exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 221 RSS Feed

Files

Debian Security Advisory 3579-1
Posted May 16, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3579-1 - Gustavo Grieco discovered an use-after-free vulnerability in xerces-c, a validating XML parser library for C++, due to not properly handling invalid characters in XML input documents in the DTDScanner.

tags | advisory
systems | linux, debian
advisories | CVE-2016-2099
SHA-256 | 45b6e047db4b73858971629f52ff7aa4053af4847c4a43806674c5fe5dc051ca
Debian Security Advisory 3578-1
Posted May 16, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3578-1 - It was discovered that libidn, the GNU library for Internationalized Domain Names (IDNs), did not correctly handle invalid UTF-8 input, causing an out-of-bounds read. This could allow attackers to disclose sensitive information from an application using the libidn library.

tags | advisory
systems | linux, debian
advisories | CVE-2015-2059
SHA-256 | 0f6df94ca20bee4e1e8ac06f0e309a5d702366a562dcfdf9f35c4080410948d4
Debian Security Advisory 3577-1
Posted May 16, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3577-1 - Gustavo Grieco discovered that jansson, a C library for encoding, decoding and manipulating JSON data, did not limit the recursion depth when parsing JSON arrays and objects. This could allow remote attackers to cause a denial of service (crash) via stack exhaustion, using crafted JSON data.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2016-4425
SHA-256 | 35e0db4c71f3007af50999c51a455a7780263187a843797552b6d84891ce2fb6
Microsoft Security Bulletin Revision Increment For May, 2016
Posted May 14, 2016
Site microsoft.com

This bulletin summary lists two bulletins that have undergone a major revision increment.

tags | advisory
SHA-256 | 0ab0b3d62a621494c7fcc2fced5ffe038027cabbbefbd0e37da34b4e330554ff
Hipchat Server Remote Code Execution / File Read / SSRF
Posted May 14, 2016
Authored by David Black

HipChat Server versions below 2.0 build 1.4.1 suffer from vulnerabilities including code execution, insufficient shell characters, file deletion, file moving, local file read, and Server-Side Request Forgery.

tags | advisory, shell, local, vulnerability, code execution
SHA-256 | 51f7ff56cb32406c73d6232aee84e2cf2951d8dbfedaba6c3b94f1aa3ec2d083
Debian Security Advisory 3576-1
Posted May 13, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3576-1 - Multiple security issues have been found in Icedove, Debian's version of lead to the execution of arbitrary code or denial of service.

tags | advisory, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2016-1979, CVE-2016-2805, CVE-2016-2807
SHA-256 | 05e7b4c1f39005760c9abd1a0ac619a912317ec016c2c8356dc9bb6fbfb07db5
HP Security Bulletin HPSBMU03590 1
Posted May 13, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03590 1 - Several potential security vulnerabilities have been identified in HPE Systems Insight Manager (SIM) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS), execution of arbitrary code, disclosure of information, Cross-site Request Forgery (CSRF), and Cross-site scripting (XSS). Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary, vulnerability, xss, csrf
systems | linux, windows
advisories | CVE-2015-3194, CVE-2015-3195, CVE-2015-6565, CVE-2016-0705, CVE-2016-0799, CVE-2016-2842
SHA-256 | 0d87e5cf948c457cbccb5fbac35b83c4012fe852b7698e47171b0b53a8f1b615
Red Hat Security Advisory 2016-1079-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1079-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 11.2.202.621. Security Fix: This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content.

