Web India Solutions CMS 2015 suffers from a remote SQL injection vulnerability.
Monthly Archives: May 2015
Cisco Security Advisory 20150513-tp
Cisco Security Advisory – A vulnerability in the web framework of multiple Cisco TelePresence products could allow an authenticated, remote attacker to inject arbitrary commands that are executed with the privileges of the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. Administrative privileges are required in order to access the affected parameter. A successful exploit could allow an attacker to execute system commands with the privileges of the root user.
Debian Security Advisory 3259-1
Debian Linux Security Advisory 3259-1 – Several vulnerabilities were discovered in the qemu virtualisation solution.
Cisco Security Advisory 20150513-tc
Cisco Security Advisory – Cisco TelePresence TC and TE software contains bypass and denial of service vulnerabilities.
Enjoying The Spring? Microsoft Has 13 Ways To Fix That
Google In 'Right To Be Forgotten' Talks With Regulator
EFF Pulling Support From USA Freedom Act
Majority Of Americans Fall For Email Phishing Scams
CESA-2015:0999 Important CentOS 7 qemu-kvmSecurity Update
CentOS Errata and Security Advisory 2015:0999 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0999.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: dda37f8fc9e8c901b4d1709393da94e118a7c2b96c58573e4b2ef044e77c93c1 libcacard-1.5.3-86.el7_1.2.i686.rpm 48a2af56333ae14157c3ee9278d648f45997e54cf8fd0c2f33e381ce5bd0a36b libcacard-1.5.3-86.el7_1.2.x86_64.rpm 8f3c87cccd75e0254fa9c9d28d890f0e00a51215ac8279183f909cacd4a1cf6b libcacard-devel-1.5.3-86.el7_1.2.i686.rpm a1960686a362f7cf8d2e2bdc3088c0de0599649d71a3ce82639d8d1a5a369f5e libcacard-devel-1.5.3-86.el7_1.2.x86_64.rpm 16f802e69b608cbf0a4b5838b9994e4a598bbc793c7887f0dd2a38ff93a90d0d libcacard-tools-1.5.3-86.el7_1.2.x86_64.rpm 08f63d81307fcf1e045a37b7c86b28839ec8680c09521857996d4d1ace040a75 qemu-img-1.5.3-86.el7_1.2.x86_64.rpm d0678f3b174cf068e642d76780704bf4f7fc075db22d567a7ce594b9f6838c4b qemu-kvm-1.5.3-86.el7_1.2.x86_64.rpm 07804198046372556c874bc5ec8012ddc18e1acf629047ef1e1e7fe4a4667bd1 qemu-kvm-common-1.5.3-86.el7_1.2.x86_64.rpm 2e1ac4f15785f744b60ca2f74f11b84f0667d451ab845a2b054ffe0a0c550c15 qemu-kvm-tools-1.5.3-86.el7_1.2.x86_64.rpm Source: f3b89e26b0dc20e86c939e9bd0332b900c6ef695a004b577fba36b3e2c75c77b qemu-kvm-1.5.3-86.el7_1.2.src.rpm
CESA-2015:0987 Important CentOS 7 kernel SecurityUpdate
CentOS Errata and Security Advisory 2015:0987 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0987.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 7a4d5d47579bafa29008ae01338909c2a0f116a4ae63ab4904173c6f80a448c5 kernel-3.10.0-229.4.2.el7.x86_64.rpm 2301601245a7cdae9d9e7ddb11ab9d0369432a9bbe78af10efb47a8ae4f10ad6 kernel-abi-whitelists-3.10.0-229.4.2.el7.noarch.rpm ccdd59ec62c48366438f378a94e248ea16c6bd8cd3393f0b37d30791cd512c97 kernel-debug-3.10.0-229.4.2.el7.x86_64.rpm 6625087eec9f7ac70d081d044a0a517cc68189fcffe98bd2d8a16f4f400f115f kernel-debug-devel-3.10.0-229.4.2.el7.x86_64.rpm 890da51da35bd26d5c15732b459554157c67690155835d328639988d1cbf4d8c kernel-devel-3.10.0-229.4.2.el7.x86_64.rpm c0703c24a1ecf85187838de5f2f6de1be4e338352396017470dc62ac8d0fa30a kernel-doc-3.10.0-229.4.2.el7.noarch.rpm 5ff7b3f0fdede1e3b28abec5d366003b88cec24f89258021bb16815383353297 kernel-headers-3.10.0-229.4.2.el7.x86_64.rpm 7880deae0dc939670dbb94dff0dbebc140b1b2b4475852529182f55ae2dbbc44 kernel-tools-3.10.0-229.4.2.el7.x86_64.rpm 8f9fca69c3807583a22a91c4d10ad66a247eb541eb62817a9bf9d3f000d67522 kernel-tools-libs-3.10.0-229.4.2.el7.x86_64.rpm e0a679abf7090b90068161509db0df2d1234160c9f15998959e0da23b78dcfb4 kernel-tools-libs-devel-3.10.0-229.4.2.el7.x86_64.rpm 880bb5cea72f9158c9b54f6ae5650ac2dee8ab44ad925462b80ab6114c9299c7 perf-3.10.0-229.4.2.el7.x86_64.rpm a37b855147ea3c0d7e0f90730fcf9c07a8f7bea52302eedf718b841ef9113ff0 python-perf-3.10.0-229.4.2.el7.x86_64.rpm Source: 2af4c89e3b188ee7012955cab90fa5c0bb366797601909a5fac640b4ba298b22 kernel-3.10.0-229.4.2.el7.src.rpm