exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 219 RSS Feed

Files

Gentoo Linux Security Advisory 201611-16
Posted Nov 22, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-16 - Multiple vulnerabilities have been found in the Chromium web browser, the worst of which allows remote attackers to execute arbitrary code. Versions less than 54.0.2840.100 are affected.

tags | advisory, remote, web, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2016-5199, CVE-2016-5200, CVE-2016-5201, CVE-2016-5202
SHA-256 | a8397f1dead0b8746099dc52697372ef684258ab45498b92df26cd99cee4688b
Gentoo Linux Security Advisory 201611-15
Posted Nov 22, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-15 - Multiple vulnerabilities have been found in Poppler, the worst of which allows remote attackers to execute arbitrary code. Versions less than 0.42.0 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2015-8868
SHA-256 | 9e867017ee405f2ab3aa5e78c21182ba068554c3f7411e1496a5456c49780f29
Ubuntu Security Notice USN-3131-1
Posted Nov 21, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3131-1 - It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2014-8354, CVE-2014-8355, CVE-2014-8562, CVE-2014-8716, CVE-2014-9805, CVE-2014-9806, CVE-2014-9807, CVE-2014-9808, CVE-2014-9809, CVE-2014-9810, CVE-2014-9811, CVE-2014-9812, CVE-2014-9813, CVE-2014-9814, CVE-2014-9815, CVE-2014-9816, CVE-2014-9817, CVE-2014-9818, CVE-2014-9819, CVE-2014-9820, CVE-2014-9821, CVE-2014-9822, CVE-2014-9823, CVE-2014-9826, CVE-2014-9828, CVE-2014-9829, CVE-2014-9830, CVE-2014-9831
SHA-256 | 97f74f2887273aaf548965ae782a0d45d4345f1afed77295fdf4004d81751ca0
Red Hat Security Advisory 2016-2809-01
Posted Nov 21, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2809-01 - The ipsilon packages provide the Ipsilon identity provider service for federated single sign-on. Ipsilon links authentication providers and applications or utilities to allow for SSO. It includes a server and utilities to configure Apache-based service providers. Security Fix: A vulnerability was found in ipsilon in the SAML2 provider's handling of sessions. An attacker able to hit the logout URL could determine what service providers other users are logged in to and terminate their sessions.

tags | advisory
systems | linux, redhat
advisories | CVE-2016-8638
SHA-256 | 62ebd6d5c44aa0b4baaa3685abab5cbb76b339806e15c8c48e96b76428ab30f4
Debian Security Advisory 3719-1
Posted Nov 21, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3719-1 - It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for DCERPC, AllJoyn, DTN, and OpenFlow, that could lead to various crashes, denial-of-service, or execution of arbitrary code.

tags | advisory, arbitrary, vulnerability, protocol
systems | linux, debian
advisories | CVE-2016-9373, CVE-2016-9374, CVE-2016-9375, CVE-2016-9376
SHA-256 | ff0042f1d46181ecb6688120175f8f37efc1368dea2b32c7c87d609b9ba1c690
Gentoo Linux Security Advisory 201611-14
Posted Nov 21, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-14 - Multiple vulnerabilities have been discovered in MIT Kerberos 5, the worst of which may allow remote attackers to cause Denial of Service. Versions less than 1.13.2-r2 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2015-2695, CVE-2015-2696, CVE-2015-2697
SHA-256 | 9cc870d75fec5b3e5e72b5410b010b6e2964e4ac02c65b63650fe6ad75245d4c
Gentoo Linux Security Advisory 201611-13
Posted Nov 21, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-13 - A vulnerability in MongoDB can lead to a Denial of Service condition. Versions less than 2.4.13 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2015-1609
SHA-256 | b4839033da00a62a97688eab707eedcf52ab5e81048779f078e4fd71ee2a2362
Gentoo Linux Security Advisory 201611-12
Posted Nov 21, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-12 - Multiple vulnerabilities have been found in imlib2, the worst of which allows for the remote execution of arbitrary code. Versions less than 1.4.9 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2014-9762, CVE-2014-9763, CVE-2014-9764, CVE-2016-4024
SHA-256 | c0bc2da01fe92dabf8269a7cfb2e656e04ea91d148acd072356abd67d733f945
HP Security Bulletin HPSBHF03675 1
Posted Nov 20, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03675 1 - A potential security vulnerability was addressed by HPE Integrated Lights-Out 3 and 4. The vulnerability could be remotely exploited to allow Cross-Site Scripting (XSS). Revision 1 of this advisory.

