BugTraq Mode:
(Page 78 of 1748)  < Prev  73 74 75 76 77 78 79 80 81 82 83  Next >
CVE-2016-3074: libgd: signedness vulnerability 2016-04-21
Hans Jerry Illikainen (hji dyntopia com)
Overview
========

libgd [1] is an open-source image library. It is perhaps primarily used
by the PHP project. It has been bundled with the default installation
of PHP since version 4.3 [2].

A signedness vulnerability (CVE-2016-3074) exist in libgd 2.1.1 which
may result in a heap overflow when p

[ more ]  [ reply ]
exploit CVE-2016-2203 2016-04-21
karim reda Fakhir (karim fakhir gmail com)
# Exploit Title: Symantec Brightmail ldap credential Grabber
# Date: 18/04/2016
# Exploit Author: Fakhir Karim Reda
# Vendor Homepage:
https://www.symantec.com/security_response/securityupdates/detail.jsp?fi
d=security_advisory&pvid=security_advisory&year&suid=20160418_00
# Version: 10.6.0-7 and earl

[ more ]  [ reply ]
OpenTSDB RCE 2016-04-21
gsoc gsoc se

The paramenter wxh needs some sanitation before being used by opentsdb.

See example url:

http://opentsdb.com:4242/q?start=2016/04/13-10:21:00&ignore=2&m=sum:jmxd
ata.cpu&o=&yrange=[0:]&key=out%20right%20top&wxh=1900x770%60id%60&style=
linespoint&png

Results in RCE unfortunately

More parameters:

[ more ]  [ reply ]
Webutler CMS 3.2 - Cross-Site Request Forgery 2016-04-21
displaymyname gmail com
*# Exploit Title: Webutler CMS Cross-Site Request Forgery*
*# Date: 18 April 2016*
*# Exploit Author: Keerati T. (Post)*
*# Vendor Homepage: http://webutler.de/en <http://webutler.de/en>*
*# Software Link: http://webutler.de/download/webutler_v3.2.zip
<http://webutler.de/download/webutler_v3.2.zip>*

[ more ]  [ reply ]
Cisco Security Advisory: Multiple Cisco Products libSRTP Denial of Service Vulnerability 2016-04-20
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Multiple Cisco Products libSRTP Denial of Service Vulnerability

Advisory ID: cisco-sa-20160420-libsrtp

Revision 1.0

For Public Release 2016 April 20 16:00 UTC (GMT)

+---------------------------------------------------------------------

Summary
====

[ more ]  [ reply ]
Cisco Security Advisory: Cisco Adaptive Security Appliance Software DHCPv6 Relay Denial of Service Vulnerability 2016-04-20
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco Adaptive Security Appliance Software DHCPv6 Relay Denial of Service Vulnerability

Advisory ID: cisco-sa-20160420-asa-dhcpv6

Revision 1.0

For Public Release 2016 April 20 16:00 GMT (UTC)

+----------------------------

[ more ]  [ reply ]
Cisco Security Advisory: Cisco Wireless LAN Controller HTTP Parsing Denial of Service Vulnerability 2016-04-20
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco Wireless LAN Controller HTTP Parsing Denial of Service Vulnerability

Advisory ID: cisco-sa-20160420-htrd

Revision 1.0

For Public Release 2016 April 20 16:00 GMT (UTC)

+-----------------------------------------------

[ more ]  [ reply ]
Cisco Security Advisory: Cisco Wireless LAN Controller Denial of Service Vulnerability 2016-04-20
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco Wireless LAN Controller Denial of Service Vulnerability

Advisory ID: cisco-sa-20160420-bdos

Revision 1.0

For Public Release 2016 April 20 16:00 GMT (UTC)

+------------------------------------------------------------

[ more ]  [ reply ]
Cisco Security Advisory: Cisco Wireless LAN Controller Management Interface Denial of Service Vulnerability 2016-04-20
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco Wireless LAN Controller Management Interface Denial of Service Vulnerability

Advisory ID: cisco-sa-20160420-wlc

Revision 1.0

For Public Release 2016 April 20 16:00 GMT (UTC)

