2013年10月23日水曜日

23日 水曜日、先負

+ RHSA-2013:1452 Moderate: vino security update
http://rhn.redhat.com/errata/RHSA-2013-1452.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745

+ RHSA-2013:1451 Critical: java-1.7.0-openjdk security update
http://rhn.redhat.com/errata/RHSA-2013-1451.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851

+ Selenium Server 2.37.0 released
http://code.google.com/p/selenium/wiki/Grid2

+ Selenium IE Driver Server 2.37.0 released
http://docs.seleniumhq.org/download/

+ Selenium Client & WebDriver 2.37.0 released
http://docs.seleniumhq.org/download/

+ CentOS 5.10 released
http://lists.centos.org/pipermail/centos-announce/2013-October/019978.html

+ RHSA-2013:1449 Moderate: kernel security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1449.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368

+ RHSA-2013:1452 Moderate: vino security update
http://rhn.redhat.com/errata/RHSA-2013-1452.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745

+ HS13-025 Multiple Vulnerabilities in Cosminexus
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html
+ HS13-025 Cosminexusにおける複数の脆弱性
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS13-025/index.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850

+ Nmap 6.40 Released
http://seclists.org/nmap-announce/2013/1

+ Android Camera Driver Buffer Overflow / Memory Disclosure
http://cxsecurity.com/issue/WLB-2013100146

+ Apple iOS 7 for iPhone CVE-2013-5164 Local Security Bypass Vulnerability
http://www.securityfocus.com/bid/63278
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5164

+ Apple iOS 7 for iPhone CVE-2013-5162 Security Bypass Vulnerability
http://www.securityfocus.com/bid/63277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5162

+ Apple iOS 7 for iPhone CVE-2013-5144 Local Security Bypass Vulnerability
http://www.securityfocus.com/bid/63276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5144

Mac OS X 10.9 (Mavericks) に対する弊社エンドポイント製品の対応状況について
http://www.trendmicro.co.jp/support/news.asp?id=2030

ダメージクリーンナップエンジン 7.1 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2020

Advisory: Windows 8.1 and Windows Server 2012 R2 - support for Sophos products
http://www.sophos.com/en-us/support/knowledgebase/119957.aspx

Windowsストアで「トレンドマイクロ コネクト」公開、セキュリティ状況を一元管理
http://itpro.nikkeibp.co.jp/article/NEWS/20131023/512943/?ST=security

世界のセキュリティ・ラボから
IEの脆弱性を利用する標的型攻撃
http://itpro.nikkeibp.co.jp/article/COLUMN/20131021/512282/?ST=security

Google、DDoS攻撃や検閲からWebサイトを保護する取り組みなど発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131022/512665/?ST=security

UPDATE: JVN#59503133 複数の NEC 製モバイルルータにおけるクロスサイトリクエストフォージェリの脆弱性
http://jvn.jp/jp/JVN59503133/index.html

UPDATE: JVNVU#405811 Apache HTTPD サーバにサービス運用妨害 (DoS) の脆弱性
http://jvn.jp/cert/JVNVU405811/index.html

VU#101462 DrayTek Vigor 2700 ADSL router contains a command injection vulnerability
http://www.kb.cert.org/vuls/id/101462

REMOTE: D-Link DIR-605L Captcha Handling Buffer Overflow
http://www.exploit-db.com/exploits/29127

REMOTE: Interactive Graphical SCADA System Remote Command Injection
http://www.exploit-db.com/exploits/29129

REMOTE: HP Intelligent Management Center BIMS UploadServlet Directory Traversal
http://www.exploit-db.com/exploits/29130

REMOTE: WebTester 5.x Command Execution
http://www.exploit-db.com/exploits/29132

0 件のコメント:

コメントを投稿