+ About the security content of iTunes 11.1.2
http://support.apple.com/kb/HT6001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1024
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1037
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1039
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1042
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1045
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1047
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5126
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0841
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2870
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2871
+ About the security content of Apple Remote Desktop 3.7
http://support.apple.com/kb/HT5998
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5135
+ About the security content of Apple Remote Desktop 3.5.4
http://support.apple.com/kb/HT5997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5135
+ About the security content of OS X Server v3.0
http://support.apple.com/kb/HT5999
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1854
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1856
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5143
+ About the security content of Keynote 6.0
http://support.apple.com/kb/HT6002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5148
+ About the security content of OS X Mavericks v10.9
http://support.apple.com/kb/HT6011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5165
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5179
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5168
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5171
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3950
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5138
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5142
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5176
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3954
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5184
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5180
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5181
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5182
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5186
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3427
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5189
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5190
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5187
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5188
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5135
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5191
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5192
+ About the security content of Safari 6.1
http://support.apple.com/kb/HT6000
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1036
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1037
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1039
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1042
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1045
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1047
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5126
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5130
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5131
+ About the security content of iOS 7.0.3
http://support.apple.com/kb/HT6010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5164
+ CESA-2013:1452 Moderate CentOS 5 vino Update
http://lwn.net/Alerts/571425/
+ CESA-2013:1452 Moderate CentOS 6 vino Update
http://lwn.net/Alerts/571426/
+ CESA-2013:1451 Critical CentOS 6 java-1.7.0-openjdk Update
http://lwn.net/Alerts/571423/
+ CESA-2013:1449 Moderate CentOS 5 kernel Update
http://lwn.net/Alerts/571424/
+ CESA-2013:1447 Important CentOS 5 java-1.7.0-openjdk Update
http://lwn.net/Alerts/571422/
+ Cisco IOS XR Software Route Processor Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-iosxr
+ Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
+ Multiple Vulnerabilities in Cisco Identity Services Engine
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-ise
+ glibc AF_INET6 stack overflow
http://cxsecurity.com/issue/WLB-2013100160
+ Microsoft Silverlight Invalid Typecast / Memory Disclosure
http://cxsecurity.com/issue/WLB-2013100158
+ Windows Management Instrumentation (WMI) Remote Command Execution
http://cxsecurity.com/issue/WLB-2013100152
+ SA55309 GNU C Library "getaddrinfo()" Denial of Service Vulnerability
http://secunia.com/advisories/55309/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
ウイルス対策製品検出用検索エンジン 3.5.8760 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2029
Trend Micro Portable Security 1.5 Patch 2 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2028
curl in Mac OS X Mavericks 10.9
http://curl.haxx.se/mail/archive-2013-10/0036.html
開発体制を企業市場向けにも拡大、金融モバイル取引のセキュリティ対策が急務に
露カスペルスキー CTO ニコライ・グレベンニコ氏
http://itpro.nikkeibp.co.jp/article/Interview/20131022/512753/?ST=security
ウォッチガード、自社UTMのログを可視化・分析するソフトの無償提供を開始
http://itpro.nikkeibp.co.jp/article/NEWS/20131023/513212/?ST=security
セブンネットショッピングに不正アクセス、約15万件のカード情報に不正閲覧の可能性
http://itpro.nikkeibp.co.jp/article/NEWS/20131023/513203/?ST=security
ウイングアーク、PDF帳票の長期アーカイブでキーレス署名を可能に
http://itpro.nikkeibp.co.jp/article/NEWS/20131023/513062/?ST=security
一般個人を狙う標的型攻撃がやってくる
http://itpro.nikkeibp.co.jp/article/Interview/20131022/512763/?ST=security
あなたのそのセキュリティ認識、間違っています
http://itpro.nikkeibp.co.jp/article/COLUMN/20131017/511850/?ST=security
JVNVU#93851007 DrayTek Vigor2700 にコマンドインジェクションの脆弱性
http://jvn.jp/cert/JVNVU93851007/
LOCAL: Avira Internet Security avipbb.sys Filter Bypass and Privilege Escalation
http://www.exploit-db.com/exploits/29125
0 件のコメント:
コメントを投稿