+----------------------------------------

[ more ]  [ reply ]
RCE via CSRF in phpMyFAQ 2016-04-20
High-Tech Bridge Security Research (advisory htbridge ch)
Advisory ID: HTB23300
Product: phpMyFAQ
Vendor: http://www.phpmyfaq.de
Vulnerable Version(s): 2.8.26, 2.9.0-RC2 and probably prior
Tested Version: 2.8.26, 2.9.0-RC2
Advisory Publication: March 30, 2016 [without technical details]
Vendor Notification: March 30, 2016
Vendor Patch: April 11, 2016

[ more ]  [ reply ]
shell.com vulnerable TLS 2016-04-20
shell shell com
Decrypting RSA using Obsolete and Weakened eNcryption

107.21.222.4:443

23.21.217.254:443

107.20.182.27:443

95.138.155.170:443

54.229.231.88:443

54.229.137.226:443

50.19.91.245:443

50.19.92.226:443

50.16.219.106:443

23.23.114.55:443

[ more ]  [ reply ]
*.Shell.com Port 443 DROWN decryption attack 2016-04-20
shell shell com
Login:

https://prom3.shell.com/(S(qxq1noy1f4gl4g45kbggia45))/Common/Login.aspx

Vulnerability

An attacker can decrypt traffic and get login and passwords

Signatures

584e3a64196dc662286922fc82fa915f1ee0cc46ab5400c347f529ab4eb46c67
prom3.shell.com
d50be93e35266af753e288af8f4f3eb96986187264a44c6c

[ more ]  [ reply ]
PHPBack v1.3.0 SQL Injection 2016-04-20
apparitionsec gmail com
[+] Credits: hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/PHPBACK-v1.3.0-SQL-INJECTION.
txt

Vendor:
================
www.phpback.org

Product:
================
PHPBack v1.3.0

Vulnerability Type:
===================
SQL Injection

[ more ]  [ reply ]
[security bulletin] HPSBMU03575 rev.1 - HP Smart Update Manager (SUM), Remote Denial of Service (DoS), Disclosure of Information 2016-04-19
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05086877

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05086877
Version: 1

HPSBMU03575 r

[ more ]  [ reply ]
ESA-2016-039: EMC ViPR SRM Multiple Cross-Site Request Forgery Vulnerabilities 2016-04-19
Security Alert (Security_Alert emc com)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

ESA-2016-039: EMC ViPR SRM Multiple Cross-Site Request Forgery Vulnerabilities

CVE Identifier: CVE-2016-0891

EMC Identifier: ESA-2016-039

Severity Rating: CVSS Base Score 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

Affected products:
EMC ViPR SRM

[ more ]  [ reply ]
Multiple Reflected XSS vulnerabilities in Oliver (formerly Webshare) v1.3.1 2016-04-19
research (at) rv3lab (dot) org [email concealed] (research rv3lab org)
###################################################

01. ### Advisory Information ###

Title: Multiple Reflected XSS vulnerabilities in Oliver (formerly
Webshare) v1.3.1
Date published: 2016-15-04
Date of last update: 2014-03-04
Vendors contacted: Oliver (formerly Webshare) v1.3.1
Discovered by: Rv

[ more ]  [ reply ]
[ERPSCAN-16-004] SAP NetWeaver 7.4 (Pmitest servlet) â?? XSS vulnerability 2016-04-19
ERPScan inc (erpscan online gmail com)
Application: SAP NetWeaver
Versions Affected: SAP NetWeaver J2EE Engine 7.40
Vendor URL: http://SAP.com
Bugs: Cross-Site Scripting
Sent: 01.09.2015
Reported: 01.09.2015
Vendor response: 02.09.2015
Date of Public Advisory: 12.01.2016
Reference: SAP Security Note 2234918
Author: Vahagn Vardanyan (ER

[ more ]  [ reply ]
[ERPSCAN-16-005] SAP HANA hdbxsengine JSON â?? DoS vulnerability 2016-04-19
ERPScan inc (erpscan online gmail com)
Application: SAP HANA
Versions Affected: SAP HANA
Vendor URL: http://SAP.com
Bugs: DoS
Sent: 28.09.2015
Reported: 28.09.2015
Vendor response: 29.09.2015
Date of Public Advisory: 12.01.2016
Reference: SAP Security Note 2241978
Author: Mathieu Geli (ERPScan)

Description

1. ADVISORY INFORMATION

[ more ]  [ reply ]
Executable installers are vulnerable^WEVIL (case 33): GData's installers allow escalation of privilege 2016-04-18
Stefan Kanthak (stefan kanthak nexgo de)
Hi @ll,

the executable installers of G-Data's "security" products for
Windows, available from <https://www.gdata.de/downloads>, allow
escalation of privilege!

