WordPress Clean and Simple contact Form plugin version 4.4.0 suffers from a cross site scripting vulnerability.
Monthly Archives: November 2014
Slackware Security Advisory – mariadb Updates
Slackware Security Advisory – New mariadb packages are available for Slackware 14.1 and -current to fix security issues.
Slackware Security Advisory – mozilla-firefox Updates
Slackware Security Advisory – New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.
Slackware Security Advisory – php Updates
Slackware Security Advisory – New php packages are available for Slackware 14.0, 14.1, and -current to fix security issues.
Slackware Security Advisory – seamonkey Updates
Slackware Security Advisory – New seamonkey packages are available for Slackware 14.0, 14.1, and -current to fix security issues.
CESA-2014:1795 Moderate CentOS 7 cups-filtersSecurity Update
CentOS Errata and Security Advisory 2014:1795 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1795.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 8eee4246f63b9e759b986d5e11d929d9f0c61445b8a1f4a3d7cf85118574c431 cups-filters-1.0.35-15.el7_0.1.x86_64.rpm d1a47366406809c45b0722087d6ca26342f3f124dd71418908fa066aabec5d43 cups-filters-devel-1.0.35-15.el7_0.1.i686.rpm 8448f864295c8e1b360f2166fc35971dd6fb8757fedafda8340f332cc7e1c64a cups-filters-devel-1.0.35-15.el7_0.1.x86_64.rpm da341b043deba7a59c900199fa2c051f8dbe528c61eac761b37bd0a825281b64 cups-filters-libs-1.0.35-15.el7_0.1.i686.rpm a502bb06130d1facd1817499f02f4fa9d9dbdde4fe0cb9dc15ca4d30c4489469 cups-filters-libs-1.0.35-15.el7_0.1.x86_64.rpm Source: 7f59b1920eaf93f2140c0bbbfbf79c5ab90029a805c95bdc951f99c614c780f8 cups-filters-1.0.35-15.el7_0.1.src.rpm
CEBA-2014:1797 CentOS 6 java-1.8.0-openjdk BugFixUpdate
CentOS Errata and Bugfix Advisory 2014:1797 Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1797.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: d64950e15057d5732cc037449db322f556803f571b0950c2ef27027b75bee86e java-1.8.0-openjdk-1.8.0.25-3.b17.el6_6.i686.rpm 53b1c2ebe33a5e1f5917ee5576abfee72d9c77739b402b8925b2c912e8827f4d java-1.8.0-openjdk-demo-1.8.0.25-3.b17.el6_6.i686.rpm e3e58e643f8667f2bb73330c2826364bd7192ce05f75640fcc8cd0bd93f85e18 java-1.8.0-openjdk-devel-1.8.0.25-3.b17.el6_6.i686.rpm 21acc3cac0f28b870b142ab228bf87781896f7efc4372afe20659780f79602c0 java-1.8.0-openjdk-headless-1.8.0.25-3.b17.el6_6.i686.rpm 065b3b5578f597481a5813f816638ca82688d67af8d528c325d20afbd418eaa1 java-1.8.0-openjdk-javadoc-1.8.0.25-3.b17.el6_6.noarch.rpm c72fcbc63bd53c100b76ea4931673ae16bdd05dfd59e4d193047371712209a08 java-1.8.0-openjdk-src-1.8.0.25-3.b17.el6_6.i686.rpm x86_64: 76aae3fc6ae66836c3753aa99f345def7d82f8556bc50bb1590d6250353167c3 java-1.8.0-openjdk-1.8.0.25-3.b17.el6_6.x86_64.rpm ba87f35f52763715d043037430c554cfc63de2a95f9fd4a6ade757882b5dc256 java-1.8.0-openjdk-demo-1.8.0.25-3.b17.el6_6.x86_64.rpm d3373cf67e9564972e0f2b8c2943566962ed854c6329e5fed359383c8587f3c0 java-1.8.0-openjdk-devel-1.8.0.25-3.b17.el6_6.x86_64.rpm 41d684d6f4bb623cc5988b81407cfaed6d0dbfb7e5e7dc88468bc1693c25c259 java-1.8.0-openjdk-headless-1.8.0.25-3.b17.el6_6.x86_64.rpm 065b3b5578f597481a5813f816638ca82688d67af8d528c325d20afbd418eaa1 java-1.8.0-openjdk-javadoc-1.8.0.25-3.b17.el6_6.noarch.rpm f7587be05f068550ea62d1274dda263c6c3ad84f6988d281bb63b66edcc4741b java-1.8.0-openjdk-src-1.8.0.25-3.b17.el6_6.x86_64.rpm Source: f80f583e7671164bffdf00a1b2dc3bd35d27aa069ca0776eb9ac8b0ed5a8a807 java-1.8.0-openjdk-1.8.0.25-3.b17.el6_6.src.rpm
CEBA-2014:1799 CentOS 6 initscripts BugFix Update
CentOS Errata and Bugfix Advisory 2014:1799 Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1799.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: c8e025443cf0d8b7c7834c090ff99c0e004d09746d3cf26502604362e3c55ae6 debugmode-9.03.46-1.el6.centos.1.i686.rpm 7d0ab0679170673db99bd165977a4e5bc7cf1aa308a6cf3a94265af22be90f4e initscripts-9.03.46-1.el6.centos.1.i686.rpm x86_64: ab3b2720750464e173a0f1fdb6a1dd2b00dcbdc3360fd3ff5054f8a584660e9b debugmode-9.03.46-1.el6.centos.1.x86_64.rpm 76c4eb48eb05602403a3d0cd1539f884190f286df8806cf6e488e575093fa162 initscripts-9.03.46-1.el6.centos.1.x86_64.rpm Source: 725f746560f21af189fb51045efebb2892b40121d1eb55100df826772dcab4e6 initscripts-9.03.46-1.el6.centos.1.src.rpm
CEBA-2014:1798 CentOS 6 xfsdump BugFix Update
CentOS Errata and Bugfix Advisory 2014:1798 Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1798.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 3dcc904088bb38ea8bca79e8013e3dcff6f3f3faf97670aa96519cac1e617580 xfsdump-3.0.4-4.el6_6.1.x86_64.rpm Source: 0b428f5666270c5d7bac1ed2200375b6b9eca974ffe33de21ac38957f5f0a73c xfsdump-3.0.4-4.el6_6.1.src.rpm
CVE-2014-3660
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the “billion laughs” attack.