tags | advisory, web, arbitrary, vulnerability
systems | linux, redhat
advisories | CVE-2016-1096, CVE-2016-1097, CVE-2016-1098, CVE-2016-1099, CVE-2016-1100, CVE-2016-1101, CVE-2016-1102, CVE-2016-1103, CVE-2016-1104, CVE-2016-1105, CVE-2016-1106, CVE-2016-1107, CVE-2016-1108, CVE-2016-1109, CVE-2016-1110, CVE-2016-4108, CVE-2016-4109, CVE-2016-4110, CVE-2016-4111, CVE-2016-4112, CVE-2016-4113, CVE-2016-4114, CVE-2016-4115, CVE-2016-4116, CVE-2016-4117
SHA-256 | d553bf41bbbc57c24c14462e16a5595bf80d85af2fd934b503b65c4bd42f3912
Red Hat Security Advisory 2016-1080-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1080-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 50.0.2661.102. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-1667, CVE-2016-1668, CVE-2016-1669, CVE-2016-1670
SHA-256 | 96a2ef3caa485f8a2cd13aeccd168bd4739b6ebbd1bb2c0819aa0cf395192ca7
HP Security Bulletin HPSBMU03589 1
Posted May 13, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03589 1 - Several potential security vulnerabilities have been identified with HPE Version Control Repository Manager (VCRM) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
systems | linux, windows
advisories | CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792
SHA-256 | d146f7607639ef769e92d718f1be1d84113514ecc0f578bc6f1b73b1e457a968
HP Security Bulletin HPSBMU03591 1
Posted May 13, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03591 1 - Several potential security vulnerabilities have been identified in HPE Server Migration Pack (SMP) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
systems | linux, windows
advisories | CVE-2015-7547, CVE-2016-0728
SHA-256 | 958138fc11dd9e53ea6b98de78d16ced9c354a2c2997cb0b10965023053cabb7
Debian Security Advisory 3575-1
Posted May 13, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3575-1 - It was discovered that XStream, a Java library to serialize objects to XML and back again, was susceptible to XML External Entity attacks.

tags | advisory, java, xxe
systems | linux, debian
advisories | CVE-2016-3674
SHA-256 | af1b21075f21f469f80745cdec90abae5c25ac53e577e451d9fead725f190788
Red Hat Security Advisory 2016-1034-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1034-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that will run virtually anywhere. Security Fix: It was found that Docker would launch containers under the specified UID instead of a username. An attacker able to launch a container could use this flaw to escalate their privileges to root within the launched container.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2016-3697
SHA-256 | fef631830638375fd374745e17155f22b591a950b15fa0987ffc1f44087ce1cf
HP Security Bulletin HPSBGN03597 1
Posted May 13, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03597 1 - A vulnerability in GNU C Library (glibc) was addressed by HPE Cloud Optimizer (Virtualization Performance Viewer). The vulnerability could be exploited remotely to allow Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2015-7547
SHA-256 | 25f49ade38400e07817b57b4a97217d1ee78e9e0c35b13e06ec064443db88b6d
Red Hat Security Advisory 2016-1064-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1064-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service solution designed for on-premise or private cloud deployments. Security Fix: A flaw was found in the building of containers within OpenShift Enterprise. An attacker could submit an image for building that executes commands within the container as root, allowing them to potentially escalate privileges.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2016-2149, CVE-2016-2160, CVE-2016-3711
SHA-256 | ff1f5de43fd5b0b8ab16a8e1890a76884dc013664db557572763c867cc75b38b
Red Hat Security Advisory 2016-1060-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1060-01 - PostgreSQL is an advanced object-relational database management system. Security Fix: An integer overflow flaw, leading to a heap-based buffer overflow, was found in the PostgreSQL handling code for regular expressions. A remote attacker could use a specially crafted regular expression to cause PostgreSQL to crash or possibly execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2016-0773
SHA-256 | 7cdfdec3be0c6fefdde2bd8c964d004f67986d9a2745fea3fe0ea827dae1997a
TrendMicro CoreServiceShell.exe HTTP Problems
Posted May 13, 2016
Authored by Tavis Ormandy, Google Security Research

TrendMicro suffers from multiple HTTP problems in CoreServiceShell.exe.