The downloadable executables are self-extractors containing the
real executable installer as resource: they create the subdirectory
%T

[ more ]  [ reply ]
[security bulletin] HPSBST03576 rev.2 - HP P9000, XP7 Command View Advanced Edition (CVAE) Suite including Device Manager and Tiered Storage Manager using Java Deserialization, Remote Arbitrary Code Execution 2016-04-18
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05085438

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05085438
Version: 2

HPSBST03576 r

[ more ]  [ reply ]
[security bulletin] HPSBGN03555 rev.1 - HPE Vertica Analytics, Management Console, Remote Disclosure of Sensitive information, Execution of Arbitrary Code with Root Privileges 2016-04-18
security-alert hpe com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=
emr_n
a-c05085303

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05085303
Version: 1

HPSBGN03555 r

[ more ]  [ reply ]
CVE-2016-4021: pgpdump 0.29 - Endless loop parsing specially crafted input (SYSS-2016-030) 2016-04-18
klaus eisentraut syss de
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory ID: SYSS-2016-030
Product: pgpdump
Maintainer: Kazu Yamamoto
Affected Version(s): 0.29
Tested Version(s): 0.29
Vulnerability Type: Improper Input Validation (CWE-20)
Risk Level: Low
Solution Status: Fixed (in 0.30)
Maintainer Notification: 2

[ more ]  [ reply ]
[SECURITY] [DSA 3552-1] tomcat7 security update 2016-04-17
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3552-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
April 17, 2016

[ more ]  [ reply ]
[SECURITY] [DSA 3551-1] fuseiso security update 2016-04-16
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3551-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Florian Weimer
April 16, 2016

[ more ]  [ reply ]
Ahrare Andeysheh Cms Multiple Vulnerabilities 2016-04-16
iesb team gmail com
Xss and sqli and poc on ahrare andeysheh cms to all versions

#################################

#
# @@@ @@@@@@@@@@@ @@@@@ @@@@@@@@@@ @@@ @@@@@@@
# @@@ @@@@@@@@@@@ @@@ @@ @@@ @@ @@@ @@@@@@@@
# @@@ @@@ @@@ @@ @@@ @@ @@@ @@@ @@@
# @@@ @@@ @@@ @@ @@@ @@ @@@ @@@ @@@
# @@@ @@@@@@@@@@@ @@@ @ @@@@@@@@@@ @@

[ more ]  [ reply ]
[CVE-2016-3996]KNOX clipboard data disclosure KNOX 1.0 - KNOX 2.3 / Android 2016-04-16
urikanonov gmail com
Subject: [CVE-2016-3996]KNOX clipboard data disclosure KNOX 1.0 - KNOX 2.3 / Android

Vulnerability Description
=========================

The vulnerability allows disclosure of Clipboard data of Samsung KNOX 1.0 and 2.3 containers.

On KNOX-enabled devices there exists a proprietary service called

[ more ]  [ reply ]
[slackware-security] samba (SSA:2016-106-02) 2016-04-15
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] samba (SSA:2016-106-02)

New samba packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/samba

[ more ]  [ reply ]
[slackware-security] mozilla-thunderbird (SSA:2016-106-01) 2016-04-15
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mozilla-thunderbird (SSA:2016-106-01)

New mozilla-thunderbird packages are available for Slackware 14.1 and -current
to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
p

[ more ]  [ reply ]
[SECURITY] [DSA 3550-1] openssh security update 2016-04-15
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3550-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
April 15, 2016

[ more ]  [ reply ]
Microsoft Internet Explorer 11 MSHTML.DLL Remote Binary Planting Vulnerability 2016-04-15
Sandro Poppi (spoppi sec gmail com)
Abstract
--------
Microsoft Internet Explorer 11 MSHTML.DLL Remote Binary Planting
Vulnerability
Affected Version: MSHTML.DLL 11.0.9600.18231 and probably below on
Windows 7 SP1
Vendor Homepage: http://www.microsoft.com
Severity: high
Status: fixed
CVE-ID: CVE-2016-0160

Description
-----------
Micr

[ more ]  [ reply ]
(Page 78 of 1748)  < Prev  73 74 75 76 77 78 79 80 81 82 83  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus