Exploit the possiblities
Showing 1 - 25 of 271 RSS Feed

Files

Red Hat Security Advisory 2016-0559-01
Posted Mar 31, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0559-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced Mission Critical for Red Hat Enterprise Linux 5.6 will be retired as of March 31, 2017, and support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 5.6 AMC after March 31, 2017.

tags | advisory
systems | linux, redhat
MD5 | 4af6d4025e910ee139c25ba3f6bc3dba
Red Hat Security Advisory 2016-0560-01
Posted Mar 31, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0560-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Life Cycle Support for Red Hat Enterprise Linux 4 will be retired as of March 31, 2017, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 4 ELS after March 31, 2017.

tags | advisory
systems | linux, redhat
MD5 | 65a4fd94bb927d3265e224799feaddb2
Red Hat Security Advisory 2016-0562-01
Posted Mar 31, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0562-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-1285, CVE-2016-1286
MD5 | 7ce6b544409a9bebfa2bb8ddc5a7c4ff
Red Hat Security Advisory 2016-0561-01
Posted Mar 31, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0561-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, support for Red Hat Enterprise Linux 5 will be retired on March 31, 2017, at the end of Production Phase 3. Until that date, customers will continue to receive Critical impact security patches and selected urgent priority bug fixes for RHEL 5.11. On that date, active support included with your RHEL Premium or Standard subscription will conclude. This means that customers will continue to have access to all previously released content.

tags | advisory
systems | linux, redhat
MD5 | 35bc1910877c5b2ca4c65c16323565ce
Debian Security Advisory 3538-1
Posted Mar 31, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3538-1 - Several vulnerabilities were discovered in libebml, a library for manipulating Extensible Binary Meta Language files.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-8789, CVE-2015-8790, CVE-2015-8791
MD5 | c337b8a705a70e6d1d2becc86c33b79b
Debian Security Advisory 3537-1
Posted Mar 31, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3537-1 - Several vulnerabilities were discovered in imlib2, an image manipulation library.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2014-9762, CVE-2014-9763, CVE-2014-9764
MD5 | 3b25b7a51c9fa41b4a758f57e560e8d6
Debian Security Advisory 3536-1
Posted Mar 31, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3536-1 - It was discovered that libstruts1.2-java, a Java framework for MVC applications, contains a bug in its multi-page validation code. This allows input validation to be bypassed, even if MPV is not used directly.

tags | advisory, java
systems | linux, debian
advisories | CVE-2015-0899
MD5 | e1ae343a7d28ca21618e50508f60f7ac
Red Hat Security Advisory 2016-0537-01
Posted Mar 30, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0537-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix: A buffer overflow flaw was discovered in the OVS processing of MPLS labels. A remote attacker able to deliver a frame containing a malicious MPLS label that would be processed by OVS could trigger the flaw and use the resulting memory corruption to cause a denial of service or, possibly, execute arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary, protocol
systems | linux, redhat
advisories | CVE-2016-2074
MD5 | caf2773d281e3364806f74a2799d7bbc
Red Hat Security Advisory 2016-0540-01
Posted Mar 30, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0540-01 - Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This release of Red Hat JBoss BRMS 6.2.2 serves as a replacement for Red Hat JBoss BRMS 6.2.1, and includes bug fixes and enhancements, which are documented in the README.txt file included with the patch files. Security Fix: A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.

tags | advisory, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2016-2510
MD5 | f2dc4bca3037500239a1bc5e582add50
Red Hat Security Advisory 2016-0539-01
Posted Mar 30, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0539-01 - Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules and BPMN2-compliant business processes. This release of Red Hat JBoss BPM Suite 6.2.2 serves as a replacement for Red Hat JBoss BPM Suite 6.2.1, and includes bug fixes and enhancements, which are documented in the README.txt file included with the patch files. Security Fix: A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.