tags | advisory, web
systems | linux
SHA-256 | 66cb00c146f952cc997388b5ddb1c0039e197d650c1e6a388b719ebecf1ec16f
Ubuntu Security Notice USN-2974-1
Posted May 12, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2974-1 - Zuozhi Fzz discovered that QEMU incorrectly handled USB OHCI emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. Qinghao Tang discovered that QEMU incorrectly handled USB Net emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. Qinghao Tang discovered that QEMU incorrectly handled USB Net emulation support. A privileged attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly leak host memory bytes. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2016-2391, CVE-2016-2392, CVE-2016-2538, CVE-2016-2841, CVE-2016-2857, CVE-2016-2858, CVE-2016-3710, CVE-2016-3712, CVE-2016-4001, CVE-2016-4002, CVE-2016-4020, CVE-2016-4037
SHA-256 | 17f7d26242cade4510f2fd199babbc3cc8a952a96c7f7115e5543fef485ef4eb
Red Hat Security Advisory 2016-1033-01
Posted May 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1033-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A flaw was found in the way the Linux kernel's ASN.1 DER decoder processed certain certificate files with tags of indefinite length. A local, unprivileged user could use a specially crafted X.509 certificate DER file to crash the system or, potentially, escalate their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2016-0758
SHA-256 | e45c138b2753829dc79e684567547bf112b96c0a9432a870efadd6e45bd1a03c
Red Hat Security Advisory 2016-1051-01
Posted May 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1051-01 - The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. The following packages have been upgraded to a newer upstream version: kernel-rt. This version provides a number of bug fixes and enhancements, including: [scsi] bnx2fc: Fix FCP RSP residual parsing and remove explicit logouts [scsi] mpt3sas: Fix for Asynchronous completion of timedout IO and task abort of timedout IO

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2016-0758
SHA-256 | 21c5265b59b451a5ddb26d9e008c07b346c9eea16e7069c9a77e2104a9ab8465
Red Hat Security Advisory 2016-1055-01
Posted May 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1055-01 - The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. The following packages have been upgraded to a newer upstream version: kernel-rt. This version provides a number of bug fixes and enhancements, including: [scsi] bnx2fc: Fix FCP RSP residual parsing and remove explicit logouts [scsi] mpt3sas: Fix for Asynchronous completion of timedout IO and task abort of timedout IO

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2016-0758
SHA-256 | b8c554fc25788fff5ae196c0632ab105d3e249701f8eeebf038112421b13b337
Red Hat Security Advisory 2016-1041-01
Posted May 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1041-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 38.8.0. Security Fix: Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-2805, CVE-2016-2807
SHA-256 | 848e50dd05b02ebc5fa7c8d2366d91b0c6c75b09e63d65e61f63225511c634d3
HP Security Bulletin HPSBST03599 1
Posted May 12, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBST03599 1 - A vulnerability in OpenSSH has been addressed by HPE 3PAR OS. The vulnerabily could be exploited remotely resulting in Denial of Service (DoS) or access restriction bypass. Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2015-5600
SHA-256 | dcbf23693e00cc87e0d7a56b5f156d9fe94676372e94f76928032bb1e2994873
HP Security Bulletin HPSBST03598 1
Posted May 12, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBST03598 1 - HPE 3PAR OS has addressed stack based buffer overflows in glibc's implementation of getaddrinfo(). This vulnerability could be remotely exploited to cause Denial of Service (DoS) or allow execution of arbitrary code on the host with the permissions of a user running glibc library. Revision 1 of this advisory.

tags | advisory, denial of service, overflow, arbitrary
advisories | CVE-2015-7547
SHA-256 | 825e2f051ab86891da30d118b79183bb3ced947bf7f0859a92642c397d8dc78f
HP Security Bulletin HPSBST03586 1
Posted May 12, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBST03586 1 - A potential security vulnerability has been identified in HPE 3PAR OS. This is the TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" which could be exploited remotely to allow unauthorized modification. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2015-4000
SHA-256 | 892de0a6051d8846816ee65ef834575a37ad8278937cbce1b677d0672a47f81e
Page 5 of 9
Back34567Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close