+ RHSA-2015:1921 Important: java-1.7.0-openjdk security update
https://rhn.redhat.com/errata/RHSA-2015-1921.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
+ RHSA-2015:1924 Important: qemu-kvm security update
https://rhn.redhat.com/errata/RHSA-2015-1924.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279
+ RHSA-2015:1919 Important: java-1.8.0-openjdk security update
https://rhn.redhat.com/errata/RHSA-2015-1919.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4868
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
+ RHSA-2015:1920 Critical: java-1.7.0-openjdk security update
https://rhn.redhat.com/errata/RHSA-2015-1920.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
+ RHSA-2015:1917 Important: libwmf security update
https://rhn.redhat.com/errata/RHSA-2015-1917.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
+ About the security content of OS X Server 5.0.15
https://support.apple.com/ja-jp/HT205376
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7031
+ About the security content of iTunes 12.3.1
https://support.apple.com/ja-jp/HT205372
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5928
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5930
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5931
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7013
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7014
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6992
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7017
+ About the security content of OS X El Capitan v10.11.1 and Security Update 2015-007
https://support.apple.com/ja-jp/HT205375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5940
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6985
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7003
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5933
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5934
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7015
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5925
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6992
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7017
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5944
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6995
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7035
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6987
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5942
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6977
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6978
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6991
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6993
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7009
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7018
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6990
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7008
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6989
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7019
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7021
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5938
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5936
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5939
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6996
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5932
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6994
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6984
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7016
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5924
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5945
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7007
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6983
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5943
+ About the security content of Safari 9.0.1
https://support.apple.com/ja-jp/HT205377
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5928
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5930
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5931
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7013
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7014
+ About the security content of watchOS 2.0.1
https://support.apple.com/ja-jp/HT205378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5916
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7015
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5925
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5942
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6989
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5936
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5939
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6996
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6974
+ About the security content of iOS 9.1
https://support.apple.com/ja-jp/HT205370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5940
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7015
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5925
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6992
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7017
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6995
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5942
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6977
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6978
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6990
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6991
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6993
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7008
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7009
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7018
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6979
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6989
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6986
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5936
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5939
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6996
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7004
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6994
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7000
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5924
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6983
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6999
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5928
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5930
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6981
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6982