tags | advisory, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2016-2510
MD5 | d90a95192eb0b78501306eb54a12397e
Cisco Security Advisory 20160330-fp
Posted Mar 30, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the malicious file detection and blocking features of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. The vulnerability is due to improper input validation of fields in HTTP headers. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to bypass malicious file detection or blocking policies that are configured for the system, which could allow malware to pass through the system undetected. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

tags | advisory, remote, web
systems | cisco
MD5 | cbe6828486abd044f7e9313e9b285253
Kamailio 4.3.4 Heap Overflow
Posted Mar 30, 2016
Authored by Stelios Tsampas

Kamailio version 4.3.4 suffers from a heap overflow vulnerability in the SEAS module.

tags | advisory, overflow
advisories | CVE-2016-2385
MD5 | 093fb1bf7e6b9c261e7b506c430da603
Red Hat Security Advisory 2016-0525-01
Posted Mar 30, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0525-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 49.0.2623.108. Security Fix: Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-1646, CVE-2016-1647, CVE-2016-1648, CVE-2016-1649, CVE-2016-1650
MD5 | 51a4688c7ddc3766d95cd46c61a5a2d7
Debian Security Advisory 3535-1
Posted Mar 30, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3535-1 - Stelios Tsampas discovered a buffer overflow in the Kamailio SIP proxy which might result in the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2016-2385
MD5 | 9c3d19a05634b69fbf6d1245c1bbbe36
Red Hat Security Advisory 2016-0524-01
Posted Mar 30, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0524-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix: A buffer overflow flaw was discovered in the OVS processing of MPLS labels. A remote attacker able to deliver a frame containing a malicious MPLS label that would be processed by OVS could trigger the flaw and use the resulting memory corruption to cause a denial of service or, possibly, execute arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary, protocol
systems | linux, redhat
advisories | CVE-2016-2074
MD5 | 98b52739fd709c187a0437f27e9e117f
Red Hat Security Advisory 2016-0523-01
Posted Mar 30, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0523-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix: A buffer overflow flaw was discovered in the OVS processing of MPLS labels. A remote attacker able to deliver a frame containing a malicious MPLS label that would be processed by OVS could trigger the flaw and use the resulting memory corruption to cause a denial of service or, possibly, execute arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary, protocol
systems | linux, redhat
advisories | CVE-2016-2074
MD5 | 60b996b8848aa868447398ce77e070f9
HP Security Bulletin HPSBGN03444 2
Posted Mar 29, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03444 2 - Potential vulnerabilities have been identified in HPE Network Automation. The vulnerabilities could allow remote code execution and disclosure of sensitive information. Revision 2 of this advisory.

tags | advisory, remote, vulnerability, code execution
advisories | CVE-2016-1988, CVE-2016-1989
MD5 | 47d3b35656c2d406d892ac28203b8097
Debian Security Advisory 3534-1
Posted Mar 29, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3534-1 - Guido Vranken discovered several vulnerabilities in dhcpcd, a DHCP client, which may result in denial of service.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2012-6698, CVE-2012-6699, CVE-2012-6700
MD5 | eeecd282d30663f77ab367bfc8cecbeb
Ubuntu Security Notice USN-2943-1
Posted Mar 29, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2943-1 - It was discovered that PCRE incorrectly handled certain regular expressions. A remote attacker could use this issue to cause applications using PCRE to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-9769, CVE-2015-2325, CVE-2015-2326, CVE-2015-2327, CVE-2015-2328, CVE-2015-3210, CVE-2015-5073, CVE-2015-8380, CVE-2015-8381, CVE-2015-8382, CVE-2015-8383, CVE-2015-8384, CVE-2015-8385, CVE-2015-8386, CVE-2015-8387, CVE-2015-8388, CVE-2015-8389, CVE-2015-8390, CVE-2015-8391, CVE-2015-8392, CVE-2015-8393, CVE-2015-8394, CVE-2015-8395, CVE-2016-1283, CVE-2016-3191
MD5 | fbd3b35e5c2cb6aa570e6b56ca4e42d5
Debian Security Advisory 3533-1
Posted Mar 29, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3533-1 - Kashyap Thimmaraju and Bhargava Shastry discovered a remotely triggerable buffer overflow vulnerability in openvswitch, a production quality, multilayer virtual switch implementation. Specially crafted MPLS packets could overflow the buffer reserved for MPLS labels in an OVS internal data structure. A remote attacker can take advantage of this flaw to cause a denial of service, or potentially, execution of arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2016-2074
MD5 | bc8a28807823c1f9a06a4c501812a3f2
BMC Server Automation (BSA) RSCD Agent Unauthorized Password Reset
Posted Mar 28, 2016
Site bmc.com

A security vulnerability has been identified in BMC Server Automation (BSA) RSCD Agent on the Linux/Unix platforms. The vulnerability allows unauthorized remote password resets on a target server by using the Remote Procedure Call (RPC) API of the RSCD Agent. Windows agents are not affected. The flaw has been confirmed to exist in the following versions of BSA on Unix and Linux platforms: 8.2.x, 8.3.x, 8.5.x, 8.6.x and 8.7.x.

tags | advisory, remote
systems | linux, windows, unix
advisories | CVE-2016-1543
MD5 | d9397f186e1697e8dab27e5badc16632
BMC Server Automation (BSA) RSCD Agent User Enumeration
Posted Mar 28, 2016
Site bmc.com

A security vulnerability has been identified in BMC Server Automation (BSA) RSCD Agent on the Linux/Unix platforms. The vulnerability allows unauthorized remote user enumeration on a target server by using the Remote Procedure Call (RPC) API of the RSCD Agent. Windows agents are not affected. The flaw has been confirmed to exist in the following versions of BSA on Unix and Linux platforms: 8.2.x, 8.3.x, 8.5.x, 8.6.x and 8.7.x.

tags | advisory, remote
systems | linux, windows, unix
advisories | CVE-2016-1542
MD5 | ab18836e547e6d040c655878a9c27475
Debian Security Advisory 3532-1
Posted Mar 28, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3532-1 - Kostya Kortchinsky discovered a stack-based buffer overflow vulnerability in the VPNv4 NLRI parser in bgpd in quagga, a BGP/OSPF/RIP routing daemon. A remote attacker can exploit this flaw to cause a denial of service (daemon crash), or potentially, execution of arbitrary code, if bgpd is configured with BGP peers enabled for VPNv4.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2016-2342
MD5 | 0fe27d2e21d7bdb9a0d6191969679e0b
Debian Security Advisory 3531-1
Posted Mar 27, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3531-1 - Several vulnerabilities have been discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2016-1646, CVE-2016-1647, CVE-2016-1648, CVE-2016-1649, CVE-2016-1650
MD5 | 35f44123fb22e7de2b71c0ade23d213b
Slackware Security Advisory - libevent Updates
Posted Mar 26, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New libevent packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2014-6272
MD5 | e26699ab34e5c238dc86561e0bdd410b
Page 1 of 11
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
FCC Blocks LEA Net Neutrality Comment Investigation
Posted Dec 13, 2017

tags | headline, government, usa, russia, fraud
Starbucks Wi-Fi Makes Computers Mine Cryptocurrency
Posted Dec 13, 2017

tags | headline, hacker, wireless, fraud, cryptography
Put Down The Eggnog, It's Patch Tuesday
Posted Dec 13, 2017

tags | headline, microsoft, flaw, patch
Archive Of 1.4 Billion Creds Found On Dark Web
Posted Dec 12, 2017

tags | headline, hacker, data loss, password
MoneyTaker Steals Millions From US, UK, Russian Banks
Posted Dec 12, 2017

tags | headline, malware, bank, usa, britain, russia, cybercrime, fraud
Web Pioneers Plead To Cancel US Net Vote
Posted Dec 12, 2017

tags | headline, government, usa, fraud
Google Releases Tool To Help iPhone Hackers
Posted Dec 12, 2017

tags | headline, hacker, phone, google, apple
Language Bugs Infest Downstream Software
Posted Dec 11, 2017

tags | headline, flaw
German Spy Agency Warns Of Chinese LinkedIn Espionage
Posted Dec 11, 2017

tags | headline, government, china, cyberwar, germany, spyware, social
Dynamics 365 Sandbox Leaked TLS Certificates
Posted Dec 11, 2017

tags | headline, privacy, microsoft, data loss, flaw, cryptography
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close