tags | advisory, xss
advisories | CVE-2016-4406
SHA-256 | 68e2e4afbbd1b669825b4e3ffe15b30c78592fb5f0402619943504d5f5a85d1f
Slackware Security Advisory - mozilla-firefox Updates
Posted Nov 20, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1, 14.2, and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 9fbe184d699b0008e8385d88f418c5f0209ffd94b643de6961426707c80db8f4
Ubuntu Security Notice USN-3124-1
Posted Nov 19, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3124-1 - Christian Holler, Andrew McCreight, Dan Minor, Tyson Smith, Jon Coppeard, Jan-Ivar Bruaroey, Jesse Ruderman, Markus Stange, Olli Pettay, Ehsan Akhgari, Gary Kwong, Tooru Fujisawa, and Randell Jesup discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code. A same-origin policy bypass was discovered with local HTML files in some circumstances. An attacker could potentially exploit this to obtain sensitive information. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2016-5289, CVE-2016-5290, CVE-2016-5291, CVE-2016-5292, CVE-2016-5296, CVE-2016-5297, CVE-2016-9063, CVE-2016-9064, CVE-2016-9066, CVE-2016-9067, CVE-2016-9068, CVE-2016-9069, CVE-2016-9070, CVE-2016-9071, CVE-2016-9073, CVE-2016-9075, CVE-2016-9076, CVE-2016-9077
SHA-256 | 186fc72529bc55503b5bee038a51d2256f957a0adfbd4fa065e59591da446ee3
Gentoo Linux Security Advisory 201611-11
Posted Nov 19, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-11 - Multiple vulnerabilities have been found in QEMU, the worst of which could cause a Denial of Service condition. Versions less than 2.7.0-r6 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2016-7161, CVE-2016-7423, CVE-2016-7466, CVE-2016-7907, CVE-2016-7908, CVE-2016-7909, CVE-2016-7994, CVE-2016-8576, CVE-2016-8577, CVE-2016-8578, CVE-2016-8668, CVE-2016-8669, CVE-2016-8909, CVE-2016-8910, CVE-2016-9102, CVE-2016-9103, CVE-2016-9104, CVE-2016-9105
SHA-256 | f65df48e99a50acb2abf2cd6d8af4cac73a92399ae257cbb493db0dd555963e0
Relevanssi Premium 1.14.4 SQL Injection
Posted Nov 19, 2016
Authored by Glyn Wintle

Relevanssi Premium version 1.14.4 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
SHA-256 | 679c29060b65dc84d082552b03e799104a81dfec85db097aec556548b1eac5f6
Relevanssi Premium 1.14.4 Code Execution
Posted Nov 19, 2016
Authored by Glyn Wintle

An unserialization vulnerability in Relevanssi Premium version 1.14.4 could allow for code execution.

tags | advisory, code execution
SHA-256 | 6927b4ab7d5885556bd754c2ad01701b0d593da38e2a88a2428cccf5bb0216fc
Post Indexer 3.0.6.1 Man-In-The-Middle
Posted Nov 19, 2016
Authored by Glyn Wintle

Post Indexer version 3.0.6.1 suffers from a man-in-the-middle vulnerability that may allow for arbitrary code execution.

tags | advisory, arbitrary, code execution
SHA-256 | ae251345f938c977f6f946b8a67e335ec898d22c843c43fc210bb0cdd04d4b34
Post Indexer 3.0.6.1 SQL Injection
Posted Nov 19, 2016
Authored by Glyn Wintle

Post Indexer version 3.0.6.1 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
SHA-256 | 29834485d983a58f496acf14a03989b41aa447ba1ef4b268ba5ec7b3d8676a83
Palo Alto Networks PanOS Buffer Overflow
Posted Nov 19, 2016
Authored by Tavis Ormandy, Google Security Research

Palo Alto Networks PanOS suffers from a stack buffer overflow in the appweb3 embedded webserver.

tags | advisory, overflow
SHA-256 | 46316d54fe0b1eaeb6e793d9de3a88060515fc612e68480aff0ecc2569c52c70
Jaws 1.1.1 Code Execution
Posted Nov 18, 2016
Authored by Tim Coen | Site curesec.com

Jaws version 1.1.1 suffers from a remote code execution vulnerability.

