.securityfocus.com/bid/63276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5144
Mac OS X 10.9 (Mavericks) に対する弊社エンドポイント製品の対応状況について
http://www.trendmicro.co.jp/support/news.asp?id=2030
ダメージクリーンナップエンジン 7.1 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2020
Advisory: Windows 8.1 and Windows Server 2012 R2 - support for Sophos products
http://www.sophos.com/en-us/support/knowledgebase/119957.aspx
Windowsストアで「トレンドマイクロ コネクト」公開、セキュリティ状況を一元管理
http://itpro.nikkeibp.co.jp/article/NEWS/20131023/512943/?ST=security
世界のセキュリティ・ラボから
IEの脆弱性を利用する標的型攻撃
http://itpro.nikkeibp.co.jp/article/COLUMN/20131021/512282/?ST=security
Google、DDoS攻撃や検閲からWebサイトを保護する取り組みなど発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131022/512665/?ST=security
UPDATE: JVN#59503133 複数の NEC 製モバイルルータにおけるクロスサイトリクエストフォージェリの脆弱性
http://jvn.jp/jp/JVN59503133/index.html
UPDATE: JVNVU#405811 Apache HTTPD サーバにサービス運用妨害 (DoS) の脆弱性
http://jvn.jp/cert/JVNVU405811/index.html
VU#101462 DrayTek Vigor 2700 ADSL router contains a command injection vulnerability
http://www.kb.cert.org/vuls/id/101462
REMOTE: D-Link DIR-605L Captcha Handling Buffer Overflow
http://www.exploit-db.com/exploits/29127
REMOTE: Interactive Graphical SCADA System Remote Command Injection
http://www.exploit-db.com/exploits/29129
REMOTE: HP Intelligent Management Center BIMS UploadServlet Directory Traversal
http://www.exploit-db.com/exploits/29130
REMOTE: WebTester 5.x Command Execution
http://www.exploit-db.com/exploits/29132
0 件のコメント:
コメントを投稿