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7005
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7014
+ Google Chrome 46.0.2490.80 released
http://googlechromereleases.blogspot.jp/2015/10/stable-channel-update_22.html
+ Mozilla Firefox 41.0.2 released
https://www.mozilla.org/en-US/firefox/41.0.2/releasenotes/
MFSA-2015-115 Cross-origin restriction bypass using Fetch
https://www.mozilla.org/en-US/security/advisories/mfsa2015-115/
+ APSB15-27 Security updates available for Adobe Flash Player
https://helpx.adobe.com/security/products/flash-player/apsb15-27.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7645
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7647
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7648
+ CESA-2015:1920 Critical CentOS 7 java-1.7.0-openjdk Security Update
http://lwn.net/Alerts/661745/
+ CESA-2015:1919 Important CentOS 7 java-1.8.0-openjdk Security Update
http://lwn.net/Alerts/661747/
+ CESA-2015:1920 Critical CentOS 6 java-1.7.0-openjdk Security Update
http://lwn.net/Alerts/661743/
+ CESA-2015:1921 Important CentOS 5 java-1.7.0-openjdk Security Update
http://lwn.net/Alerts/661744/
+ CESA-2015:1919 Important CentOS 6 java-1.8.0-openjdk Security Update
http://lwn.net/Alerts/661746/
+ CESA-2015:1917 Important CentOS 7 libwmf Security Update
http://lwn.net/Alerts/661570/
+ CESA-2015:1917 Important CentOS 6 libwmf Security Update
http://lwn.net/Alerts/661569/
+ Wireshark 1.12.8 released
https://www.wireshark.org/docs/relnotes/wireshark-1.12.8.html
+ UPDATE: Cisco ASA Software DHCPv6 Relay Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150115-asa-dhcp
+ Cisco ASA Software DNS Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns2
+ Cisco ASA Software DHCPv6 Relay Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dhcp1
+ Cisco ASA Software DNS Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns1
+ Cisco ASA Software VPN ISAKMP Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-ike
+ UPDATE: Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
+ Linux kernel 4.2.4, 4.1.11, 3.14.55, 3.10.91, 3.4.110 released
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.11
https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.55
https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.91
https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.110
+ Oracle Solaris Third Party Bulletin - October 2015
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
+ Oracle Linux Bulletin - October 2015
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
+ Samba 4.3.1 Available for Download
https://www.samba.org/samba/history/samba-4.3.1.html
+ Oracle Critical Patch Update Advisory - October 2015
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
+ Apache Tomcat 8.0.28, 7.0.65 Released
http://tomcat.apache.org/tomcat-8.0-doc/changelog.html#Tomcat_8.0.28_(markt)
http://tomcat.apache.org/tomcat-7.0-doc/changelog.html
+ Java SE 8u65 / 8u66 released
http://www.oracle.com/technetwork/java/javase/8u-relnotes-2225394.html
+ NTP 4.2.8p4 released
http://archive.ntp.org/ntp4/ChangeLog-stable
+ Postfix stable release 3.0.3 and legacy releases 2.11.7, 2.10.9, and 2.9.15
http://www.postfix.org/announcements/postfix-3.0.3.html
+ ntp Multiple Flaws Let Remote Users Deny Service, View Files, and Bypass Authentication to Modify the Time
http://www.securitytracker.com/id/1033951
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
+ Linux Kernel PPP Device Driver Bug Lets Local Users Cause Denial of Service Conditions on the Target System
http://www.securitytracker.com/id/1033809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799
+ Linux Kernel SCTP Initialization Race Condition Lets Local Users Cause Denial of Service Conditions on the Target System
http://www.securitytracker.com/id/1033808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5283
+ Safari 9.0 (11601.1.56) file prefix crash in HashTable
https://cxsecurity.com/issue/WLB-2015100138
+ Adobe Flash Type Confusion IExternalizable When Performing Local Serialization
https://cxsecurity.com/issue/WLB-2015100136
pgFormatter 1.5 released
http://www.postgresql.org/about/news/1622/
Ora2Pg 16 released
http://www.postgresql.org/about/news/1620/
+ MySQL 5.7.9 released
http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-9.html
+ Tcl/Tk 8.6.4 released
http://www.tcl.tk/software/tcltk/8.6.html
JVNDB-2015-000160 アバストにおけるディレクトリトラバーサルの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000160.html
JVNDB-2015-000162 Android アプリ AirDroid における暗黙的 Intent の扱いに関する脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000162.html
JVNDB-2015-000126 eXtplorer におけるクロスサイトリクエストフォージェリの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000126.html
JVNDB-2015-000159 iOS 版 Party Track SDK におけるサーバ証明書の検証不備の脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000159.html
TEDがNRIセキュアと組んでWAF「BIG-IP ASM」の運用監視サービスを提供
http://itpro.nikkeibp.co.jp/atcl/news/15/102303493/?ST=security
キヤノンITソリューションズ、デスクトップLinux用ウイルス対策ソフト
http://itpro.nikkeibp.co.jp/atcl/news/15/102203490/?ST=security
トレンドマイクロ、HPから事業買収に驚き
http://itpro.nikkeibp.co.jp/atcl/column/14/509445/102200343/?ST=security
トレンドマイクロ、HPの侵入防止システム事業を約3億ドルで買収へ
http://itpro.nikkeibp.co.jp/atcl/news/15/102203482/?ST=security
[迷惑ソフト編]いつの間に?効果はある?不要なら削除
http://itpro.nikkeibp.co.jp/atcl/column/15/101500244/101500004/?ST=security
フォーティネット、無線LANアクセスポイントにUTM機能を搭載
http://itpro.nikkeibp.co.jp/atcl/news/15/102003443/?ST=security
米中首脳会談後も米企業にサイバー攻撃、米セキュリティ会社が報告
http://itpro.nikkeibp.co.jp/atcl/news/15/102003436/?ST=security
JVNVU#92655282 複数の Apple 製品の脆弱性に対するアップデート
http://jvn.jp/vu/JVNVU92655282/
JVNVU#99671861 UPnP を実装した複数のルータ製品にセキュリティ機能の実装が不十分な問題
http://jvn.jp/vu/JVNVU99671861/
JVNVU#99160787 OpenSSL に証明書チェーンの検証不備の脆弱性
http://jvn.jp/vu/JVNVU99160787/
JVNVU#99430390 Windows NTLM が file:// URL へのリダイレクト時に SMB 接続を行いユーザ認証情報を送信する問題
http://jvn.jp/vu/JVNVU99430390/
JVNVU#95877131 OpenSSL に複数の脆弱性
http://jvn.jp/vu/JVNVU95877131/
VU#840844 HP Photosmart B210 printer SMB server buffer overflow vulnerability
http://www.kb.cert.org/vuls/id/840844
VU#966927 HP Client Automation and Radia Client Automation is vulnerable to remote code execution
http://www.kb.cert.org/vuls/id/966927
VU#935424 Virtual Machine Monitors (VMM) contain a memory deduplication vulnerability
http://www.kb.cert.org/vuls/id/935424
VU#675052 Medicomp MEDCIN Engine contains multiple vulnerabilities
http://www.kb.cert.org/vuls/id/675052
VU#842252 HP ArcSight Logger contains multiple vulnerabilities
http://www.kb.cert.org/vuls/id/842252
VU#943167 Voice over LTE implementations contain multiple vulnerabilities
http://www.kb.cert.org/vuls/id/943167
0 件のコメント:
コメントを投稿