tags | advisory, remote, code execution
SHA-256 | f1ac8e059024b6d543654b98ea962126a4712333b7af780c3dab82cf9a059f7a
Ubuntu Security Notice USN-3130-1
Posted Nov 17, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3130-1 - It was discovered that OpenJDK did not restrict the set of algorithms used for Jar integrity verification. An attacker could use this to modify without detection the content of a JAR file, affecting system integrity. It was discovered that the JMX component of OpenJDK did not sufficiently perform classloader consistency checks. An attacker could use this to bypass Java sandbox restrictions. Various other issues were also addressed.

tags | advisory, java
systems | linux, ubuntu
advisories | CVE-2016-5542, CVE-2016-5554, CVE-2016-5573, CVE-2016-5582, CVE-2016-5597
SHA-256 | e29cc974b99c653e8595c5283afc2543bf4f25c83ab9219f573aedda2281d0cd
Red Hat Security Advisory 2016-2807-01
Posted Nov 17, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2807-01 - Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. This release of Red Hat JBoss Web Server 2.1.2 serves as a replacement for Red Hat JBoss Web Server 2.1.1. It contains security fixes for the Tomcat 7 component. Only users of the Tomcat 7 component in JBoss Web Server need to apply the fixes delivered in this release. Security Fix: A CSRF flaw was found in Tomcat's the index pages for the Manager and Host Manager applications. These applications included a valid CSRF token when issuing a redirect as a result of an unauthenticated request to the root of the web application. This token could then be used by an attacker to perform a CSRF attack.

tags | advisory, java, web, root
systems | linux, redhat
advisories | CVE-2015-5346, CVE-2015-5351, CVE-2016-0706, CVE-2016-0714, CVE-2016-0763, CVE-2016-3092
SHA-256 | a747ee41bc1c78f0329cb06102ce7044196717407b83c8ba83cdc599fc05f1e6
Red Hat Security Advisory 2016-2808-01
Posted Nov 17, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2808-01 - This release of Red Hat JBoss Web Server 2.1.2 serves as a replacement for Red Hat JBoss Web Server 2.1.1. It contains security fixes for the Tomcat 7 component. Only users of the Tomcat 7 component in JBoss Web Server need to apply the fixes delivered in this release. Security Fix: A CSRF flaw was found in Tomcat's the index pages for the Manager and Host Manager applications. These applications included a valid CSRF token when issuing a redirect as a result of an unauthenticated request to the root of the web application. This token could then be used by an attacker to perform a CSRF attack.

tags | advisory, web, root
systems | linux, redhat
advisories | CVE-2015-5346, CVE-2015-5351, CVE-2016-0706, CVE-2016-0714, CVE-2016-0763, CVE-2016-3092
SHA-256 | 6aabba5392b13a85b44e0e196d13a81b259818172e29bc8bb40c46530f9dfb13
Red Hat Security Advisory 2016-2802-01
Posted Nov 17, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2802-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Security Fix: A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.

tags | advisory, remote, protocol, memory leak
systems | linux, redhat
advisories | CVE-2016-6304
SHA-256 | 725da1b5c613bcd982c7bcfe20324be7b1e25d2d226b08cabed951c85a985649
Debian Security Advisory 3716-1
Posted Nov 17, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3716-1 - Multiple security issues have been found in the Mozilla Firefox web implementation errors may lead to the execution of arbitrary code or bypass of the same-origin policy. Also, a man-in-the-middle attack in the addon update mechanism has been fixed.

tags | advisory, web, arbitrary
systems | linux, debian
advisories | CVE-2016-5290, CVE-2016-5291, CVE-2016-5296, CVE-2016-5297, CVE-2016-9064, CVE-2016-9066, CVE-2016-9074
SHA-256 | 656343001b31a499c024493fd7fb5830ebc134988b99415fd813e06551b04c33
Gentoo Linux Security Advisory 201611-10
Posted Nov 17, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-10 - A vulnerability in libuv could lead to privilege escalation. Versions less than 1.4.2 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2015-0278
SHA-256 | 290eb7d239c48c0902769e4db7b1c970874d25c71930c3bc68ad020aad6736bc
Emsisoft Privilege Escalation
Posted Nov 17, 2016
Authored by Stefan Kanthak

In an attempt to address DLL hijacking issues, Emsisoft has introduced additional security issues.

tags | advisory
systems | windows
SHA-256 | 3adced441acb8daaa8e7985e221c41156766e4a6efbf1c4eb4fa72158ea75f09
Page 3 of 9
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close